cybercrime

100 million IoT devices affected by zero-day flaw
Man holding cell phone with IoT images surrounding it
Internet of Things (IoT)

100 million IoT devices affected by zero-day flaw

Vulnerability could affect car, fire detection, and patient data sensors
24 Sep 2021
HP Wolf Security: Threat insights report
Skyscrapers from belowwhitepaper
Whitepaper

HP Wolf Security: Threat insights report

Equipping security teams with the knowledge to combat emerging threats
24 Sep 2021
How to plan for endpoint security against ever-evolving cyber threats
Man and woman looking at a laptop in an office building whitepaper
Whitepaper

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation
24 Sep 2021
Managing security and risk across the IT supply chain: A practical approach
Overlaid images of buildings, a sign saying 'security breach', and yellow text saying 'we have detected a harmful attack attempt'whitepaper
Whitepaper

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security
24 Sep 2021
Phishing emails target victims with fake vaccine passport offer
Overhead view of an human hand holding a passport and a smart phone with a digital illustration of a certificate of vaccination against the Covid-19 disease.
cyber crime

Phishing emails target victims with fake vaccine passport offer

Scammers could steal victims’ personal information and never deliver the illegal goods, Fortinet warns
21 Sep 2021
IoT devices are more vulnerable than ever
Internet of Things
Internet of Things (IoT)

IoT devices are more vulnerable than ever

Ove a billion attacks recorded on IoT devices in the first six months of the year
10 Sep 2021
Defeating ransomware with unified security from WatchGuard
Whitepaper title above a red triangle with an exclamation point insidewhitepaper
Whitepaper

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks
7 Sep 2021
Why retail is a top target for cyber attacks
A padlock clipped on a yellow credit card perched on a keyboard
cyber security

Why retail is a top target for cyber attacks

We explain why you should make cyber security a priority for your retail business in 2021
1 Sep 2021
Credential theft most prevalent threat to corporate inboxes
Corporate ID badge stuck on a fishing hook
phishing

Credential theft most prevalent threat to corporate inboxes

Hackers are also partial to attacking Office 365 accounts, according to new data
27 Aug 2021
BCDR buyer's guide for MSPs
BCDR buyer's guide for MSPs - whitepaper from Dattowhitepaper
Whitepaper

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution
24 Aug 2021
Nokia subsidiary reveals data breach following Conti ransomware raid
Nokia's HQ with dark clouds above
Mobile Phones

Nokia subsidiary reveals data breach following Conti ransomware raid

SAC Wireless notifies current and former employees that their personal information may be at risk
24 Aug 2021
False crypto-mining apps plague Google Play
Abstract image of a bitcoin token inside some rocks to represent cryptocurrency mining
cryptocurrencies

False crypto-mining apps plague Google Play

Apps deceive users into clicking on ads or buying non-existent mining subscriptions
19 Aug 2021
Ohio resident pleads guilty to running Bitcoin “mixer” money laundering scheme
Bitcoin sitting on edge on a table with several other coins in the background
cryptocurrencies

Ohio resident pleads guilty to running Bitcoin “mixer” money laundering scheme

More than $300 million went through Darknet-based bitcoin hashing (BTC) service
19 Aug 2021
The ultimate guide to landing a cyber security career
Abstract cyber security image of a man holding a symbol of a padlock inside a shield
Careers & training

The ultimate guide to landing a cyber security career

Six steps to landing a lucrative cyber security career
12 Aug 2021
Average ransomware payouts nearly double in a year
Ransomware warning on a compute screen with a URL address bar above it
ransomware

Average ransomware payouts nearly double in a year

New report finds victims succumbing to cyber criminals increasingly aggressive tactics
9 Aug 2021
Resentful hacker exposes Conti ransomware gang’s tools
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

Resentful hacker exposes Conti ransomware gang’s tools

Tools leaked by disgruntled affiliate
6 Aug 2021
DNS loophole could allow hackers to carry out “nation-state level spying”
Letters DNS to represent Domain Name System displayed on a blue high tech background
Domain Name System (DNS)

DNS loophole could allow hackers to carry out “nation-state level spying”

Sensitive data could be accessed from corporate networks using vulnerability
6 Aug 2021
Hackers turn to Prometheus to deliver ransomware threats to victims
RAnsomware message on a computer screen with person sitting in front of it
ransomware

Hackers turn to Prometheus to deliver ransomware threats to victims

Campo Loader, IcedID, QBot, SocGholish, and Buer Loader all served up ransomware attacks on US government agencies.
6 Aug 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
5 Aug 2021
Senate report slams agencies for poor cyber security
Graphic representing a network and cyber security. A series of hexagons with padlocks inside superimposed over a map of the world.
cyber security

Senate report slams agencies for poor cyber security

Federal agencies still score poorly on data protection
3 Aug 2021
86% of organizations expect a cyber attack in the next 12 months
Hand hovering over laptop with padlock graphic superimposed
cyber attacks

86% of organizations expect a cyber attack in the next 12 months

Of those surveyed, 80% expect a customer information data breach within a year
3 Aug 2021
Colonial Pipeline hack spurred copycat attacks on other oil and gas companies
Long pipeline heading toward a mountain range
hacking

Colonial Pipeline hack spurred copycat attacks on other oil and gas companies

New research reveals 29% increase in attacks on IT systems and perimeter defenses
29 Jul 2021
Dark web ads offering access to corporate networks increase sevenfold
Image of a cyber criminal using several computers in a dark room
hacking

Dark web ads offering access to corporate networks increase sevenfold

New report shines a light on hackers offering “access for sale” to other cyber criminals
28 Jul 2021