DDoS Smokescreen Attacks: The Real Threat Is Hidden
Posted December 5, 2016 in Malware, Data Breach, Compliance
Hackers use DDoS attacks as distractions while stealing data through a back door. Discover why the visible attack is...
Saudi Government Cyberattack Cripples Six Agencies
Posted December 5, 2016 in Malware, Data Breach, Compliance
A massive cyberattack crippled thousands of systems across six Saudi government agencies. Learn how nation-state...
Russian Election Hacking: Pressure Mounts for US Response
Posted December 5, 2016 in Data Breach, Digital Forensics, Malware
Democrats pressured the Obama administration to clarify Russia's role in election interference. See how...
How to Avoid Millions in HIPAA Fines: Expert Guide
Posted December 2, 2016 in HIPAA, Compliance, NIST
HIPAA Business Associate fines are reaching record levels. Learn the compliance steps your organization must take to...
Cyber Monday Fraud: How Thieves Target Online Shoppers
Posted December 2, 2016 in Data Breach, Compliance, Malware
Cyber Monday hit $3.39 billion in sales, making it a goldmine for cybercriminals. Discover the scams targeting...
Firefox Zero-Day Exploit: Tor Users De-Anonymized
Posted December 2, 2016 in Malware, Data Breach, Digital Forensics
A critical Firefox and Tor vulnerability exposed anonymous users to identification. Learn how this zero-day exploit...
GStreamer Linux Exploit: Backdoor Vulnerability Discovered
Posted November 29, 2016 in Malware, Data Breach, Compliance
A new GStreamer exploit opens Linux Fedora users to backdoors and keyloggers. Check if your Linux system is...
MailChimp Hacked: Malware Delivered Through Email Newsletters
Posted November 29, 2016 in Compliance, Data Breach, Malware
Hackers infiltrated MailChimp subscriber databases and sent malware-laden newsletters to users. See how trusted email...