Latest Articles in Security

67 pc Indian Businesses Hit by Ransomware, 38 pc Twice

Businesses spend $1.17mn to rectify impact of ransomware

Read More

Find Out How Cybercriminals Use Stolen Data for Ransomware Attacks

It is always important to understand how exactly the hackers use the stolen data to get prepared for next time

Read More

Kaspersky Lab Uncovers Slingshot, the Spy That Came in from the Router

The malware, which researchers have called ‘Slingshot,’ attacks and infects victims through compromised routers

Read More

Over 360,000 Affected by Florida School Data Breach

Organisations need to actively observe how their system operates, especially when private information is concerned

Read More

Cyber Attacks Becoming No. 1 Business Risk

SonicWall cyber threat report illustrates intense cyber arms race

Read More

Organisations Must Not Ignore Threat of Cryptocurrency Mining Malware

More malicious activity could exist in coin mining, such as backdoors and unpatched vulnerabilities

Read More

Technique Discovered That Can Mitigate Memcached DDoS Attacks

This mitigation technique relies on the attacked victim sending a "flush_all" command back to the attacking servers

Read More

eSentire Threat Intelligence Advisory: Memcached-Based DDoS

eSentire assesses with medium confidence that memcached-based DDoS attacks pose an immediate threat

Read More

GitHub hit by Most Powerful DDoS Attack

Servers flooded with 2 TeraBytes per second of data

Read More

"Spring Break" - Critical Security Vulnerability Found!

Hackers are looking for low hanging fruit, and understanding how important the gap between the discovery of a serious defect and taking action is essential

Read More