Medusa ransomware attack hit Kansas City Area Transportation Authority
Medusa ransomware gang claimed responsibility for the attack against the Kansas City Area Transportation Authority (KCATA). On January 23, 2023, […]
Medusa ransomware gang claimed responsibility for the attack against the Kansas City Area Transportation Authority (KCATA). On January 23, 2023, […]
By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET […]
The post Building For a More Secure Future: How Developers Can Prioritize Cybersecurity appeared first on Cyber Defense Magazine.
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, […]
The post It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence appeared first on Cyber Defense Magazine.
By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted its 14th annual Cybersecurity Summit in Washington, D.C. Among my […]
The post Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT appeared first on Cyber Defense Magazine.
By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium Many computer users dream of a day when the industry can move past its reliance on passwords to reach a […]
The post In Pursuit of a Passwordless Future appeared first on Cyber Defense Magazine.
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free
Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite
The Main Intelligence Directorate of Ukraine’s Ministry of Defense states that pro-Ukraine hackers wiped 2 petabytes of data from a
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China,
Bug bounty hunters earned more than $1.3 million for hacking Teslas, infotainment systems, and electric vehicle chargers at the Pwn2Own