Cyberattack

The importance of cyber security

Cyber Security News: Russian Hackers Lack Success Against Ukraine

It’s National Cybersecurity Awareness Month, and today’s cyber security threats are no joke. Russia has engaged in a sustained, malicious cyber campaign against Ukraine and its allies since the Feb...

best business malware protection cybersecurity

New Malware ‘Chaos’ Targets Windows & Linux For DDoS Attacks

Newly discovered cyber security threat, a cross-platform piece of malware called ‘Chaos’ is spreading on Linux and Windows systems to carry out distributed denial of service (DDoS) attacks. ...

microsoft exchange

Microsoft Exchange Server Zero-Days Exploited In New Attacks

Microsoft has warned that attackers are already taking advantage of recently disclosed zero-day exploits to hack into victim’s networks and steal data, and more attacks are likely on the way. Zero-Day ...

Open source

What The Securing Open Source Software Act Means For Tech

There’s at least one thing Republicans and Democrats can agree on in the US Senate: the importance of open-source software in today’s tech world. Seriously.  As US Senator Gary Peters (D-MI) ...

spear phishing

Microsoft: New Spear Phishing Attack Targets The IT Industry

Microsoft Warns: Hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers, that in reality lead to malware attacks. The Typ...

uber

Uber Blames Security Breach On Hacking Group Lapsus$

The security breach that hit Uber last week was the work of Lapsus$. The South American hacking group has attacked a number of technology giants in the past year, including Microsoft, Samsung, and Okta.   Ub...

Cyber Security Threats To Global Trade

This Cyber Security Threat Could Create Trouble For Us All

One of the key components of global trade is also one of the most vulnerable to cyber security threats, which is why cyber security awareness is so important. Global supply chains rely on the smooth running ...

Linux-crypto-malware

Stealthy Linux Crypto-Mining Malware Takes Over Control

A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware.  Types Of Malware And How To Preven...

Ransomware

The Ransomware Problem Won’t Get Better Unless This Changes

Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, ...