Previously, to carry out a cyber attack it was necessary technical knowledge in technology, software development, networks and especially information security. Nonetheless, the…
Application and database configuration errors and correct policy adoption could have prevented two-thirds of breaches in cloud environments seen by IBM from Q2…
Low-cost mobile phones being sold at online stores in Russia had pre-installed malware capable of performing different malicious activities. The warning was given…
The number of ransomware attacks increased 288% between the first and second quarters of this year as double extortion attempts increased, according to…
Ransomware group Ragnarok (Asnarök) announced the end of its activities and published a free utility to recover encrypted files. The free decryptor, with…