Zephyrnet Logo

Tag: WannaCry

Log4j Reveals Cybersecurity’s Dirty Little Secret

Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.

Boffins unveil SSD-Insider++, promise ransomware detection and recovery right in your storage

A team of researchers claim to have come up with an upgrade that makes SSDs impervious to ransomware attacks – detecting infections and...

Cybercrimes Are Affecting Bitcoin – but There’s Reason for Optimism

Crypto Performance in 2019: The Highs and Lows
Crypto Performance in 2019: The Highs and LowsCybersecurity crimes are no longer just a threat and have taken a life of their own. It has become a significant headache for large corporations and governments alike. In addition, cybercriminals are finding innovative ways to infiltrate companies’ networks, placing their businesses, customers, and employees at risk. The most common tactic nowadays is to hack
Read More

Factbox – Five facts about ransomware attacks

(Reuters) - A ransomware attack on top U.S. fuel pipeline operator Colonial Pipeline has brought attention to the growing area of cybercrime. The...

Cybersecurity Best Practices for Data Protection

Click to learn more about author Ashley Lukehart. As the average cost of a data breach reaches $3.86 million, the need for cybersecurity...

Ransomware is On The Rise – Here’s How To Protect Your Data Center From It

This year marked the largest, most damaging, and most publicized ransomware outbreak we’ve ever seen. WannaCry infected tens of thousands of systems...

Cyber criminals targeting hospitals are ‘playing with lives’ and must be stopped, report warns

Cyberattacks targeting healthcare are putting patients at unnecessary risk and more must be done to hold the cyber criminals involved to...

IOTW: The U.S. Department Of Justice Takes A Stand Against North Korean Hackers

On February 17, The United States unsealed an indictment of three North Korean military hackers for their role in a decade-long cyber crime...

What happens after you accidentally leak secrets to a public code repository

@shhgitPaul Price @ shhgitWe find secrets in your code — before the bad guys do.How we find secrets in your code before the...

IoT Device Security Issues and Why They Exist

The concept of the Internet of Things (IoT) envisions a world in which billions of interconnected objects possess artificial intelligence, internet, and sensing...

WannaCry Has IoT in Its Crosshairs

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware.Ransomware attacks are on the...

New Threat Activity by Lazarus Group Spells Trouble For Orgs

The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.A US government warning last...

Latest Intelligence

spot_img
spot_img