Slow patching provides vulnerabilities to exploit. A lack of network segmentation allows unrestricted lateral movement. Yet a report surveying a year of penetration...
Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.The key commodities prices...
Since at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.North Korea's constantly...
The same gaps that enabled ransomware to spread remain in patching, network segmentation, backup practices, security experts say.Three years after the NotPetya ransomware...
Here’s an overview of some of last week’s most interesting news and articles:
Zero-day flaws in widespread TCP/IP library open millions of IoT devices...
Reading Time: 3 minutesOverview
One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in...
Ariel Parnes joins host George Rettas, president and CEO of Task Force 7 Radio and Task Force 7 Technologies. Ariel is responsible for designing and...
Vulnerability disclosure is the process of bringing information about flaws in operating systems, applications, firmware and business processes into the public domain....