Cybersecurity Blog


Subscribe
Intel Backdoor: How Governments Access Your CPU

Intel Backdoor: How Governments Access Your CPU


Posted August 30, 2017 in Malware, Data Breach, Cloud Security

A Russian cybersecurity firm discovered how to exploit a hidden Intel CPU backdoor used by governments. Learn what...

106,000 Patient Records Exposed in Data Breach

106,000 Patient Records Exposed in Data Breach


Posted August 30, 2017 in Data Breach, Digital Forensics, Malware

Over 106,000 patient records were exposed because of a third-party vendor weakness. See why your cybersecurity is...

IRS and FBI Phishing Scam: Do Not Click That Email

IRS and FBI Phishing Scam: Do Not Click That Email


Posted August 29, 2017 in Compliance, Ransomware, Malware, Data Breach

A sophisticated phishing scam impersonates the IRS and FBI to steal your personal data. Learn how to spot this...

Zombie Stocks and Cybercrime: A Dangerous Combo

Zombie Stocks and Cybercrime: A Dangerous Combo


Posted August 28, 2017 in Malware, Data Breach, Cryptocurrency

Hong Kong zombie stocks are surging thanks to hackers exploiting market vulnerabilities. Discover how cybercriminals...

Kaspersky Antivirus: Kremlin Ties Raise Alarms

Kaspersky Antivirus: Kremlin Ties Raise Alarms


Posted August 22, 2017 in Data Breach, Compliance, Digital Forensics

Intelligence experts warn of connections between Kaspersky Lab and Russian intelligence agencies. See why the US...

Inside a Hospital Cyberattack: What Really Happens

Inside a Hospital Cyberattack: What Really Happens


Posted August 22, 2017 in Ransomware, Data Breach, Compliance

Medical records sell for up to $500 on the dark web, making hospitals prime targets. Experience what happens during a...

Ransomware Hits Non-Profits: The Toughest Decision

Ransomware Hits Non-Profits: The Toughest Decision


Posted August 22, 2017 in Ransomware, Cryptocurrency, Bitcoin, Data Breach

When ransomware strikes a non-profit, the stakes are uniquely painful. Discover what organizations face and the...

Locky Ransomware Returns with New Attack Wave

Locky Ransomware Returns with New Attack Wave


Posted August 17, 2017 in Ransomware, Data Breach, Malware

Locky ransomware keeps coming back stronger. This persistent threat is infecting computers in waves. Learn how to...

Why Signature-Based Malware Detection Falls Short

Why Signature-Based Malware Detection Falls Short


Posted August 14, 2017 in AI, Malware, Data Breach

Cybercriminals have evolved beyond traditional antivirus detection. Learn why signature-based malware detection is no...

Data Breaches Now Lead to Lawsuits

Data Breaches Now Lead to Lawsuits


Posted August 11, 2017 in Data Breach, Compliance, Malware

Companies can now be sued for data breaches that compromise client data. Learn the legal risks your business faces...

Where 60% of Medical Breaches Came From in 2017

Where 60% of Medical Breaches Came From in 2017


Posted August 9, 2017 in Data Breach, HIPAA, Malware

The medical industry faces a staggering breach problem, with 60% of record breaches traced to one surprising source....

Major Data Leak Hits Top 100 US Companies

Major Data Leak Hits Top 100 US Companies


Posted August 9, 2017 in Data Breach, Malware, Cloud Security

A leading anti-malware product leaked terabytes of data from top US companies. Find out how this breach happened and...