Cybersecurity Blog


Subscribe

Posts tagged: Data Breach

Category: News

Obama Orders Full Review of Election Cyberattack Evidence

Obama Orders Full Review of Election Cyberattack Evidence


Posted December 9, 2016 in Data Breach, Digital Forensics, Compliance

President Obama ordered a comprehensive review of cyberattacks that influenced the 2016 election. See what the...

Mirai Botnet: The IoT Malware Crushing the Internet

Mirai Botnet: The IoT Malware Crushing the Internet


Posted December 9, 2016 in Malware, AI, Data Breach

The Mirai botnet that took down major websites is still actively attacking internet infrastructure. Learn how...

Locky Ransomware Evolves: New Egyptian-Themed Variants

Locky Ransomware Evolves: New Egyptian-Themed Variants


Posted December 8, 2016 in Ransomware, Malware, Data Breach

Locky ransomware dropped Norse god names for Egyptian mythology in its latest evolution. Track how this dangerous...

New World Hackers Exposed: Who Attacked Trump and the BBC

New World Hackers Exposed: Who Attacked Trump and the BBC


Posted December 8, 2016 in Cryptocurrency, Bitcoin, Malware, Data Breach

The New World Hackers claimed dozens of members but were actually just three people. Meet the young hackers behind...

North Korea Hacks South Korean Military Cyber Command

North Korea Hacks South Korean Military Cyber Command


Posted December 6, 2016 in Data Breach, Malware, Compliance

North Korea breached the very unit designed to protect South Korea from hacking. See how this ironic cyberattack...

Ransomware Shuts Down Hospitals: Patients Diverted

Ransomware Shuts Down Hospitals: Patients Diverted


Posted December 6, 2016 in Ransomware, Data Breach, Malware

A ransomware attack forced three hospitals to cancel operations and divert patients. Learn what happened and the...

DDoS Smokescreen Attacks: The Real Threat Is Hidden

DDoS Smokescreen Attacks: The Real Threat Is Hidden


Posted December 5, 2016 in Malware, Data Breach, Compliance

Hackers use DDoS attacks as distractions while stealing data through a back door. Discover why the visible attack is...

Saudi Government Cyberattack Cripples Six Agencies

Saudi Government Cyberattack Cripples Six Agencies


Posted December 5, 2016 in Malware, Data Breach, Compliance

A massive cyberattack crippled thousands of systems across six Saudi government agencies. Learn how nation-state...

Russian Election Hacking: Pressure Mounts for US Response

Russian Election Hacking: Pressure Mounts for US Response


Posted December 5, 2016 in Data Breach, Digital Forensics, Malware

Democrats pressured the Obama administration to clarify Russia's role in election interference. See how...

Cyber Monday Fraud: How Thieves Target Online Shoppers

Cyber Monday Fraud: How Thieves Target Online Shoppers


Posted December 2, 2016 in Data Breach, Compliance, Malware

Cyber Monday hit $3.39 billion in sales, making it a goldmine for cybercriminals. Discover the scams targeting...

Firefox Zero-Day Exploit: Tor Users De-Anonymized

Firefox Zero-Day Exploit: Tor Users De-Anonymized


Posted December 2, 2016 in Malware, Data Breach, Digital Forensics

A critical Firefox and Tor vulnerability exposed anonymous users to identification. Learn how this zero-day exploit...

GStreamer Linux Exploit: Backdoor Vulnerability Discovered

GStreamer Linux Exploit: Backdoor Vulnerability Discovered


Posted November 29, 2016 in Malware, Data Breach, Compliance

A new GStreamer exploit opens Linux Fedora users to backdoors and keyloggers. Check if your Linux system is...