News

Following RansomHub’s mysterious exit, the Threat Response Unit (TRU) at eSentire  identified a new threat actor, dubbed ShadowCoil, believed to be an ex-affiliate of the RansomHub operation.
As cyberattacks on healthcare systems grow in scale and severity, they can’t be seen as a simple IT matter. With breaches involving sensitive patient data carrying consequences that are deeply ...
Active Directory credentials are as valuable as the crown jewels, so why are so many teams treating them like an afterthought? By Eric Clay ...
A hacker was able to extract basic profile information from a third-party, cloud-based Customer Relationship Management system used by Cisco.
As businesses embrace hybrid multi-cloud environments, addressing these challenges will be critical to maintaining security &driving business success.
Despite growing up in a hyper-connected world, many Gen Zers neglect basic security practices, potentially exposing themselves to cyber risks.
Upon discovering a ransom note, businesses face the critical decision of whether to remain silent or engage with the threat actors. By Dan Saunders ...
No tools or training can replace situational awareness and real-time visibility across your entire digital infrastructure. By John McLoughlin ...
Around 70 per cent of the world’s online population has their personally identifiable data collected - often without explicit consent or awareness.
While AI gives defenders better tools, it also shortens the time they have to respond. That's why prevention must be the focus. By Spencer Young ...