Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding the attack surface for cyber criminals. Are we prepared?
The Biden administration and allied countries unleashed a string of actions Monday against one of the most prolific hacking groups.
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft report.
U.S. law enforcement has said the Russia-linked group is behind the ransomware attack that crippled Colonial Pipeline Co. in May.
Are colocation facilities more or less secure than on-premises infrastructure or public clouds? Here’s a breakdown of their security advantages and disadvantages.
Wray said the FBI needs to work closely with private companies to stem hacking. He called on companies to build closer relationships with the agency.