Stay up to date on cyber security news across the industry with our currated newsfeed.
Can you help? There's a hidden meaning here, and it's time to find it!
What's the low-hanging fruit for ransomware attackers? What steps could help to fend them off, and what’s stopping organizations from implementing those steps?
This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware attacks.
Troy Gill, manager of security research at Zix, discusses the most common ways sensitive data is scooped up by nefarious sorts.
Rather than steal credentials or hold data for ransom, a recent campaign observed by Sophos prevents people from visiting sites that offer illegal downloads.
A DarkSide doppelganger mounts a fraud campaign aimed at extorting nearly $4 million from each target.
Original release date: June 18, 2021
Google has released Chrome version 91.0.4472.114 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. One of these vulner
Cops arrest six, seize cars and cash in splashy raid, and experts are applauding.
The intro-level networking gear for SMBs could allow remote attacks designed to steal information, drop malware and disrupt operations.
An email campaign asking victims to call a bogus number to suspend supposedly fraudulent subscriptions got right past Microsoft's native email controls.
Get a Demo
Let our team of security experts show you how ThreatWarrior can help you see everything happening on your network, learn behaviors and patterns, and act efficiently to stop threats other solutions miss.