Browsing Category
Cybersecurity
Black Basta Ransomware Decryptor Published
Security researchers have published a new suite of tools designed to help victims of the prolific Black Basta ransomware recover…
As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting
With $54…
Understanding the Escalating Threat of Web DDoS Tsunami Attacks
By Uri Dorot, Senior Security Solutions Lead at Radware
Whether it’s hacktivists conducting cyberwarfare or ransom-seeking…
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
By Zack Schwartz, Chief Revenue Officer, Trustifi
As a provider of cybersecurity, we notice when certain trends begin to emerge,…
The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are…
By Mike Nelson, Vice President of Digital Trust, DigiCert
It’s safe to say that in 2023, the Internet of Things (IoT) train has…
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be…
By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business
The rise of DDoS attacks is old news. Now, these…
The Future of Modern Networks Is Automated Threat Intelligence.
By Amit Dhingra, Executive Vice President of Network Services, NTT
During the past three years, the enterprise cybersecurity…
The Evolving Landscape of Ransomware Attacks
2023 – What is new in the world of Ransomware
By Elena Thomas, Digital Marketing Manager, SafeAeon Inc.
Ransomware has been…
The Digital Transformation Blueprint: A Mosaic of Technology,…
By Ani Chaudhuri, CEO, Dasera
In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation…
The Case Study: The Exploitation of Business Assets
By Milica D. Djekic
The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT…