UK internet provider TalkTalk has reported a breach, saying that hackers may have accessed and stolen a large quantity of data—not all of which were encrypted—before it was realized.
This latest entry on our series of articles on targeted attacks discusses how a targeted attack can impact not only the targeted organization, but also its customers
The objective of spear phishing and phishing are ultimately the same—to trick a target into opening an attachment or click on a malicious embedded link. But what is spear phishing? Learn more from this article.
What is a targeted attack? What counts as one? What's the potential damage, and how can they be prevented? Here's what they truly are about, and why they need to be secured against.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.
While not done for profit, hacktivism has forced companies and organizations to face critical security challenges. Find out what it is and how it evolved from being the “Internet’s voice” to one of today's biggest security threats.