Asigra Inc., a Canadian cloud-based backup, recovery and restoration software service provider, announced a new program that focusses on defending the backup repositories and data of Canadian public/non-profit organizations against cyber-attacks.
The purpose of this program is to help users...
Apple recently confirmed the relaunch of its previously closed, public bug bounty program. The company made the announcement earlier this year at the Black Hat security conference in Las Vegas.
Till now, Apple organized an invitation-based bug bounty program for...
To restore parity from a malware attack and a corresponding data breach, Henry County, a county located in north-central Georgia, ended-up paying more than US$650,000 to cybersecurity experts and consultants for restoring normalcy.
What happened?
In the early hours of July...
Another one on Facebook’s cap. An unprotected public database containing over 267 million Facebook user IDs, names, and contact details were left online without password protection. The issue came to light after security firm Comparitech and researcher Bob Diachenko uncovered...
Security researchers discovered that cryptocurrency-mining botnet operators were using pop singer Taylor Swift’s image to hide their malware payloads. The botnet, dubbed as MyKingz, was spotted by UK-based security firm Sophos. MyKingz was active since 2016 and is also...
The top brass from NATO and the European Union met in Brussels at the NATO-EU Alliance headquarters to review and discuss its joint cyber defense strategies. Back in February 2016, NATO and the European Union (EU) signed a Technical...
K-12 district schools have been a soft target for cybercriminals in the year gone by. To address the rising threat prospective, two U.S. Senators, Gary Peters (D-Mich.) and Rick Scott (R-Fla.), both members of the Senate's National Security and...
Vodafone Idea Business Services (VIBS), the enterprise arm of Vodafone Idea Ltd. (VIL), announced the launch of Vodafone Secure Device Manager (VSDM) by collaborating with IBM.
According to the partnership deal, VIBS will leverage IBM Security MaaS360, a comprehensive Unified...
Researchers at Trend Micro have observed a new technique called Process Hollowing that is used for Monero Mining. It has been implemented by hackers since early November and geo-targeted towards users mainly in Kuwait, Thailand, India, Bangladesh, the United...
The digital transformation journey of Indian organizations is getting increasingly hindered by cyberattacks, according to a recent study.
The survey, jointly conducted by cybersecurity firm Forcepoint and IT analyst firm Frost & Sullivan, revealed that 95 percent of organizations have embarked on...














