By the middle of last year, organisations across the UK had woken up to the threat of DDoS attacks that had, by November, increased in frequency by a massive 91 percent over Q1 2017 and 35 percent over Q2 figures.
It's critical for service providers to raise awareness regarding the importance of delivering VoIP, whether over mobile or fixed Internet networks, not just cost-efficiently but securely. As connectivity expands, so do the threats.
In June last year, a report from EfficientIP revealed that 76 percent of organisations around the world suffered DNS-based attacks and almost a third of UK organisations experienced data exfiltration via DNS.
Microsoft Corporation's Patch Tuesday security update yesterday fixed 67 bugs, including two that have been actively exploited in zero-day attacks, and another two whose details became public.
NTT Security 2018 Global Threat Intelligence Report (GTIR): Ransomware up 350% and spyware ranks first in volume of malware at 26% reflecting attackers' desire for long-term presence for information.
Russian state-sponsored hackers are attacking network infrastructure wholesale, according to US and UK governments.
Brute force attacks are being used to compromise Magento sites to scrape payment card data and deliver cryptomining malware.
Nearly 70 percent of successful ransomware attacks in 2017 were the result of hackers gaining access to enterprise networks by phishing via email or social media network.
Amidst a major rise in zero-day malware attacks in Q4 2017, researchers have observed how hackers are increasingly using Microsoft Office documents as carriers to deliver malicious payloads in enterprise systems.
Intel is redesigning its chips in order to to combat Spectre and Meltdown attacks, also known as Project Zero Variant 1, 2, and 3.
UK police tried DDoS style attacks to disrupt service on suspected drug dealer's phones in cases where they couldn't prosecute but were looking to interfere with the drug trade.
The hospitality industry has become an unlikely front line in the cyber-security battle, as a combination of desirable personal data, high-net worth individuals and complex network topography has seen attacks rise significantly.
Amid reports of Russian hackers influencing elections, Chinese hackers pilfering state secrets, and North Korea launching ransomware attacks, it would be easy to underestimate Iran's potential as a cyber-threat to the US.
DDoS threat actors have started to exploit a known problem with unsecured Memcache servers to launch hugely powerful attacks with little in the way of resource investment required.
UK councils are suffering from a lack of training in the face of a vast number of cyber attacks, averaging 37 attacks per minute, according to a new report.
The UK government publicly accused Russia of carrying out the June 2017 NotPetya ransomware attacks in June 2017 as part of a deliberate attack on the Ukraine state.
Attackers were found exploiting a zero-day Telegram app vulnerability in order to make the names and extensions of malicious files appear more legitimate, in hopes that users who received these files would more willingly open them.
While the use of HTTPS encryption is on the rise, the same is unfortunately true of attackers using it to mask their operations, according to a new report.
Hackers are increasingly turning to server-side attacks, according to a new report. Report notes fall in use of client-side exploit kits.
An Indicator of Compromise is typically observed after an initial attack or compromise, whereas Indicators of attack (IOAs) are events that may reveal an active attack before IOCs become visible.
The Software Engineering Institute at Carnegie Mellon University (KB CERT) posted an advisory warning stating the Pulse Secure VPN Linux graphic user interface (GUI) fails to validate SSL certificates.
96 percent of organisations were targeted by Business Email Compromise (BEC) attacks in the second half of 2017, primarily because such attacks did not include malicious payloads or attachments.
Most ransomware victims hit more than once, and don't have defences. Industry adopting AI that deploys deep learning neural network machine learning is predictive by looking for and identifying the techniques scammers use.
A wave of attacks leveraging the popular third-party services Google+, Pastebin, and bit.ly is targeting individuals and organisations within the Palestinian Territories.
Shipping giant and NotPetya victim Maersk was forced to replace tens of thousands of servers and computers in the aftermath of the 17 June ransomware attack, the company's charman said in Davos at the World Economic Forum.
While ransomware attacks on consumers and businesses slowed down towards the fag end of 2017, they were replaced by spyware campaigns which rose by over 800 percent year-on-year.
Attackers continue to consider email an attractive attack vector and this highlights the stresses that security pros face daily trying to sort through threats.
Attackers have made off with up to US$ 400,000 (£290,000) in cryptocurrency after an ingenious attack on Stellar Lumen (XLM) wallet, BlackWallet.
Cisco Talos researchers identified multiple unpatched vulnerabilities in the Blender Open Source 3D creation suite that could allow an attacker to run arbitrary code.
Vulnerabilities in the group communication protocols of three encrypted messaging apps - WhatsApp, Signal, and Threema - could allow attackers to willfully subvert their integrity and confidentiality.