Search results: killware

Killware: How to Protect Your City From This Growing Next-Generation Cybersecurity Threat

| | Blog, killware
The term killware is an overarching term that covers a wide variety of cyberattack types that target the real-life health of victims. While other forms of malware are usually defined by their ...
GUEST ESSAY: Introducing ‘killware’ — malware designed to contaminate, disrupt critical services

GUEST ESSAY: Introducing ‘killware’ — malware designed to contaminate, disrupt critical services

Within the past year, we have seen a glut of ransomware attacks that made global news as they stymied the operations of many. In May, the infamous Colonial Pipeline ransomware attack disrupted ...

What is Killware: How to Protect Yourself from these Next-Generation Cyberattacks

Not long ago, the concept of killware was the stuff of futuristic, doomsday movie fare. The idea that hackers could breach systems related to basic public infrastructure and health services to put ...
Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping

Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping

Clickbait news about the rise of “killware”, Details on 1Password’s new feature to securely share passwords with others, and a new study by university researchers in the UK shows how Android phones ...
Secureworks AI quantum IBM Killnet Google BlackBerry Zebra2014 start threat hunting

Killware: Hype is Bigger Than the Threat, For Now

While SolarWinds and the Colonial Pipeline ransomware attack were incredibly alarming to the government, industry and the public, it is the unsuccessful hack on the Oldsmar, Florida water treatment plant earlier this ...
Security Boulevard
Getting Ahead of the Adversary with Third Wave AI

Getting Ahead of the Adversary with Third Wave AI

In a world where bad actors are focused on building sophisticated AI capable of side-stepping traditional Cybersecurity platforms, it has become critically important to onboard tools that work in real-time, are exceedingly ...

What is XDR (Extended Detection and Response)?

| | Blog, XDR
Extended Detection and Response (XDR) is a detection and response cybersecurity tool that consolidates solutions and unifies data to offer extended protection beyond predecessor technologies like endpoint detection and response (EDR), which ...

New CISA Strategy Focused on Resilience, Inevitability of Data Breaches

| | Blog, cisa, Cybersecurity News
A newly released strategic plan issued by the Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to improve on traditional cybersecurity prevention and detection approaches that focus on perimeter defense ...
Modernizing Phoenix's Cybersecurity to Combat Nation-State Attacks

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson ...

Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives

Cybersecurity teams working in financial and banking settings face a constant struggle — protecting industry regulated data with limited resources. The situation can reach a breaking point when these teams become overwhelmed ...