Aircraft maker Embraer admits hackers breached its systems and stole data

Embraer, a Brazilian manufacturer of aircraft, has disclosed that hackers managed to breach its computer systems, and steal data. Although Embraer may not be a household name, it is the world’s third-largest ...

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group ...
office

Securing the Office of the Future

Our latest episode of “The CyberHero Adventures: Defenders of the Digital Universe” focuses on answering the question: How do organizations secure the office of the future? Businesses have demonstrated that they can ...
Security Boulevard
Your Amazon Account is Locked

Cyber Thieves are Shopping for You Online

| | Blog, cyberattack, Cybersecurity
For those of us who partake in holiday shopping, we will be making our purchases... The post Cyber Thieves are Shopping for You Online appeared first on Gurucul ...

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death

Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital and the patient dying. The ...
OT

Ransomware Increase Highlights Need for Better IT, OT Security

IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and the supply chain are at increasing risk of cyberattacks. Manufacturing security needs to deploy a more holistic ...
Security Boulevard
Ataque Ransomware Egregor a CencoSud imprime directamente la nota de rescate

Egregor Ransomware Attack Hijacks Printers to Spit Out Ransom Notes

So, you’re a ransomware gang and you want to ensure that you have caught the attention of your latest corporate victim. You could simply drop your ransom note onto the desktop of ...
5 user behavioral patterns to look out for in a decentralized workspace

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a ...

The North Face resets passwords after credential-stuffing attack

An undisclosed number of customers of outdoor clothing retailer The North Face have had their passwords reset by the company, following a credential-stuffing attack. The company has revealed that on October 9, ...

Australia Proposes Security Law to Protect Critical Infrastructure Against Cyber Attacks

The Australian Government is committed to protecting the essential services all Australians rely on by uplifting the security and resilience of critical infrastructure. Increasingly interconnected and interdependent critical infrastructure is delivering efficiencies ...