Because the holidays are a joyful and festive time of year, it’s easy to let your guard down and relax your normally stringent cybersecurity standards. Unfortunately, bad actors won’t hesitate to take advantage of the holidays to attack your business. Researc...
Two of America’s biggest and busiest shopping days — Black Friday and Cyber Monday — are just around the corner. And as you prepare to shop till you drop, cybercriminals are also hard at it, plotting new holiday hacking tricks to fleece you till you drop if y...
The holiday season brings many good things. Family, presents, decorations, joy, good cheer, peace on Earth, and so on. Unfortunately for anyone working in IT or cybersecurity, the holidays also bring something else: an increase in hacking threats and dat...
It’s that time of year again — the leaves are changing, the air is getting chilly, and cybersecurity threats are lurking around every corner. That’s right, it’s Cybersecurity Month! And what better way to celebrate than by taking a look at some of the scaries...
IBM recently released its Cost of a Data Breach Report for 2022. It’s a helpful resource that offers IT, risk management, and security leaders insight into the year’s trends surrounding data breaches. Where they happen, how they happen, what kinds of organiza...
Since 2004, October has been recognized as Cybersecurity Awareness Month in the United States. Throughout this month, companies and IT professionals across the world should make sure that they’re rededicating themselves to cybersecurity best practic...
According to a recent report by IBM, the average data breach will cost over $4.35 million in 2022. That’s why it’s more important than ever for programmers to be aware of the risks associated with different coding languages and take steps to protect...
In any industry, cybersecurity threats lurk around every corner. Cybersecurity breaches are costly. In 2021, the average cost of a cybersecurity data breach was $4.24 million, and can substantially damage a company’s reputation in ad...
Threat actors have been using GitHub‘s repojacking flaw to hijack and inject thousands of repositories with malicious code. This flaw has yet to be fixed, meaning GitHub users will likely see more of these attacks soon. Luckily, there are ways to prevent...
Researchers recently announced the presence of a gaping security hole in Spring, a framework widely used by organizations developing Java applications. Designated CVE 2022 2965 and nicknamed SpringShell, the substantial chink in the collective Java ...
Unless you’ve been living under a rock, you’ve heard that cybercrime threatens small- to large-sized organizations across the globe. And not only are public sector organizations not immune, they’re a top target for hackers due to the volume of their proprieta...
Since Russia invaded Ukraine, a new threat vector has circulated in the open-source community. This threat vector, known as protestware, involves activists injecting malicious content into open-source code libraries to express political opinions. While most p...