GandCrab gang not retiring, but rebranding to offer a more exclusive, lower profile 'service'
Warning over upsurge in DNS hijacking campaigns that redirect users to malicious websites
US Coast Guard issues alert over rise in cyber attacks targeting commercial vessels
Fifteen of this month's 77 vulnerabilities are rated as 'critical'
Astaroth's 'living off the land techniques' are being used to spread fileless malware
Print editions of a number of Tribune Group titles affected by a targeted campaign
CVE-2018-8653 must be patched manually for now
Critical bug scores 9.8 out of 10 for seriousness. Patches are available.
Attackers often target superuser accounts with access to data and systems - how do you protect them?
The latest methods are designed to manipulate, not destroy, says Darktrace
Mainframe users cited concerns about disruption and end-user resistance as reasons not to employ MFA
University of Birmingham CISO: "I have severe doubts about the security of Facebook, and LinkedIn is going the same way"
The University of Birmingham faces security challenges from the local to the international level
Whether it is because of legal risks, reputational damage or concerns over business continuity, reporting cyber incidents is rare and pursuing them legally is even more so
Communication between the board and IT cannot be solely one way
93 per cent of CEOs store their work on a laptop or other personal device outside of official company storage, finds survey
DerpTrolling 'brains' Austin Thompson faces up to ten years in prison over DDoS campaign
Parents and children must understand how and why data is being collected by toy-makers
The attacks begin with a malicious app that spies on the infected system and steals passwords through GPU rendering
Artificial intelligence will enable threats to learn as they go, remaining undetected for longer
Differences in cyber preparedness between EU members could put cross-region systems at risk
Sensitive information was left exposed to physical and cyber attackers in 2017
Operational technology has been kept separate from IT in the past - but as that changes, systems are being exposed to attacks
No reason to suggest Amazon and Apple knew about the supply chain attack, says agency
Panel urges companies to avoid euphemisms and acknowledge when they've been breached - or risk being fined