Threat actors are upping the ante with "doxware" by implementing features to ransomware that could leak a victim's data if ransoms aren't paid.
A Chinese cyber attack targeting a U.S. Defense Department contractor was linked to the OPM hack.
U.S. federal prosecutors reportedly will charge former National Security Agency (NSA) staffer Harold Martin III not only removed 50 terabytes of data from NSA servers, but also removed "six full banker's boxes" of documents along with a host of computer hardware, according to published reports.
The Internet Systems Consortium issued an advisory on Wednesday, warning that some third parties are distributing versions of ISC's BIND software that contain a high-severity vulnerability, which if exploited can trigger an assertion failure.
A research team offered evidence that the account of John Podesta, the chairman of Hillary Clinton's presidential campaign, was hacked by the top military foreign-intelligence service of the Russian Federation.
Data Breach Blog
Katy Independent School District (ISD) in Texas is alerting select students that their information may have been compromised by a third-party vendor.
The East Coast was under siege on Friday morning from a large-scale distributed denial of service attack (DDoS) that brought down a number of prominent websites, including Twitter, Spotify, Netflix, GitHub, Amazon and Reddit.
SC Spotlight Feature
October 2016 Product Reviews
When we look back on the state of forensics over the years, we see a convergence of single point solutions to single point problems.
Cyber intrusions are continuing unabated with no end in sight, and the industry is split on what new methods are necessary to combat advanced threats, says Endgame's Mark Dufresne.
In the complex corporate security environment, automation is increasingly the "go-to" answer for organizations lost in a sea of alerts, logs and data.