"Cybersecurity is a service and the service is enterprise is risk management," City of San Diego Chief Information Security Officer, Deputy Director Gary Hayslip
A Pittsburgh child admitted to launching cyberattacks on the Brussels airport just hours after last year's ISIS attacks.
The Pennsylvania Superior Court has ruled the University of Pittsburgh Medical Center isn't responsible for protecting employee data.
The Leet Botnet may have wrested the 2016 crown as most powerful distributed denial of service (DDoS) attack from Mirai with a 650 Gigabit per second (Gbps) attack launched early last week.
Japanese Defense Ministry and Self-Defense Force (SDF) was targeted in September by a sophisticated cyberattack, according to sources cited by The Japan Times.
Retailers and shoppers hardly need to see Santa's Naughty or Nice list to know where most cybercriminals will land this year, although probably not all.
Kaspersky Lab has confirmed that numerous Russian banks have been suffering a wave of DDoS attacks.
An 18-year-old from Sussex has triumphed at the Cyber Security Challenge UK 2016, making him the youngest ever winner of the competition.
A fundamental fault in the SSL handshake could allow hackers to use subvert MacOS and iOS devices and recruit them into a DDoS attack.
A self-described patriotic American vigilante hacker named Jester reportedly took over the Russian Ministry of Foreign Affairs website on Friday in retaliation for alleged Russian cyberattacks on the United States.
Trend Micro researchers found that cybercriminals are using video game currency to launder real world money.
Trend Micro researchers have spotted several exploit kits delivering Cerber 4.0 ransomware just a month after the release of version 3.
A report by the Australian Cyber-Security Centre says that the misuse and over-hyping of cyber-security terms has hampered the public's ability to understand cyber-security issues.
The Obama administration will deliver what is being described as a "proportional" response against Russia in retaliation for that country launching a series of cyberattacks against U.S. political targets.
Phishing remains one of the top threats seen by organisations today. Threat actors use various social engineering tricks to convince users that their requests for information or money transfers are legitimate.
As the number of data breaches increases a recent study found that execs and board members should be more involved in data breach planning.
A recently passed Russian law has given that country's security firms the green light to crack encrypted communications services.
A number of vulnerabilities found in an industrial automation device could allow hackers to take control of machinery.
Researchers at Symantec's Norton division found that Turkey has the largest number of "bot" infections with one bot for every 1,139 internet users.
North Korea is suspect number one in an attack against South Korea's cyber command last month, according to a member of the main opposition party, Minjoo.
The U.S. Army must begin training its soldiers to endure and then continue to fight after suffering a cyberattack on the battlefield.
The malware spreads by continuously scanning the web for vulnerable devices using default or hard-coded usernames and passwords.
DressCode malware spotted in thousands of apps and could pose a serious threat to enterprise networks.
Sucuri researcher Daniel Cid found that it only took an attacker 12 minutes to compromise an IPv4 server, and shortly after launch DDoS attacks.
A new report by the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) has shown a comprehensive overview of the evolving Chinese cyber-structures.
The Android.Lockerscreen ransomware is now using pseudorandom numbers and other tactics to prevent victims from unlocking devices without paying.
Tesla has releases a major firmware update in response to a video posted by a group of Chinese researchers that displayed a series of vulnerabilities the electric car company's vehicles.
Malwarebytes researchers spotted a large malvertising campaign delivering the RIG exploit kit on popular sites including answers(dot)com.
Avast researchers examined some of the marketing tactics used by Janus Cybercrime Solution, the cybergang behind the Petya and Mischa