Source: siliconrepublic.com

From SMEs to major firms, how will ransomware attacks evolve this year? - Cyber security news

From SMEs to major firms, how will ransomware attacks evolve this year?

New research sheds light on how IT teams should patch vulnerabilities - Cyber security news

New research sheds light on how IT teams should patch vulnerabilities

‘It’s a con, pure and simple’: Why you should ignore those DNS Ireland emails - Cyber security news

‘It’s a con, pure and simple’: Why you should ignore those DNS Ireland emails

What were the top 10 web exploits used by malicious attackers in 2018? - Cyber security news

What were the top 10 web exploits used by malicious attackers in 2018?

How prepared is the EU for major cybersecurity threats? - Cyber security news

How prepared is the EU for major cybersecurity threats?

Social media exposure can increase the cost of a data breach - Cyber security news

Social media exposure can increase the cost of a data breach

Report says Garda cybercrime strategy in need of major update - Cyber security news

Report says Garda cybercrime strategy in need of major update

Shocking number of Irish office workers fall victim to phishing scams - Cyber security news

Shocking number of Irish office workers fall victim to phishing scams

ESET warns Irish users to avoid this convincing Revenue email scam - Cyber security news

ESET warns Irish users to avoid this convincing Revenue email scam

How many versions of your identity exist online? - Cyber security news

How many versions of your identity exist online?

Medical cybersecurity start-up Nova Leah raises €2.25m - Cyber security news

Medical cybersecurity start-up Nova Leah raises €2.25m

Researchers exploit Microsoft Word using embedded video feature - Cyber security news

Researchers exploit Microsoft Word using embedded video feature

EU leaders agree to impose major new sanctions on cybercriminals - Cyber security news

EU leaders agree to impose major new sanctions on cybercriminals

Data science is changing how cybersecurity teams hunt threats - Cyber security news

Data science is changing how cybersecurity teams hunt threats

Next wave of computer chips will have to be ‘secure by construction’ - Cyber security news

Next wave of computer chips will have to be ‘secure by construction’

How do cyber-criminals use credential phishing attacks to steal vital business data? - Cyber security news

How do cyber-criminals use credential phishing attacks to steal vital business data?