Source: techrepublic.com

Longest DDoS attack since 2015 lasts 329 hours - Cyber security news

Longest DDoS attack since 2015 lasts 329 hours

Malicious URLs outnumbered attachments in emails 3 to 1 last year - Cyber security news

Malicious URLs outnumbered attachments in emails 3 to 1 last year

3 ways state actors target businesses in cyber warfare, and how to protect yourself - Cyber security news

3 ways state actors target businesses in cyber warfare, and how to protect yourself

How to stay safe from Super Bowl-related cybersecurity risks - Cyber security news

How to stay safe from Super Bowl-related cybersecurity risks

Major vulnerability found in Android ES File Explorer app - Cyber security news

Major vulnerability found in Android ES File Explorer app

Hackers impersonate these 10 brands the most in phishing attacks - Cyber security news

Hackers impersonate these 10 brands the most in phishing attacks

Hackers turn to data theft and resale on the Dark Web for higher payouts - Cyber security news

Hackers turn to data theft and resale on the Dark Web for higher payouts

Cyberattacks now cost businesses an average of $1.1M - Cyber security news

Cyberattacks now cost businesses an average of $1.1M

Phishing and spearphishing: A cheat sheet for business professionals - Cyber security news

Phishing and spearphishing: A cheat sheet for business professionals

A year after Spectre and Meltdown, how well do patches work? - Cyber security news

A year after Spectre and Meltdown, how well do patches work?

Why cryptojacking will become an even larger problem in 2019 - Cyber security news

Why cryptojacking will become an even larger problem in 2019

Brute force and dictionary attacks: A cheat sheet - Cyber security news

Brute force and dictionary attacks: A cheat sheet

Capitalinstall malware targets healthcare sector, delivers payload via Microsoft Azure - Cyber security news

Capitalinstall malware targets healthcare sector, delivers payload via Microsoft Azure

Man-in-the-disk attacks: A cheat sheet - Cyber security news

Man-in-the-disk attacks: A cheat sheet

Man-in-the-middle attacks: A cheat sheet - Cyber security news

Man-in-the-middle attacks: A cheat sheet

A free decryption tool is available for Thanatos ransomware victims - Cyber security news

A free decryption tool is available for Thanatos ransomware victims