We have really only seen the first wave of ransomware attacks, says RackWare.
Check Point shares details of flaws that could have affected any player of the popular online battle game.
Businesses are turning to governments for better guidelines on IOT security and clarification on who is responsible for protecting IOT, says Gemalto.
The memory leaks lead to the permanent writing of memory content into different MS Office files, which could help attackers, says Mimecast.
Facebook, Google, Twitter and Liberty were among companies subjected to major data breaches in 2018.
Seacom's CEO outlines four key areas that must be secured.
The crypto gold rush is driven by the use of unlicensed software and content, says Kaspersky Lab.
Researchers at the company found EV chargers supplied by a major vendor carried vulnerabilities that could be exploited by threat actors.
The company was named the Diamond Sponsor for the summit, to be held from 27 to 31 May at the Sandton Convention Centre.
The malware generates revenue through ads related to Bitcoin mining and fake search engines.
Many e-mail clients are built right into operating systems and can facilitate lateral movement for attackers, says XM Cyber.