The Olympic Destroyer malware employed a highly sophisticated false flag to throw threat hunters off the scent of its real origin, says Kaspersky Lab.
If approved, it will create a strong precedent to claim damages from breached companies, says High-Tech Bridge.
Its bug bounty program now includes rewards of up to $100 000 for finding vulnerabilities in its products.
With the aim of earning crypto-currency, criminals have started to use mining software in their attacks, says Kaspersky Lab.
The breach employed a DDOS technique that is growing in popularity as it needs no botnet, warns Akamai.
Nearly half (46%) of IT security professionals rarely change their security strategy after experiencing a cyber attack, a CyberArk survey has found.
In November 2017, it was found out that Uber had been breached and the records of 57 million people were stolen, says Encryptech.
The malicious code is used by attackers to create backdoors on vulnerable Web sites allowing them to steal data or plant additional malware.
South African companies see cyber crime as the most disruptive economic crime that will likely be experienced in the next two years, says a PwC survey.
Encryption prevents payroll data from being stolen or copied, and is protected from insider threats as well as malware and ransomware, says Encryptech.
Even the largest enterprises with plenty of money to throw at security solutions have room for improvement and gaps in security, says RiskIQ.