Threat Hunters: What do the new cybersecurity specialists do?
43% of companies now carry out threat hunting as part of their cyberrisk prevention strategy, but what is the profile of a professional threat hunter?
Supply Chain Attack Targets ASUS Through Backdoored Update
ASUS users victim to supply chain attack: A compromised security update was pushed out to nearly 1 million users last year using the Asus Live Update tool.
Panda Security renews its Advisory Board with the incorporation of Luis Miguel Gilpérez and Pedro Solbes
The profile of these new members of the Advisory Board reflects Panda’s support for key account, at a time of expansion in the business area.
Glitch Exposes the Passwords of Roughly Half Billion Facebook and Instagram Users
An anonymous source disclosed that the passwords of hundreds of millions of people have been lying around in a searchable non-encrypted text format on the company’s servers for months.
An attack with the new LockerGoga ransomware in Norway
One of the world’s largest producers of aluminium, Norsk Hydro, was the victim of a new ransomware attack called LockerGoga.
A new Windows vulnerability, exploited by cybercriminals
A zero-day vulnerability has been discovered that affects Windows 8 and Windows 10. It seems to have been used by at least two threat actors in real attacks.
How to protect your privacy in a surveillance state
Everything you do online is monitored and recorded. Here’s how you can regain some control of your privacy