Industry News Blogs - Page 54 of 63 - Attivo Networks

Chinese-Originated Hack Potentially Compromised UConn Research and Personal Data

Reading Time: < 1
University of Connecticut’s School of Engineering was the victim of a network intrusion that could have been going on for almost a year and a half. Read More.
Read More

Hackers Deface a Trump Website in Tribute to Jon Stewart

Reading Time: < 1
A Canadian group of activists is taking credit for a digital smackdown of GOP presidential contender Donald Trump. Read More.
Read More

Networking Manufacturer Ubiquiti Lost $46.7M after Falling for Elaborate Impersonation Scam

Reading Time: < 1
Digital bandits faked communications from executives at the firm by studying the company, and then tricked personnel through these communications into initiating unauthorized international wire transfers. Read More.
Read More

OPM Attackers Nabbed Data from American Airlines and Global Travel Booker Sabre

Reading Time: < 1
A crew of Chinese cyberspies connected to the hack of federal personnel records also allegedly infiltrated computers at American Airlines and Sabre Corp., a flight, car and hotel reservation processor. Read More.
Read More

Iranian, Syrian Hackers Hit ‘Gas Gauges’

Reading Time: < 1
Decoydocs posing as gas gauge monitoring systems located in 7 nations hit with DDoS attacks, defacements, and queries from attackers. BLACK HAT USA -- Las Vegas -- Researchers who planted decoydocs posing as gas gauge monitoring systems in the US, Brazil, United Kingdom, Germany, Jordan, ...
Read More

Chinese VPN Service as Attack Platform?

Reading Time: < 1
Hardly a week goes by without a news story about state-sponsored Chinese cyberspies breaking into Fortune 500 companies to steal intellectual property, personal data and other invaluable assets. Read More.
Read More

Hackers target federal employees with phishing emails after OPM breach

Reading Time: < 1
Federal employees are being targeted by multiple phishing campaigns posing as identity-theft prevention services in the latest fallout from the largest government data breach in U.S. history. Read More.
Read More

The art of hacking humans

Reading Time: < 1
The room was so packed, nobody could find a seat. The boisterous audience, undeterred, crowded against the walls and sat down on the floor at every edge of the room to catch the action. Read More.
Read More
cio logo

Why every CIO needs a cybersecurity attorney

Reading Time: < 1
Cybersecurity has long been one of the main issues keeping CIOs awake at night. Now, with the number of high-profile cyberattacks seeming to increase each month, security is haunting IT leaders during the daytime, too. Read More.
Read More

Citing hacking risk, FDA says Hospira pump shouldn’t be used

Reading Time: < 1
The federal government says health care facilities should stop using Hospira's Symbiq medication infusion pump because of its vulnerability to hacking. The Food and Drug Administration said Friday it's the first time it has warned caregivers to stop using a product because of a cybersecurity ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top