12 min read
15 different types of cyberattacks
In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
12 min read
In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...
6 min read
In today's rapidly evolving digital landscape, the menace of cyber threats looms larger than ever, with one particularly notorious adversary leading...
2 min read
Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.
4 min read
"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security...
National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...
4 min read
The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...
2 min read
Recently, the attack by the "Darkside” hacker group on the pipeline operator Colonial in the USA has once again brought the topic of IT security into...
5 min read
Among a high-profile wave of cyberattacks in March 2021, tens of thousands of email servers worldwide fell victim due to a vulnerability in the...
2 min read
On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent...
3 min read
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...