Cyberattacks & Breaches

  • 2020 Cybersecurity Trends: Insights and Actions

    2020 Cybersecurity Trends: Insights and Actions

    September 29th | 12 pm ET

    VIEW
  • The Top Cyberattacks of August 2020

    The Top Cyberattacks of August 2020

    The top cyberattacks of August feature a hefty ransomware payment for a state college, the FBI helping out Tesla, a cybersecurity training firm falling for a phishing attack, and more.

    VIEW
  • The Top 8 Legal Industry Cyberattacks

    The Top 8 Legal Industry Cyberattacks

    Millions of dollars lost. Hundreds of thousands of people affected. The Top 8 Legal Industry Cyberattacks provides a look at some of the costliest legal attacks yet.

    VIEW
  • The Top Cyberattacks of July 2020

    The Top Cyberattacks of July 2020

    Cybersecurity breaches surged again in July 2020. Learn about hackers demanding millions in ransom from targets like Garmin, Lorien Health Services, Adif, & CWT.

    VIEW
  • The Top 5 Cyberattacks of June 2020

    The Top 5 Cyberattacks of June 2020

    The Top 5 Cyberattacks of June 2020 features fake job offers, a state-sponsored attack, a major university's costly ransomware payout, and more.

    VIEW
  • The Top 5 Cyberattacks of May 2020

    The Top 5 Cyberattacks of May 2020

    The Top 5 Cyberattacks feature a large email breach, a ransomware attack on a plastic surgery studio, a DDoS attack on a major city government, and more.

    VIEW
  • Lessons Learned From COVID-Related Cyberattacks

    Lessons Learned From COVID-Related Cyberattacks

    VIEW
  • The Top 5 Cyberattacks of April 2020

    The Top 5 Cyberattacks of April 2020

    The top cyberattacks of April 2020 featured Zoom meeting issues, leaked credentials from the WHO, and more. Find all the latest info along with key takeaways.

    VIEW
  • Account Takeover 10159:37

    Account Takeover 101

    In this on-demand webinar, Arctic Wolf and Spy Cloud shine a light on how Account Takeovers happen, the criminal tactics used, and how to defend your enterprise from attacks.

    Watch Video
  • Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercrime During a Crisis1:02:55

    Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercrime During a Crisis

    Watch Video
  • The Top Cyberattacks of March 2020

    The Top Cyberattacks of March 2020

    The Top Cyberattacks of March saw drastic changes in the workforce due to COVID 19, along with new threats, and a variety of industries targeted by bad actors.

    VIEW
  • The Importance of Risk Management Solutions in the "Age of the Breach"32:32

    The Importance of Risk Management Solutions in the "Age of the Breach"

    Watch Video
  • 2019 Data Breaches: Lessons Learned55:51

    2019 Data Breaches: Lessons Learned

    Watch Video
  • Ransomware Reality59:19

    Ransomware Reality

    Watch Video
  • NedBank's Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

    NedBank's Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

    As NedBank's data breach showed, if third-party vendors lack proper cybersecurity measures, they can damage the reputation of your organization and do significant damage to your bottom line.

    VIEW
  • The Top Cyberattacks of February 2020

    The Top Cyberattacks of February 2020

    The Top Cyberattacks of February caused massive damage across a variety of industries and government. Learn all about the attacks and find advice on how to protect your organization.

    VIEW
  • The Top 7 Cyberattacks Threatening Your Organization1:04:35

    The Top 7 Cyberattacks Threatening Your Organization

    Watch this on demand webinar for a run through on the top 7 cyberattacks you need to protect your organization against.

    Watch Video
  • The Top 5 Cyberattack Vectors: How to Detect Them Before It's Too Late

    The Top 5 Cyberattack Vectors: How to Detect Them Before It's Too Late

    VIEW
  • The Top 10 Cyberattacks Threatening Your Organization

    VIEW
  • The 8 Most Common Types of Malware and How to Defend Against Them

    The 8 Most Common Types of Malware and How to Defend Against Them

    VIEW
  • loading
    Loading More...