Cyberattacks & Breaches

  • The Top 5 Cyberattacks of June 2020

    The Top 5 Cyberattacks of June 2020

    The Top 5 Cyberattacks of June 2020 features fake job offers, a state-sponsored attack, a major university's costly ransomware payout, and more.

    VIEW
  • The Top 5 Cyberattacks of May 2020

    The Top 5 Cyberattacks of May 2020

    The Top 5 Cyberattacks feature a large email breach, a ransomware attack on a plastic surgery studio, a DDoS attack on a major city government, and more.

    VIEW
  • Lessons Learned From COVID-Related Cyberattacks

    Lessons Learned From COVID-Related Cyberattacks

    VIEW
  • The Top 5 Cyberattacks of April 2020

    The Top 5 Cyberattacks of April 2020

    The top cyberattacks of April 2020 featured Zoom meeting issues, leaked credentials from the WHO, and more. Find all the latest info along with key takeaways.

    VIEW
  • Account Takeover 10159:37

    Account Takeover 101

    In this on-demand webinar, Arctic Wolf and Spy Cloud shine a light on how Account Takeovers happen, the criminal tactics used, and how to defend your enterprise from attacks.

    Watch Video
  • Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercrime During a Crisis1:02:55

    Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercrime During a Crisis

    Watch Video
  • The Top Cyberattacks of March 2020

    The Top Cyberattacks of March 2020

    The Top Cyberattacks of March saw drastic changes in the workforce due to COVID 19, along with new threats, and a variety of industries targeted by bad actors.

    VIEW
  • The Importance of Risk Management Solutions in the "Age of the Breach"32:32

    The Importance of Risk Management Solutions in the "Age of the Breach"

    Watch Video
  • 2019 Data Breaches: Lessons Learned55:51

    2019 Data Breaches: Lessons Learned

    Watch Video
  • Ransomware Reality59:19

    Ransomware Reality

    Watch Video
  • NedBank's Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

    NedBank's Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

    As NedBank's data breach showed, if third-party vendors lack proper cybersecurity measures, they can damage the reputation of your organization and do significant damage to your bottom line.

    VIEW
  • The Top Cyberattacks of February 2020

    The Top Cyberattacks of February 2020

    The Top Cyberattacks of February caused massive damage across a variety of industries and government. Learn all about the attacks and find advice on how to protect your organization.

    VIEW
  • The Top 7 Cyberattacks Threatening Your Organization1:04:35

    The Top 7 Cyberattacks Threatening Your Organization

    Watch this on demand webinar for a run through on the top 7 cyberattacks you need to protect your organization against.

    Watch Video
  • The Top 5 Cyberattack Vectors: How to Detect Them Before It's Too Late

    The Top 5 Cyberattack Vectors: How to Detect Them Before It's Too Late

    VIEW
  • The Top 10 Cyberattacks Threatening Your Organization

    VIEW
  • The 8 Most Common Types of Malware and How to Defend Against Them

    The 8 Most Common Types of Malware and How to Defend Against Them

    VIEW
  • The Fascinating Decade in Cybercrime: 2010 to 2020

    The Fascinating Decade in Cybercrime: 2010 to 2020

    VIEW
  • The Top Cyberattacks of January 2020

    The Top Cyberattacks of January 2020

    Cyberattacks hit car manufacturers, a water utility company, and even the government. Learn all about the top attacks of the month.

    VIEW
  • The Top 10 Cyberattacks Threatening Your Organization

    The Top 10 Cyberattacks Threatening Your Organization

    VIEW
  • 7 of the Largest Data Breaches of 2019

    7 of the Largest Data Breaches of 2019

    VIEW
  • loading
    Loading More...