
UnitedHealth ransomware attack
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
76 articles
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
On World Password Day, we explain how we protect your sensitive data, and share tips for creating truly strong passwords.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?