Target Compromised Via Its HVAC Contractor’s Network Credentials
Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals – including their motives, resources and processes – and recommend what enterprises should do to keep their data and computing systems safe in the face of an ever-growing and ever-more-sophisticated threat.
Cyber attackers of all types – financially motivated, nation-state spies and hacktivists – continue to hammer away at their targets en masse, and once in a while, they get caught. In this special compendium of recent Dark Reading coverage, we offer a look at some of the most recent breaches, including how they happened and how they affected the victims.
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business — and its customers and partners — at risk. To keep your own organization out of the news, it’s important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
Other reports from the Attacks and Breaches Tech Center: