Tag Library

data protection

Stories from across the site that focus on data protection.

Impact of BreachForums Shutdown: What It Means for Data Security

Impact of BreachForums Shutdown: What It Means for Data Security

The closure of BreachForums raises questions about data security and online safety.

Mar 17, 2026

Urgent: Wing FTP Server Vulnerability Exploited – What You Need to Know

Urgent: Wing FTP Server Vulnerability Exploited – What You Need to Know

CISA warns of active exploitation of a Wing FTP Server flaw. Learn how to mitigate risks now.

Mar 17, 2026

How Stryker Hackers Wiped Devices Without Malware: What You Need to Know

How Stryker Hackers Wiped Devices Without Malware: What You Need to Know

Explore the implications of the Stryker hackers' approach using legitimate services to wipe devices.

Mar 17, 2026

How Poor Cyber Hygiene Risks UK Businesses

How Poor Cyber Hygiene Risks UK Businesses

UK businesses are vulnerable to cyber attacks due to inadequate management of employee accounts and permissions.

Mar 16, 2026

Critical Security Flaws in Google Looker Studio Exposed

Critical Security Flaws in Google Looker Studio Exposed

Nine vulnerabilities found in Google Looker Studio could allow unauthorized access to user data. Learn what you need to do to protect yourself.

Mar 12, 2026

Why SMBs Must Address Printer Security Risks Now

Why SMBs Must Address Printer Security Risks Now

Explore why small and medium-sized businesses need to prioritize printer security to protect against cyber threats.

Mar 12, 2026

Impact of Stryker's Global Outage: What Users Need to Know

Impact of Stryker's Global Outage: What Users Need to Know

Explore the implications of Stryker's global outage caused by a cyberattack, including its impact on medical services and user safety.

Mar 12, 2026

What You Need to Know About the BlackSanta Malware Attack

What You Need to Know About the BlackSanta Malware Attack

BlackSanta malware specifically targets HR departments, posing significant risks by disabling security measures.

Mar 11, 2026

How 'Poison Pill' Strategies Can Combat Malicious Bots

How 'Poison Pill' Strategies Can Combat Malicious Bots

Exploring the effectiveness of using adversaries' tactics against them in cybersecurity to thwart bot attacks.

Mar 10, 2026

Understanding the Ericsson Data Breach: Implications for Users

Understanding the Ericsson Data Breach: Implications for Users

Ericsson US faces a data breach involving sensitive employee and customer information. Learn about the implications and what users need to know.

Mar 10, 2026

Why Password Security Remains a Major Concern in 2026

Why Password Security Remains a Major Concern in 2026

Despite some improvements, password security practices haven't evolved significantly since 2015, raising concerns for users.

Mar 9, 2026

Understanding the Risks of Insider Threats in Business Security

Understanding the Risks of Insider Threats in Business Security

Insider threats pose a significant risk to businesses, often overlooked compared to external hacking threats. Here's what you need to know.

Mar 6, 2026