Quantum Safety News Center

Your sources for the latest in quantum safe technologies, zero trust architecture and next-gen cybersecurity for distributed workforces.

Ingram Micro Recovers from Ransomware Attack, Restores Operations

Discover how Ingram Micro is recovering from a ransomware attack, restoring operations, and addressing customer concerns. Stay informed!

By Edward Zhou 3 min read
Read full article

Authorities Dismantle DiskStation Ransomware Targeting NAS Devices

Discover how authorities dismantled the 'Diskstation' ransomware group targeting Synology NAS devices. Learn about the operation and its impact.

By Edward Zhou 3 min read
Read full article

Decline in Ransomware Payouts Amid Rising Cyber Attacks

Explore the rising threat of ransomware attacks and the financial impact on organizations. Learn how cyber insurance can help mitigate risks today!

By Edward Zhou 3 min read
Read full article

Record Losses from Voice Phishing Scams in South Korea

Discover the alarming rise in voice phishing losses in South Korea and learn about evolving scam tactics. Stay informed and protect yourself today!

By Alan V Gutnov 3 min read
Read full article

AI-Enhanced Phishing Scams: South Korea's Record Losses Ahead

Discover the alarming rise of voice phishing in South Korea, fueled by AI technology. Learn how to protect yourself against these sophisticated scams.

By Edward Zhou 3 min read
Read full article

Flaw in Google Gemini Enables AI-Driven Phishing Scams

Discover how Google Gemini vulnerabilities are exploited in phishing attacks. Learn how to protect your Gmail accounts. Stay secure today!

By Edward Zhou 3 min read
Read full article

Advanced BEC Campaign Targets Microsoft 365 with MFA Circumvention

Discover how a sophisticated BEC campaign targets Microsoft 365, exploiting MFA weaknesses. Learn protective measures to enhance your security now!

By Alan V Gutnov 3 min read
Read full article

Bitdefender Dominates AV-Comparatives Business Security Test with 100% Protection

Discover how Bitdefender maintains its leadership in the AV-Comparatives Business Security Test with exceptional protection and minimal false positives. Learn more now!

By Edward Zhou 3 min read
Read full article

DragonForce Claims Belk Data Breach, Lawsuits Allege Poor Protection

Discover the details of the DragonForce hackers' claim on the Belk data breach. Learn how this impacts data security and the ongoing legal actions.

By Alan V Gutnov 2 min read
Read full article