![Fujitsu](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/18185740/fujitsu-1500-400x200.webp)
Fujitsu finds malware on company systems, investigates possible data breach
Fujitsu Limited, the largest Japanese IT services provider, has announced that several of the company’s computers have been compromised with malware, leading to a …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13114656/laptop4-400x200.jpg)
Blackwood APT delivers malware by hijacking legitimate software update requests
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood has carried out cyberespionage …
![cybersecurity jobs](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/23132242/cybersecurity_jobs-400x200.jpg)
Cybersecurity layoffs in 2023: What to expect?
The economic downturn predicted for 2023 will lead to layoffs but cybersecurity workers will be least affected, says the latest (ISC)² report. Also, as soon as things get …
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
Cyberstalking tendencies in modern day relationships
One-third of adults who have been in a romantic relationship admit to cyberstalking their current or former partners, a special addendum to the 2021 Norton Cyber Safety …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103407/architecture-1-400x200.jpg)
(ISC)2 and NTT-AT partner to bring cybersecurity training to Japan
(ISC)2 – the world’s largest nonprofit association of certified cybersecurity professionals – announced an expansion of its strategic partnership with NTT Advanced Technology …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege