Business ❯ Information Technology ❯ Data Security
Recovery Plans Security Breaches Mitigation Strategies Vulnerability Management Threat Intelligence
Investigators report a broad extortion campaign that targeted more than 100 organizations by exploiting a newly patched zero‑day.