Pages
- ABOUT
- CONTACT US
- CYBERSECURITY PUBLICATIONS & NEWS
- CYBERSECURITY RESOURCES
- EVENTS
- HOME
- INCIDENT REPORTING
- INTERNET FRAUD
- ONLINE AWARENESS
- ONLINE TOOLS
- RESOURCES
- SECURITY HEADLINES & NEWS
- SERVICES
- 009A* WEB APPLICATION ASSESSMENT
- 009B* VULNERABILITY ASSESSMENT BASIC
- 009C* VULNERABILITY ASSESSMENT ADVANCED COMPLIANCE SCAN
- 009D* FORENSIC ANALYSIS
- 009E* MANAGED FIREWALL
- 009F* SSLVPN ACCESS
- 009G* IPSEC VPN
- 009H* THREAT ADVICE
- 009I8 PHISHING
- 009J* INCIDENT RESPONSE
- 009K* INCIDENT MANAGEMENT
- 009L* SECURITY CONSULTING
- SITEMAP
- VIDEO TIPS
- WEBSITES
Posts by category
- Category: Cybersecurity Resources
- Category: Events
- Category: Fraud/Scams
- Fake Online Coronavirus Map Installing Malware on Computers
- Spotting Tax Scams to Avoid Being a Victim
- Avoid Being a Victim of Charity Fraud
- IRS Warns of New Email Scam
- Avoiding Online Selling Scams
- What is ransomware?
- Preparing Your Child to Function in a Digital World
- Tax Return Scams
- Safe Cyber Shopping
- Category: Helpful Tips
- Category: Internet Safety
- Category: Malware
- Category: News
- Category: Phishing
- Category: Technical Articles
- Blockchain Technology: Local Government Applications and Challenges
- Intel Insights: How to Secure PowerShell
- Security Primer – Ryuk
- Attackers Inside the Walls: Detecting Malicious Activity
- Security Primer – IcedID
- Security Primer – Ransomware
- Security Primer – TrickBot
- BowTie – A deep learning feedforward neural network for sentiment analysis
- Internet of Things (IoT) Trust Concerns (Draft Document)
Services
Tips
Feed Items
- We are moving!
- FYSA — VMware Critical Vulnerabilities Patched
- Insights from CISA’s red team findings and the evolution of EDR
- DHS: Guidance for AI in critical infrastructure
- Apple Intelligence raises stakes in privacy and security
- FYSA – Adobe Cold Fusion Path Traversal Vulnerability
- Ransomware attack on Rhode Island health system exposes data of hundreds of thousands
- FBI, CISA issue warning for cross Apple-Android texting
- Zero-day exploits underscore rising risks for internet-facing interfaces
- Will arresting the National Public Data threat actor make a difference?
- CISA adds Microsoft SharePoint vulnerability to the KEV Catalog
- Research finds 56% increase in active ransomware groups
- Cyberattack on American Water: A warning to critical infrastructure
- CISA and FBI release secure by design alert on cross-site scripting
- Has BlackCat returned as Cicada3301? Maybe.
- Biden-Harris administration releases roadmap to enhance internet routing
- CISA warns about credential access in FY23 risk & vulnerability assessment
- CISA launches portal to simplify cyber incident reporting
- FYSA – Critical RCE Flaw in GNU-Linux Systems
- Are new gen AI tools putting your business at additional risk?
- Salesforce acquires Own Company
- The rising threat of cyberattacks in the restaurant industry
- DHS awards significant grant to improve tribal cybersecurity
- ONCD releases request for information: Open-source software security
- 3,000 “ghost accounts” on GitHub spreading malware
- Warren Buffett’s warning highlights growing risk of cyber insurance losses
- New CISA guidance for organizations adopting Single Sign-On
- Cybersecurity apprenticeships to come with new Senate bill
- Protecting your data and environment from unknown external risks
- National Public Data breach publishes private data of 2.9B US citizens
- The cyberattack cycle: First comes outage, next comes phishing
- CISA announces its first chief artificial intelligence officer (CAIO)
- Time’s up: Kaspersky is finally leaving the U.S.
- Hacker group FIN7 is selling EDR evasion tools to other cyber criminals
- CISA and FBI warn the public about OS command injection vulnerabilities
- The critical relationship between MDR and red teaming
- Recent CrowdStrike outage: What you should know
- White House mandates stricter cybersecurity for R&D institutions
- New memo reveals Biden’s cybersecurity priorities through fiscal year 2026
- CISA director says banning ransomware payments is off the table
- A proactive cybersecurity policy is not just smart — it’s essential
- Poland spending $760 million on cybersecurity after attack
- New ransomware over browser threat targets uploaded files
- Exploring the 2024 Worldwide Managed Detection and Response Vendor Assessment
- Regulatory harmonization in OT-critical infrastructure faces hurdles
- Why the Christie’s auction house hack is different
- Should there be a total ban on ransomware payments?
- 5 takeaways from the White House cybersecurity workforce discussion
- CISA warns about directory traversal vulnerabilities
- What will a TikTok ban mean for U.S. cybersecurity?
- Version 2 of the National Cybersecurity Strategy and Implementation Plan has been released
- How has Executive Order 14028 affected federal cybersecurity so far?
- Inside the DHS’s AI security guidelines for critical infrastructure
- ONCD releases 2024 Report On The Cybersecurity Posture Of The U.S.
- CISA wants private industry to publicly commit to Secure by Design
- Change Healthcare discloses $22M ransomware payment
- State Department releases International Cyberspace and Digital Policy Strategy
- DHS establishes Artificial Intelligence Safety and Security Board
- White House cements CISA’s role as national coordinator for cybersecurity
- Debate rages over DMCA Section 1201 exemption for generative AI
- CISA Malware Next-Gen Analysis now available to public sector
- Change Healthcare attack expected to exceed $1 billion in costs
- New proposed federal data privacy law suggests big changes
- The major hardware flaw in Apple M-series chips
- DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy
- CISA releases landmark cyber incident reporting proposal
- Recent developments and updates in Biden cyber policy
- Change Healthcare cyberattack causes dire billing crisis
- Can memory-safe programming languages kill 70% of security bugs?
- CISA hit by hackers, key systems taken offline
- DOJ’s crackdown: A brief look at hacker group takedowns
- Will watermarking save the 2024 election from a deepfake debacle?
- What is the Open-Source Software Security Initiative (OS3I)?
- Europe’s Cyber Resilience Act: Redefining open source
- Feds release urgent guidance for U.S. water sector
- What to expect from the new National Cyber Director
- War exclusions and clauses: The evolution of cyber insurance
- Securing critical infrastructure with the carrot and stick
- 650,000 cyber jobs are now vacant: How to tackle the risk
- Will data backups save you from ransomware? Think again
- Should you worry about state-sponsored attacks? Maybe not.
- New report names attack surface management leaders
- The MOVEit breach impact and fallout: How can you respond?
- Lessons learned from the Dallas ransomware attack
- Why Cyber Pros Are Nervous About Quantum Computing Q-Day
- Spot Fake Extortion Attacks Without Wasting Time and Money
- High-Impact Attacks On Critical Infrastructure Climb 140%
- AI Assistance Cuts Alert Triage Times in Half
- Congressman Proposes Act to Improve K-12 Cybersecurity
- Proven Methods to Prevent Human-Based Security Mistakes
- Global Median Dwell Time Drops to Record Low
- Protecting Against Remote Monitoring and Management Phishing
- $10.3 Billion in Cyber Crime Losses Shatters Previous Totals
- HHS Releases Hospital Cyber Resiliency Landscape Analysis
- Zombie APIs are a Top Security Concern as API Attacks Surge 400%
- Google’s Bug Bounty Hits $12 Million: What About the Risks?
- Google’s Bug Bounty Hits $12 Million: What About the Risks?
- Swiss Army Knife Malware Slices Through Systems In so Many Ways
- Will Threat Actors Face Layoffs in 2023?
- How the Rise and Fall of BreachForums Impacts Cybersecurity
- Inflation, Budget Cuts and Small Teams Worry Security Pros
- Insider Hacks Exfiltrate Five Times As Many Records
- Hacking Caused 80% of Healthcare Data Breaches in 2022
- Are Meta and Twitter Making Cybersecurity Less Accessible?
- Why Are a Record Low Number of Ransoms Being Paid?
- Pipedream Malware Can Disrupt or Destroy Industrial Systems
- UK Banks Stay Confident as Financial Cyberattacks Surge
- New White House Cybersecurity Strategy Plots the Road Ahead
- Cyber Insurance Companies Adapt to the Security Crisis
- Cyberattacks Against Gamers Continue Beyond 167% Increase
- Is Cybersecurity Facing its Own Great Resignation?
- Hack-for-Hire Groups May Be the New Face of Cybercrime
- More School Closings Coast-to-Coast Due to Ransomware
- Hackers are Increasingly Targeting Auto Dealers
- LastPass Breaches Cast Doubt on Password Manager Safety
- Good Guys Decrypt Ransomware Targeting Charitable Groups
- Threat Groups Offer $240k Salary to Tech Jobseekers
- Cryptocurrency-Related Crime Boomed in 2022
- Cyberattacks Rise Sharply Against Governments and Schools
- 50 Million Password Heist Shows Info-stealing is on the Rise
- How ChatGPT Can Help Cybersecurity Pros Beat Attacks
- Public Safety Organizations are Unprepared for Cyberattacks
- Ukraine Cyber War Drags On With Stealers, Trojans and More
- Losing the Ransomware War, and the Plan to Fight Back
- Unique Iran-Based Threats Target Defense and Healthcare
- Asia Pacific Faces a Severe Cybersecurity Worker Shortage
- Are Threat Actors Using ChatGPT to Hack Your Network?
- The White House on Quantum Encryption and IoT Labels
- Malware-as-a-Service Flaunts Its Tally of Users and Victims
- New Survey Shows Burnout May Lead to Attrition
- Alleged FBI Database Breach Exposes Agents and InfraGard
- Google Ad Scam Makes Millions Using Fake Adult-Only Sites
- Third-Party Risk Contributes to Healthcare Data Breaches
- Read Carefully: The Dangers of Punycode and Typosquatting
- New Federal Cybersecurity Requirements for Railway Operators
- Ukrainian Threat Actor Unmasked in Connection With Raccoon Malware
- 4 Big Cyber Risks in 2023, and How Best to Prepare for Them
- The DoD Aims for Full Zero Trust Deployment by 2027
- Will the 2.5M Records Breach Impact Student Loan Relief?
- Abuse of Privilege Enabled Long-Term DIB Organization Hack
- Costa Rica State of Emergency Declared After Ransomware Attacks
- Effectively Enforce a Least Privilege Strategy
- How the DNSChanger Shutdown Changed Cybersecurity
- Reporting Healthcare Cyber Incidents Under New CIRCIA Rules
- Ransomware-as-a-Service Transforms Gangs Into Businesses
- Defending Education from Cyber Threat Attackers
- Millions Lost in Minutes — Mitigating Public-Facing Attacks
- How the Mac OS X Trojan Flashback Changed Cybersecurity
- Overcoming Distrust in Information Sharing: What More is There to Do?
- UK Health System Email Accounts Hijacked to Steal Microsoft Logins
- Why Are Cloud Misconfigurations Still a Major Issue?
- How to Effectively Manage Third-Party Supply Chain Risks
- What Hurricane Preparedness Can Teach Us About Ransomware
- LemonDuck Cryptojacking Botnet Targets API Security Gap
- CISA: Industrial Attacks Could Remotely Control Devices
- Ransomware Attackers Target U.S. Colleges and Universities
- Hiring and Retention in the Cybersecurity Workforce Remain Difficult
- Texas A&M University Opens Center for Cybersecurity Innovation
- DOE Invests $12M in Cybersecurity Research for Energy Grid
- Ransomware Attacks on Agriculture Potentially Timed to Critical Seasons
- Congress Wants to Study the Cybersecurity of Satellites
- 40% of Zero Day Exploits From the Last Decade Happened in 2021
- Australia Invests AU$9.9 Billion in Cybersecurity
- Congress Considers New Healthcare Cybersecurity Bill
- 64% of Security Leaders Can’t Stop a Supply Chain-Related Attack
- With Cybersecurity Retention Concerns Rising, How Can You Stay Competitive?
- Only Half of Small Businesses Are Prepared for Cyberattacks
- FIN7 Threat Actors Add Ransomware to Their Arsenal
- Sharkbot Malware Found in Apps Posing as Antivirus Solutions
- Feds Offer $5 Million for Information on North Korean Cyber Threats
- Bulk Email Theft May Point to Russian Espionage
- SEC Proposes New Cybersecurity Rules for Public Companies
- CISA Warns of Russia-Sponsored Threats to Critical Infrastructure
- Cyber Threats Target US Election Officials With Phishing Campaign
- World’s Largest Darknet Market Shut Down, $25 Million in Bitcoin Seized
- Federal Director Warns Against Possible Russian Cyberattacks
- IBM Develops AI-Powered z16 to Help Thwart Quantum Cyber Attacks
- National Cybersecurity Alliance Joins RSA Conference with a Discussion on A Whole Lotta BS (Behavioral Science) About Cybersecurity
- AcidRain Malware Shuts Down Thousands of Modems in Ukraine
- Biden Urges US Businesses to Bolster Cybersecurity Protection
- Biden signs cybercrime tracking bill into law
- Biden Signs Bill To Create Cybercrime Reporting System
- Arrests Made in Relation to LAPSUS$ Cyber Gang
- Criminals are creating fake QR codes to scam unsuspecting people. Here’s how to stay safe.
- Cyber Expert on “Pay By Palm” Technology
- FBI Releases AvosLocker Ransomware Advisory
- Expert: Stop writing down passwords
- 5 reasons to consider a cybersecurity career in 2022
- U.S. State Department unveils new Bureau of Cyberspace and Digital Policy
- Malwarebytes Plans ‘Explosive’ Partner Community Growth in 2022
- Meta, Apple emergency data request scam holds lessons for CISOs
- US Congress Approves Strengthening American Cybersecurity Act
- FCC Says Kaspersky Software Poses National Security Threat
- Russia’s hybrid war with Ukraine: strategy, norms, and alliances
- The Online Security Reset Guide: Keeping you safe from scammers, hackers and digital threats
- Want to avoid a cyberattack? Stop ignoring those pesky software updates.
- The prospect of more Russian cyberattacks seems increasingly likely. What can you do to protect yourself? Quite a lot, it turns out.
- NIST seeks information on updating its Cybersecurity Framework
- Report: Ukrainian Government Prepared to Wipe Servers
- Ransomware attacks are rising, payment security consortium warns
- How To Spot a Scammer and Protect Yourself From Them, According to a Relationship Therapist and Cyber Security Expert
- How QR Codes Made Waves at the 2022 Super Bowl
- 83.4 Million U.S. Smartphone Users Will Scan QR Codes This Year
- Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics
- Coinbase’s Mystery QR Code Super Bowl Ad Is a Security Nightmare
- US SEC Proposes 48-Hour Incident Reporting Requirement
- Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit
- Companies Should Mandate Two-Factor Authentication, Says Head of National Cybersecurity Alliance
- Data Privacy Week – Lisa Plaggemier, National Cyber Security Alliance
- Watch: A conversation on internet safety in the modern digital era
- Lisa Plaggemier: After Pyeongchang 2018 cyberattack, will Beijing 2022 be safe and secure?
- Over 1,200 Phishing Kits Found in the Wild With Ability to Steal 2FA Codes
- The NCA expands annual Data Privacy Day into Data Privacy Week
- Data Privacy Day 2022: Industry Leaders Reflect on the Current State of Data Security
- How a Cyber Criminal Justice System Resolves Disputes
- Samsung’s new Galaxy S22: What to expect
- National Cybersecurity Alliance Announces Program for Data Privacy Week
- Don’t Ditch the Password Yet: Countering a Brute Force Attack
- Sabbath Ransomware Gang Targets Critical Infrastructure, Backups
- Why 2022 Is the Year of the Password Manager
- FBI Email Account Abused to Send Out Warnings of Fake Cyberattacks
- K-12 Cybersecurity Act Signed Into Law
- 2022 Cybersecurity Predictions: Even More Reasonware, But Reason for Optimism
- Security leaders on how to cope with stress of Log4j
- E-Commerce Fraud Up 178% Ahead of Holiday Shopping
- Norton Names Tech Support Phishing Scams Top Threat
- Meta Files Federal Lawsuit Against Phishing Operators
- The discovery of the Log4Shell software vulnerability could not have come at a worse time.
- Ransomware Attackers Have ‘Industry Standards’ Too
- Squid Game Used as Lure for Malware Campaigns, Phishing Attacks
- US, Allies to Tighten Export Controls on Cyber Tools
- HelloKitty Ransomware Group Turns to DDoS Extortion Attacks
- Credential Phishing, Brute Force Attacks Both Increased in H1 2021
- Treasury Crypto Security Sanction Blocks Exchange Favored by Ransomware Actors
- Don’t let grinches steal Christmas! How to stay safe when holiday shopping
- Proposed Bill Would Require Public Disclosure of Ransomware Payments
- US, EU Join Paris Call for Cybersecurity
- Over 10M Android Users Infected by GriftHorse Trojan
- Here’s what we really think about cyber safety
- VP Kamala Harris: US Will Join 80-Nation Cybersecurity Pact
- Phishing-as-a-Service: Research Exposes BulletProofLink Gang
- After 7 million impacted in Robinhood data breach, experts offer some tips for amateur investors
- How to protect your money and info while shopping online
- Robinhood data breach: Here’s what stock traders who use the platform need to know
- Infrastructure Bill Features $1.9 Billion in Cyber Funding
- Live Webinar | ‘Tis the Season…for Fraud
- Fireside Chat | State of Software Security: The Costly Risks of Open Source Code
- BlackMatter Claims to Shut Ops; Experts Suspect Rebranding
- Ransomware Incidents Among Largest Breaches on Federal Tally
- CISA Directs Federal Agencies to Patch Known Vulnerabilities
- FBI Warns of Ransomware Actors Leveraging M&A Data
- Phishing: Attackers Use DocuSign to Send Malicious Links
- Facebook Shuts Down Facial Recognition Feature
- US Treasury Department Says Stablecoins Must Be Regulated
- 7 Trends: How Ransomware Operations Continue to Evolve
- California Clinic Network Cyber Incident Affects 656,000
- Panel Discussion | The Future of Cybersecurity: Is the US Government Finally Getting Serious About Protecting Supply Chains?
- New Cybersecurity Norms for Wireless Device Makers in EU
- Minimize Ransomware Damage by Stopping Lateral Movement
- Live Webinar | The Future of Cybersecurity: Is the US Government Finally Getting Serious About Protecting Supply Chains?
- OnDemand Webinar | Hacking Your Organization: With So Many Controls In Place, Why Are You Still Being Breached?
- Trojan Source: Invisible Vulnerabilities in Most Code
- Changing Employee Mindsets During Digital Transformation
- Reduce Security Risk of Healthcare Legacy Systems, Devices
- CISA Begins Program to Identify Critical Infrastructure
- Celebrities' Data Dumped on Darknet Site After Hack
- India’s National Cybersecurity Strategy Awaiting Approval
- Ransomware Evolves: Affiliates Set to Wield Greater Power
- Key Considerations Before Moving into Production with Microservices
- Live Webinar | The 5 Myths Hindering You From SOC Automation
- Multinational Police Force Arrests 12 Suspected Hackers
- Federal CISO DeRusha Named Deputy National Cyber Director
- Best Practices for People and Enterprise to #StaySafeOnline
- Countries Team Up to Issue Video Teleconference Guidance
- WordPress Plug-In Bugs Put 1 Million-Plus Sites At Risk
- Healthcare System Phishing Breach Affects 209,000
- ISMG Editors: Solving the Ransomware Problem Together
- Keeping the US Dollar on Top as Cryptocurrency Rises
- Ransomware Gangs Are Not Infallible
- Microsoft Launches Cybersecurity Recruitment Campaign
- NRA Reportedly Hit By Russia-Linked Ransomware Attack
- PHI Stolen in Practice Management Firm's Ransomware Attack
- Lazarus Adds Supply Chain Attack to List of Capabilities
- Washington Secretary of State to Head Election Security
- Vendor Partner Responsible for Fullerton Health Data Breach
- Webinar | Hacking Your Organization: With So Many Controls In Place, Why Are You Still Being Breached?
- Voipfone DDoS Attacks Raise Specter of Protection Racket
- US State Department to Create Dedicated Cyber Office
- How to Be Cyber Smart this Cybersecurity Awareness Month
- Live Panel Discussion | Protecting Your Data While Keeping Customers Engaged Online
- Live Panel Discussion | Protecting Your Data While Customers Engage Online
- Why Healthcare Entities Fall Short Managing Security Risk
- Live Panel Discussion | Protect Your Bank and Customers from Evolving Fraud Attacks
- Live Panel Discussion | Protecting Your Customer Data While Enganging Engagement Online
- REvil's Cybercrime Reputation in Tatters - Will It Reboot?
- Triada Trojan Conceals Itself in WhatsApp Mod
- EMEA Cybersecurity Masterclass: Implementing a Control-Centric Approach
- Forget Hacking Back: Just Waste Ransomware Gangs' Time
- Why Hive Attacks Are the Latest Menace to Healthcare Sector
- Live Webinar | Hacking Your Organization: With So Many Controls In Place, Why Are You Still Being Breached?
- US DOJ: Global Darknet Sting Nabs 150 Suspects
- Defending Against Open-Source Supply Chain Attacks
- The Need for Systems Thinking in Cybersecurity
- Memo to Ransomware Victims: Seeking Help May Save You Money
- Case Study: Intrusion Prevention, Detection in the Cloud
- UK's Tesco Supermarket App and Website Disrupted
- Effective Security Defined and Refined
- Report: SolarWinds Hackers Targeting IT Supply Chain
- How to Keep Children Safe From Online Scams, Identity Theft
- It’s October. Are you aware of cybersecurity yet
- Troublemaker CISO: Do You Know What You Should Be Doing?
- DarkSide Transfers $7 Million Worth of Bitcoin
- CoinMarketCap: No Breach Despite 3.1M Email Address Leak
- New Bill Would Secure Government Contractors' Use of AI
- Malicious Packages Disguised as JavaScript Libraries Found
- FIN7 Sets Up Fake Pentesting Company Site to Recruit Talent
- Pandemic Plus Ransomware Is 'Perfect Storm' for Healthcare
- Forrester Report: Key Questions to Ask XDR Vendors
- ISMG Editors’ Panel: Regulators Get Tough on Crypto Firms?
- REvil Revelations: Law Enforcement Behind Disruptions
- Dental Alliance Reports Vendor Breach Affecting 170,000
- Ransomware Warning: Are Businesses Stepping Up?
- US Cracks Down on Sale of Offensive Cybersecurity Tools
- House Passes Bills on Both Supply Chain, Telecom Security
- Ransomware: Average Ransom Payment Stays Steady at $140,000
- Dental Alliance Reports Vendor Breach Affecting 170K
- Live Ransomware Masterclass: Take Your Ransomware Defense to the NIST Level
- MSP Growth Lab Summit: Sell, Scale, and Seize the Cybersecurity Opportunity
- Diversity, Equity and Inclusion Challenges in Cybersecurity
- 4 Bulletproof Hosting Provider Admins Getting Sentenced
- TeamTNT Deploys Malicious Docker Image on Docker Hub
- Hacker in UPMC Data Theft, Fraud Case Gets Maximum Sentences
- CISA Leader Backs 24-Hour Timeline for Incident Reporting
- Ransomware Soap Opera Continues With REvil’s Latest Outage
- New York Tells 2 Cryptocurrency Firms to Cease and Desist
- Sinclair hit by ransomware attack
- NYAG Issues Cease and Desist Letters to 2 Crypto Platforms
- The InFOCUS Podcast: National Cybersecurity Alliance
- More Attempted Cyberattacks on Israeli Healthcare Entities
- Positive Security: Inspiring Behavioral Change at Workplace
- Defending Against Today’s Sophisticated Ransomware Attacks
- Preparing for Ransomware Attacks in the Education Sector
- BlackMatter Ransomware Defense: Just-In-Time Admin Access
- Acer Taiwan and India Hit in 2nd and 3rd Attacks of 2021
- Next-Generation Firewall and IPSs Offer Proactive Protection for Higher Ed Networks
- Authorities See Rise in Ransomware Attacks, Urge Businesses to Prioritize Cybersecurity
- Sinclair TV Stations Targeted in Weekend Ransomware Attack
- Analysis: Top Ransomware Gangs Targeting Healthcare Sector
- Accenture: Ransomware Attack Breached Proprietary Data
- Live Webinar | Understanding Identity Challenges and Opportunities in the Modern Enterprise
- Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk
- Thingiverse Breach: 50,000 3D Printers Could Have Been Hijacked
- Thingiverse Breach: 50,000 Printers Could Have Been Hijacked
- OnDemand | How to Reduce Complexity and Gain Efficiency with SASE
- OnDemand | How Unifying Security Tools Can Streamline Threat Hunting
- Panel Discussion | Identity Security for MSPs: New Tactics for Tackling the Cyber Talent Crunch
- Treasury Dept. to Crypto Companies: Comply with Sanctions
- MirrorBlast Campaign Targets Finance Sector Using Macros
- US Agencies to Water Facilities: You May Be Next Target
- US Agencies to Water Facilities: You May Be Next Target
- Live Webinar | Why Forgetting your Password is Safer than Having One – Best Practices for Banks Adopting Password-less Authentication
- Ransomware Attack on Israeli Medical Center Raises Alarm
- Live Webinar | Lessons Learned From Recent Ransomware Strikes
- ISMG Editors’ Panel: Are Our Systems Too Complex To Secure?
- Missouri Refers Coordinated Bug Disclosure to Prosecutors
- BlackByte: Free Decryptor Released for Ransomware Strain
- Missouri Refers Responsibly Reported Bug to Prosecutors
- Teenage Cybercrime: Giving Young Hackers A Second Chance
- Panel | 2022 IAM/IGA Predictions and Trends: Looking Backwards and Seeing Forward
- Missouri Refers Responsible Bug Report to Prosecutors
- House Lawmakers Announce Bill Targeting Tech Algorithms
- MITRE Launches Centers to Protect Infrastructure and Health
- Live Webinar | Beyond Defense: The New Keys to Cyber Recovery
- To Repel Supply Chain Attacks, Better Incentives Needed
- Flaws In GitHub Actions Bypass Code Review Mechanism
- Osteopathic Professional Group Reports Year-Old Breach
- Cybersecurity Masterclass: Implementing a Control-Centric Approach
- OnDemand | Preventing Ecommerce Fraud while Removing User Friction
- Australia Plans Ransomware Attack Reporting Requirement
- US Convenes Global Ransomware Summit Without Russia
- Fertility Testing Lab Says Ransomware Breach Affects 350,000
- More Generation Zs Are Falling for Online Scams
- Dutch Cyber Cops Tell Stresser/Booter Customers: Cut it Out
- Live Webinar Today | Preventing Ecommerce Fraud while Removing User Friction
- Microsoft Says It Mitigated Largest-Ever DDoS Attack
- 3 Men Charged by US DOJ With Laundering BEC Proceeds
- On Demand Webinar | For Retail : Preventing Application Fraud while Removing User Friction
- Former Executive Accessed PHI of Nearly 38,000 Individuals
- CISA to Access Agencies’ Endpoints, Help Enhance Security
- CISA to Access Agencies' Endpoints, Help Enhance Security
- OnDemand Webinar | Fraud ROI for Ecommerce: Drive More Revenue with Fewer False Positives
- On Demand Webinar | Fraud ROI for Ecommerce: Drive More Revenue with Fewer False Positives
- Ransomware: No Decline in Victims Posted to Data-Leak Sites
- FIN12 Ransomware Attacks Aggressively Targeting Healthcare
- Top 5 things you should be doing to keep your information safe online
- Democratic Lawmakers Urge Agencies to Act on Ransomware
- Trend Micro: Linux Malware Targets Huawei Cloud
- Live Webinar | Preventing Ecommerce Fraud while Removing User Friction
- OnDemand Webinar | Defeat Application Fraud and Improve User Experience
- Google Says Russian APT Targeting Journalists, Politicians
- Netherlands Says Armed Forces May Combat Ransomware Attacks
- Nobelium Makes Russia Leader in Cyberattacks
- Efforts to Incentivize Healthcare Sector Cyber Investments
- Data Breach Reports Rise as Supply Chain Attacks Surge
- Principles of Sustainable Cybersecurity
- Analyzing the Results of the 2021 Cybersecurity Complexity Study, EU & UK
- ISMG Editors’ Panel: First Fatality Linked to Ransomware?
- Apache Issues Another Emergency Patch for Exploited Flaws
- Finding New Ways to Disrupt Ransomware Operations
- Silicon Valley VC Firm Leaked 'Deal Flow' Data
- US DOJ to Fine Contractors for Failure to Report Incidents
- HHS Warns Healthcare Sector About LockBit 2.0 Threats
- Live Webinar | Data Security for Healthcare and the growing adoption of SaaS and Public Cloud
- Live Webinar | A buyers guide: What to consider when assessing a CASB for EMEA Organisations
- LANtenna Attacks Exploit Air-Gapped Networks Via Ethernet
- Live Webinar | A buyers guide: What to consider when assessing a CASB for EMEA Organisations
- Breach of Syniverse Reveals Yet Another Supply Chain Attack
- New Bill Would Require Ransom Disclosure Within 48 Hours
- Live Webinar | Securing Business Growth: The Road to 24/7 Threat Detection and Response
- Patient Safety Concerns Grow Over Medical Gear Security
- Video Game Streamer 'Twitch' Confirms Massive Data Breach
- Apache Fixes Zero-Day Flaw Exploited in the Wild
- Understanding the Real Threat of Ransomware
- Text Messaging Routing Firm Syniverse Reveals 5-Year Breach
- CISA Creates JCDC Agency for U.S. Cyber Defense Operations Plans
- Anonymous Leaks Data from Texas GOP
- Medtronic Insulin Pump Devices Recalled Due to Serious Risks
- #BeCyberSmart: The Rise of Online Scams
- Highlighting the cybersecurity generation gap
- It’s Cybersecurity Awareness Month. Does your business have a viable plan yet?
- FDA: How to Inform Patients About Medical Device Cyber Flaws
- Top US Cyber Officials Say Ransomware Is Here to Stay
- Many workers still aren’t taking basic security steps
- How Ransomware Attackers Hit Virtual Machine Hypervisors
- Live Webinar | A buyers guide: What to consider when assessing a CASB
- Ex-Army Contractor Sentenced to 12 Years for Fraud
- Facebook, Instagram, WhatsApp Suffer Widespread Outage
- Cyberattacks Disable IT Networks at 2 Indiana Hospitals
- Cyberattacks are getting worse, but most people aren’t taking basic security steps
- An Executive Order to Elevate Software Security
- The Pandora Papers’ big leak. Flubot’s scareware. Conti says don’t talk to reporters. US plans to convene 30 nations to talk cybercrime control.
- Interactive Webinar | The Trick to Treating Account Takeover (ATOs)
- STUDY: Millennials and Gen Z Say They are Bigger Victims of Cybercrime
- Webinar | Overcoming the Horrors of Account Takover Attacks (ATO)
- Live Webinar | Ending the Nightmare of Account Takeover Attacks (ATO)
- Ukraine Busts 2 Suspects Tied to Major Ransomware Group
- Cryptocurrency Exchange Bug Reveals 'WannaCry 2.0' Clues
- President Biden Touts Cybersecurity Efforts
- Lawsuit: Hospital's Ransomware Attack Led to Baby's Death
- US Agencies Awarded $311 Million in Cybersecurity, IT Funds
- ISMG Editors’ Panel: Protecting Active Directory from Ransomware Attacks
- Live Webinar | What Brands Get Wrong About Customer Authentication
- National Cyber Security Alliance Kicks Off 18th Annual Cybersecurity Awareness Month
- Crypto Bug Uncovers 'WannaCry 2.0' Clues
- Neiman Marcus Says 4.6M Affected by Data Breach
- California Extends Telehealth Privacy, Security Waivers
- CISA Launches Insider Threat Self-Assessment Tool
- Anonymous Leaks Epik Data - Again
- 2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise
- New Legislation Eyes Both Ransom, Incident Reporting
- Apple Pay-Visa Vulnerability May Enable Payment Fraud
- Live Webinar: A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense
- The Troublemaker CISO: Getting Hacked
- VMware Discloses and Releases Fixes for 19 Bugs in Products
- Microsoft Will Mitigate Brute-Force Bug in Azure AD
- Mental Health Clinic Notifies Patients 6 Months After Hack
- Top Russian Cybersecurity CEO Charged with Treason
- NSA, CISA Release VPN Security Guidance
- Experts Slam Social Media Platforms' Data Policies
- High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds
- Quick And Easy Ways To Insert Security Into Your Mobile Application Development Lifecycle
- Bipartisan US Senate Bill Eyes Cryptomining Oversight
- Live Discussion | 2021 IAM/IGA Predictions and Trends: Looking Backwards and Seeing Forward
- Crypto Exchange Bug Reveals North Korean Monero Laundering
- Cybercrime - The Other Pandemic
- Ransomware, Vendor Breaches Spike on Federal Tally
- Russia-Linked Nobelium Deploying New 'FoggyWeb' Malware
- Ransomware Patch or Perish: Attackers Exploit ColdFusion
- Live Webinar | 3rd Party Risk: 'You've Been Breached - How Can I Trust You?'
- US Commerce Officials Seek Comment on IaaS Executive Order
- Critical Flaw May Affect Millions of Hikvision Devices
- Former DHS Official to Lead HHS' HIPAA Enforcement Agency
- A Global View into DDoS Attack Activity in 1st Half 2021
- REvil Ransomware Group's Latest Victim: Its Own Affiliates
- Lawsuits: Negligence Led to UC San Diego Health Incident
- Applying Critical, Systems and Design Thinking to Security
- ISMG Editors’ Panel: The Rise of Quadruple Extortion Attacks
- CISA Director: Attackers Targeted Port of Houston
- Karma Seeks Free Publicity to Fulfill Ransomware Destiny
- Ransomware Updates: Conti Attacks Rise, New Players Surface
- Lawmakers Share Huawei Concerns with US State Department
- Business Resilience Through ‘Zero Trust’
- Senators Debate Cyber Rules for US Critical Infrastructure
- Fed Chair Says Central Bank Evaluating Digital Currency
- Conti Ransomware Attacks Surging, US Government Warns
- Work from Everywhere, Securely
- Establishing Cybersecurity in the era of Resilience
- Business Resilience through ‘Zero Trust’: Navigating through People, Process and Platforms
- Cloud Security: Report Finds 68% of Malware Delivered From Cloud Apps
- COVID-19's Positive Impact on Cybersecurity
- Russians Prevent Mēris Botnet From Hijacking 45,000 Devices
- Microsoft Analyzes Phishing-as-a-Service Operation
- US DHS, FBI Face Ransomware Questions from Congress
- Facilitating the Secure Exchange of Health Data
- Live Cisco Webinar | Locking down the hybrid workforce with XDR
- Russian-Linked Group Using Secondary Backdoor Against Targets
- Live Webinar | 5 Things You May Not Have Known about Cyber Risk Quantification
- CYBERSECURITY AWARENESS MONTH 2021: AN EXPERT’S ADVOCACY GUIDE
- BlackMatter Knocks Marketron Off the Air
- US Treasury Blacklists Russia-Based Crypto Exchange
- Live Webinar | Micro-segmentation Should Not Be On An Island
- FBI Director Questioned Over Kaseya Decryption Key
- Hacking Incidents Lead to 2 Big Eye Care Provider Breaches
- How to Keep Cybercrime's Foot off the Pedal with ISO/SAE 21434
- Coinbase Contracts With DHS for Blockchain Analytics
- Ransomware Reportedly Hits Iowa Farm Services Cooperative
- Hacker Makes Off With $12 Million in Latest DeFi Breach
- Chinese APT Data-Harvesting Campaign Analyzed
- Post-Attack, Health Agency Notifying 'All Alaskans'
- Mēris: How to Stop the Most Powerful Botnet on Record
- CISA Must Update Critical Infrastructure Protection Plans
- OnDemand | Detect and Defeat Automated Cyber Attacks
- Web Hoster Epik's Breach Exposes 15 Million Email Addresses
- US to Unveil Sanctions on Use of Cryptocurrency for Ransoms
- Illinois Man Convicted of Running DDoS Facilitation Websites
- Mirai Botnet Actively Exploiting OMIGOD Flaw
- HHS OCR's Latest HIPAA Enforcement Action
- Fraudster Gets 12-Year Sentence for AT&T 'Unlocking' Scheme
- US Warns Nation-State Groups May Exploit Flaw in Zoho Tool
- Good News: REvil Ransomware Victims Get Free Decryptor
- Is White House Crackdown on Ransomware Having Any Effect?
- OCC's Hsu Addresses Need for Cryptocurrency Oversight
- FTC: Health App, Device Makers Must Report Breaches
- Is Grief's Threat to Wipe Decryption Key Believable?
- Republican Governors Association Targeted in Exchange Attacks
- Attackers Spread Cobalt Strike Through Backdoor in Common Apps
- Navigating the New Internet Attack Surface
- House Committees Seek to Spend Millions on Cybersecurity
- New York Court Shuts Down Crypto Platform 'Coinseed'
- Lawsuit: Health System Failed to Heed Ransomware Warnings
- Former US Intelligence Officers Spied on US for UAE
- Microsoft Fully Ditches the Password
- Russia Has Taken No Action to Combat Ransomware, FBI Says
- Apple says its security flaw was fixed. Cyber analysts warn zero-click threats will persist.
- Travis CI Flaw Exposed Secrets From Public Repositories
- OnDemand | Cyber Threats Facing Oil, Gas & Chemical Businesses
- Marching Orders: Understanding and Meeting the Biden Administration's New Cybersecurity Standards
- Clinic: EHR Data Too Damaged to Recover Post-Attack
- SEC Chair Pushes for Additional Cryptocurrency Regulations
- Microsoft Patches MSHTML Vulnerability
- Live Webinar | Detect and Defeat Automated Cyber Attacks
- Massachusetts Attorney General Probing T-Mobile Breach
- New York Vaccine Passport App Stored Forged Credentials
- Top Initial Attack Vectors: Passwords, Bugs, Trickery
- BitSight, Mastercard and Tenable Make Acquisitions
- ForcedEntry penetrates Apple’s BlastDoor. Ransomware at Olympus? Fitness tracker data compromised
- Apple Patched iMessage. But Can It Be Made Safer Overall?
- Live Panel | Establishing Zero Trust Security, One Step at a Time
- House Bill Seeks to Insulate CISA Director From Politics
- Live Study Results Webinar: 2021 Cybersecurity Complexity Research Survey
- HHS Warns Health Sector of BlackMatter Attacks
- Bad News: Innovative REvil Ransomware Operation Is Back
- Olympus: 'Potential Cyber Incident' Disrupted EMEA System
- How To Safeguard Schools Against Cyber Attacks this School Year
- Pysa Ransomware Gang Targets Linux
- HHS on Information Blocking Rule Enforcement: Stay Tuned
- Ukrainian Extradited to US Faces Credential Theft Charges
- SolarWinds Attack Spurring Additional Federal Investigations
- Department of Commerce Establishes AI Advisory Committee
- Ransomware Stopper: Mandatory Ransom Payment Disclosure
- MS Warns Users of Flaw in Azure Container Instances
- Transforming an Organization's Security Culture
- ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs
- United Nations Says Attackers Breached Its Systems
- Ransomware: Hot or Not? Here's Attackers' Ideal Target
- The Cost of Cloud Compromise and Shadow IT
- United Nations Says Intruders Breached Its Systems
- Bitcoin Scam Run by Fake Exchange, Report Says
- Groove Promises Maximum Profits for Ransomware Affiliates
- National Cyber Director Sees Ransomware As Continuing Threat
- Cybercrime Money Launderer Handed 11-Year Sentence
- Fake Cryptomining Apps Stole Over $350K From Android Users
- Live C-suite Masterclass | The Seven Perils of Privilege: Solving the PAM Problem
- Pro-China Operatives Push Protests, Pandemic Conspiracies
- 8,000+ Confluence Servers Still Vulnerable to Atlassian Flaw
- White House Pushing Federal Agencies Toward 'Zero Trust'
- Lawsuit: Fertility App Maker Sent Data to Google, Facebook
- DDoS Attack Disrupts New Zealand Banks, Post Office
- Resilience CEO on White House Meeting, Cyber Insurance
- Ransomware: healthcare, utilities, and universities. REvil’s old sites are stirring
- Zero-Day Attacks Exploit MSHTML Flaw in Microsoft Windows
- Account Takeover (ATO) Attacks Are Horrifying: Find Out How to Slay Them
- 2 Data Leaks Reported in Indonesia's COVID-19 Tracking Apps
- Netgear Fixes Critical Flaws Affecting Smart Switches
- SEC Warns of Fraudulent Cryptocurrency Schemes
- How Infusion Pump Security Flaws Can Mess with Drug Dosing
- The Difference Between Espionage and Financial Breaches
- Alleged Trickbot Developer Arrested in South Korea
- ISACA 2021 Report: Top Trends, Improving Cyber Maturity
- Kids & Technology: How to talk to your kids about internet safety
- Howard University cancels online, hybrid classes as it investigates alleged ransomware attack
- Why cyber scare tactics have missed the mark
- Ragnar Locker: 'Talk to Cops or Feds and We Leak Your Data'
- Researcher: Bug Allows COVID-19 Vaccination Status Spoofing
- Aussie Researcher Fakes Digital COVID-19 Vaccination Proof
- Criminals' Wish List: Who's Their Ideal Ransomware Victim?
- Moxa Devices Prone to Vulnerabilities Affecting Railways
- Cisco Patches Critical Authentication Bypass Bug
- Atlassian Vulnerability Being Exploited in the Wild
- Autodesk Says Company Was Targeted by SolarWinds Attackers
- Attackers Are Selling Their Victims’ Internet Bandwidth
- SEC Charges BitConnect on $2 Billion Fraud Scheme
- As Labor Day Nears, Security Teams Watch for Holiday-Timed Hacks
- WhatsApp patches bug. Twitter updates its features to promote “social privacy.” Labor Day threats to data privacy.
- FBI, CISA warn: Hackers won’t take a vacation
- Could Lessons From Plane Hijackings Help Fight Ransomware?
- Conti Ransomware Threat Rising as Group Gains Affiliates
- Facebook's WhatsApp Hit With $266 Million GDPR Fine
- Analysis: The Latest Data Breach Trends
- White House Warns Of Cyberthreats Over Labor Day Weekend
- LockFile Ransomware Using New Techniques to Evade Detection
- FTC Bans SpyFone Company, CEO From Surveillance Business
- 125,000 Coinbase Users Get False Security Alerts
- Live Webinar | Detect and Defeat Automated Cyber Attacks
- Live Webinar | Detect and Defeat Automated Cyber Attacks
- Taliban’s Takeover of Kabul: Biometric Fallout Concerns
- Vendors Issue Security Advisories for OpenSSL Flaws
- Bitcoin ATM Firms Seek to Shape Regulations
- House Debates Breach Notification Measure
- Medical Group: 655,000 Affected by 'Network Outage' Breach
- CISA Warns of Holiday Ransomware Attacks
- 'ProxyToken' Bug Put Microsoft Exchange Email at Risk
- Fighting Fraud With ID Verification
- Attackers Keep Refining Business Email Compromise Schemes
- Ransomware Gangs Using Data Leak Sites to Recruit New Affiliates
- SEC Sanctions 8 Firms for 'Deficient Cybersecurity Procedures'
- Crisis Management: Responding to a Disaster
- Federal Departments Ordered to Improve Logging Capabilities
- IronNet Goes Public by Merging With LGL Systems
- Live Webinar | Speed vs. Risk: Effective Software Security Doesn’t Choose
- Cybersecurity Investment: Trends and Misconceptions
- Wait, Watch, Disrupt: How Police Keep Targeting Cybercrime
- Scammers Impersonate OpenSea Customer Support
- SEC to Monitor Illicit Activity on DeFi Platforms
- Microsoft: Beware Phishing Attacks with Open Redirect Links
- IG: DoD Did Not Properly Secure Access to VIP Records
- Phishing Attack Used Spoofed COVID-19 Vaccination Forms
- Senator Seeks Input on Securing Crypto, Blockchain
- Live Webinar | ANZ's Guide to Data Classification: The Foundation of Cybersecurity Compliance
- FBI Issues Alert on Hive Ransomware
- US Agencies Increasing Use of Facial Recognition Tech
- Azure Database Service Flaw Could Affect Thousands of Firms
- T-Mobile CEO Apologizes for Mega-Breach, Offers Update
- Microsoft Issues Security Advisory on ProxyShell Flaws
- ISMG Editors’ Panel: Crypto Exchange Hacks
- Data Breach Culprits: Phishing and Ransomware Dominate
- Fin8 Using an Updated Backdoor
- Analysis: New White House Security Initiatives
- The Ransomware Files, Episode 1: The School District
- After Ransomware Attack, When Must Patients Be Notified?
- 7 Emerging Ransomware Groups Practicing Double Extortion
- Financial Execs Say Security a Top Cryptocurrency Barrier
- Profile in Leadership: Laura-Lea Berna, BC Transit
- White House Unveils Supply Chain, New Security Initiatives
- Citizen Lab: Bahrain Used Pegasus to Spy on Activists
- Researchers Demonstrate AI Can Be Fooled
- Updated PRISM Backdoor Discovered
- Threat Modeling: Making the Right Moves
- 9 Takeaways: LockBit 2.0 Ransomware Rep 'Tells All'
- White House Tech Meeting: Focus On Critical Infrastructure
- External Threat Hunting: How Fortune 100 Companies are Battling the Malice
- Google Removes Fake Crypto-Mining Apps
- Audit: USAID Needs to Enhance Data Protections
- Hackers Again Setting Sights on Microsoft Exchange Vulnerabilities
- Utilizing Data Opportunities and Risks in Insurance to Protect Customers and Drive Greater Differentiation
- Financial Service versus Fraud – the Battle Continues
- Utilizing Data Opportunities and Risks in Insurance to Protect Customers and Drive Greater Differentiation
- Mozi Botnet Targeting Netgear, Huawei, ZTE Gateways
- Fighting Unemployment Benefits Fraud: Key Steps
- A Unified Look at FinCrime
- Payment Cards Finally Set to Lose Their Stripes
- Misconfigured Microsoft Power Apps Spill Sensitive Data
- External Threat Hunting: How Fortune 100 Compaines are Battling the Malice
- How Fortune 100 Companies Took the Stage and Uniquely Flipped the Script on Threat Actors
- US, Singapore Sign Cybersecurity Agreements
- CISA: Patching ProxyShell Flaws in Exchange Servers Is Urgent
- Healthcare Organizations Mopping Up After Cyberattacks
- How Organizations Can Stay Protected Online
- US State Department Reportedly Sustained Cyber Incident
- Data Breaches Tied to Ransomware: Look Harder
- Andy Jenkinson of CIP: 'Shut the Digital Doors'
- DirtyMoe Botnet Returns With Undetectable Threat Profile
- T-Mobile's Current Data Breach Tally: 54 Million Victims
- T-Mobile's Revised Breach Tally: 54 Million Victims
- Record-Setting DDoS Attack Hits Financial Service Firm
- T-Mobile's Revised Breach Tally: 54 Million Customers
- Cloudflare Thwarts Largest Ever HTTP DDoS Attack
- National Cyber Director Chris Inglis Focusing on Resiliency
- World Bank Launches Global Cybersecurity Fund
- ISMG Editors’ Panel: Fraud Trends
- T-Mobile's Revised Breach Tally: 14 Million Customers
- World Bank Launches Global Cybersecurity Fund
- Ohio Man Admits to Operating Illegal Bitcoin 'Mixer' Service
- Ransomware: LockBit 2.0 Borrows Ryuk and Egregor's Tricks
- Analysis: Disrupting the Cybercrime-as-a-Service Model
- Hacker Steals $97 Million From Crypto Exchange 'Liquid'
- Financial Services and the Zero Trust Journey
- Nigerian Gang Asks for Insider Help to Plant Ransomware
- Health Data Breach Tally Update: Ransomware Persists
- The Cybersecurity 202: There was another massive data breach. People will probably forget it in a week.
- US Census Bureau Criticized for Handling of Breach
- A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation
- Retaining Security Workers: What Works?
- Massachusetts Man Pleads Guilty in SIM Swapping Case
- Amid Surveillance Debate, Cellebrite Stops Serving Bangladesh
- Ransomware Hits Brazilian National Treasury
- Resource Roundup: Level up in cyber, IT and entrepreneurship with these 4 DC-area programs
- National Cyber Security Alliance to launch new resource bank
- Live Webinar | Detect and Defeat Modern Cyber Attacks
- T-Mobile: Attackers Stole 8.6 Million Customers' Details
- Banking Groups Object to Breach Notification Bill Provisions
- Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?
- FireEye, CISA Warn of 'Critical' IoT Device Vulnerability
- NCSA creates cyber career resource library to educate our future infosec workforce
- Pearson Slammed for Breach - Wasn't Just 'Data Exposure'
- 'Respect in Security': A Pledge to Eliminate Harassment
- Researchers Describe New DoS Attack Method
- U.S. Names Ransomware Attacks a Similar Priority to Terrorism
- T-Mobile Probes Attack, Confirms Systems Were Breached
- Memorial Health System in Ohio Latest to be Hit With Attack
- T-Mobile Says Systems Illegally Accessed As Probe Continues
- Memorial Health System in Ohio Latest Entity Hit With Attack
- FFIEC Updates Authentication Guidance
- Colonial Pipeline: Attack Exposed Personal Data
- FINRA Warns Members of Phishing Scheme
- National Cyber Security Alliance launches new cyber initiative
- Access Brokers: Just 10 Vendors List 46% of All Offers
- Microsoft Details Yearlong Office 365 Phishing Campaign
- National Cyber Security Alliance Unveils Cybersecurity Education and Career Resource Library
- Live Discussion | Deep Endpoint threat telemetry is the center of an effective cyber security
- T-Mobile USA Investigates Possible Data Breach
- Microsoft Details Year-Long Office 365 Phishing Campaign
- Ukrainian Police Shutter Allegedly Illegal Crypto Exchanges
- Poly Network Hacker Reportedly Returns Most of Stolen Funds
- Cybercriminals Reportedly Created Blockchain Analytics Tool
- Scripps Health Reports Financial Toll of Ransomware Attack
- Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
- Ongoing Issues With Security, Privacy, Complexity
- ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response
- Assessing AI Security Solutions: Questions to Ask
- Analysis: Self-Driving Tractors at Risk of Being Hacked
- Lawmakers Want Federal Cybersecurity Leaders' Roles Clarified
- Newly Studied ‘Poltergeist Attacks’ Trick Autonomous Vehicles
- 23 Charged in European Email Fraud Scheme
- Cyberspace Solarium Commission Offers Progress Assessment
- How the $1.2 trillion infrastructure bill invests in cyber
- Back to the Future: Notorious AlphaBay Market Reboots
- Accenture Hit By Apparent Ransomware Attack
- NortonLifeLock to Buy Avast for Over $8 Billion
- Synology NAS Devices Targeted by StealthWorker Botnet
- What Can Be Done to Overcome Cybersecurity Staff Shortage?
- OMB Spells Out Agencies' Cybersecurity Timelines
- OMB Spells Out Agencies’ Cybersecurity Timelines
- Microsoft Patches 3 Zero-Day Vulnerabilities
- REvil Decryption Key Posted on Cybercrime Forum
- Poly Network Says $600 Million in Cryptocurrency Stolen
- Senate Passes Infrastructure Bill Boosting Cyber Funding
- Conti Group Takes Advantage of Vulnerable Exchange Servers
- NIST Guidance Focuses on Creating 'Cyber Resiliency'
- 10 Initial Access Broker Trends: Cybercrime Service Evolves
- 2 Plead Guilty in Vast Money-Laundering Scheme
- BlackMatter Group Debuts Linux-Targeting Ransomware
- The Challenge of Remote File Transfer Security: Is Centralisation the Answer?
- Iranian Group Used Android Backdoor
- FTC Warns: SMS Phishing Scam Impersonates State Agencies
- Live Webinar | Data Classification: The Foundation of Cybersecurity Compliance
- Flaws in John Deere Systems Show Agriculture's Cyber Risk
- Hackers Target Critical Infrastructure in Southeast Asia
- Audit Slams FDIC for Inadequate Mobile Device Security
- Countering Cyberthreats: 2 Legislative Proposals Introduced
- Is Darknet Forum Ransomware Chatter Ban Having an Impact?
- Apple's Image Abuse Scanning Worries Privacy Experts
- Ransomware Costs Expected to Reach $265 Billion by 2031
- Cybersecurity Leadership: Risk in OT and IIoT
- ISMG Editors’ Panel: Government Cybersecurity Challenges
- Live Webinar | How to Maximize IT Performance with a Multicloud Monitoring & Investigation Strategy
- Analysis: Oh, the Lies Ransomware Operators Tell
- How to Keep Developer Secrets, Secret
- CISA's Easterly Unveils Joint Cyber Defense Collaborative
- Cybercriminals Are Targeting Your Cloud Apps
- Chinese Cyberthreats: The Impact on National Security
- Secrets and Lies: The Games Ransomware Attackers Play
- Cisco Live Discussion | Endpoint Security Breach Defense: Connecting the Missing Dots, Fast
- Cybersecurity M&A Update: Five Firms Make Moves
- Patching Woes: Most Frequently Exploited CVEs Listed
- Cisco | Endpoint Security Breach Defense: Connecting the Missing Dots, Fast
- Anne Neuberger on Why No Sanctions Issued Against China Yet
- PayPal to Hire Dozens of Cryptocurrency Security Experts
- Microsoft Database Engine Vulnerabilities Patched
- Food Delivery Services Face GDPR Fines Over AI Algorithms
- NSA, CISA Release Guidance on Kubernetes Security
- COVID 19: What Delta Variant Means to Business Recovery
- Cisco Live: Middle East | Transforming IT Security with SASE
- Live Webinar | Shut the Front Door! Eliminating Passwords and Other Ways to Stop Ransomware
- Chinese APT Groups Targeted Asian Telecoms
- Report: 7 Federal Agencies Still Lack Basic Cybersecurity
- Securing industrial networks: the essential IT/OT relationship
- Autonomous Real-Time Patching and Penetration Testing
- Ransomware Actors Set Up a Call Center to Lure Victims
- Words With Friends Breach: Zynga's Case Set for Arbitration
- Global Incident Response: The Rise of Integrity Attacks
- Zoom Agrees to Settle Security Lawsuit for $85 Million
- NSA Reminder: Beware of Public Wi-Fi
- BlackMatter Ransomware Appears to Be Spawn of DarkSide
- FatalRAT Exploits Telegram to Deliver Malicious Links
- Congress Hears Ideas for Boosting Cybersecurity Workforce
- Ransomware Attackers Eying 'Pure Data Leakage Model'
- Live Webinar | Curtailing Ransomware with a Zero Trust Architecture
- SolarWinds Attackers Accessed US Attorneys' Office Emails
- NIST Works to Create AI Risk Management Framework
- Live Webinar | Cloud applications: A Zero Trust approach to security in Healthcare
- Patching Woes: Most Frequently Exploited CVEs Listed
- Live Webinar | Cloud applications: A Zero Trust approach to security in Healthcare
- Researchers Find More Servers Tied to Russian-Linked Attacks
- Patching Woes: CVEs Most Frequently Exploited Listed
- Amazon Hit With $885 Million GDPR Fine
- Cybersecurity's Impact on the Global Economy
- Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
- ISMG Editors’ Panel: Ransomware Update
- Flaw Found in Moodle Online Learning Platform
- Live Webinar | The Role of Risk Quantification in Integrated Risk Management
- ISMG Editors’ Panel: Ransomware Trends
- Preparedness, checklists, leadership buy-in: How to build a rapid IT response
- Wiper Malware Used in Attack Against Iran's Train System
- Cisco Live Webinar: Africa | Transforming IT Security with SASE
- Analysis: Keeping Track of Ransomware Gangs
- Live Webinar | The Kaseya Breach: What Can You Do About a Supply Chain Attack? UK
- Patch Issued for Flaw in Sunhillo SureLine Surveillance App
- Senate Bill Proposes Further Restrictions on Huawei, ZTE
- Second Defendant Sentenced in EHR-Related Fraud Case
- What Can Be Done to Enhance Electrical Grid Security?
- Insurer: Size of Claims Paid for Ransomware Attacks Declines
- 9 Ransomware Enablers - And Tactics for Combating Them
- Israeli Government Visits NSO Group Amid Spyware Claims
- Israeli Government Visits NSO Group Amidst Spyware Claims
- Measuring Success of No More Ransom Project
- Tips on Recruiting, Retaining Cybersecurity Staff
- Kaseya's Unitrends Technology Has Zero-Day Flaws
- Biden Calls for Critical Infrastructure Security Standards
- Waging a War on Cybercrime With Big Data and AI
- Is REvil Ransomware Operation Returning as 'Blackmatter'?
- New Hacking Group Exploits Vulnerabilities in Web Apps
- Congress Urged to Update Federal Laws to Combat Ransomware
- Experts Testify on Pipeline Cybersecurity Measures
- What We Can Learn from Hackers
- M&A Update: Deloitte and Sophos Make Acquisitions
- Cybersecurity and the Tokyo Olympics – Episode 113
- SASE: Building a Migration Strategy
- Pegasus Spyware: World Leaders Demand Israeli Probe
- Kaseya Says It Paid No Ransom to Obtain Universal Decryptor
- 18 Companies to Participate in NIST 'Zero Trust' Project
- AvosLocker Ransomware Gang Recruiting Affiliates, Partners
- Kaseya Says It Did Not Pay Ransom to Obtain Universal Decryptor
- Live Webinar | The Kaseya Breach: What Can You Do About a Supply Chain Attack?
- Attackers Rely on 'Exotic' Languages for Malware Creation
- Hackers Target Kubernetes Using Misconfigured Argo Workflows
- Ransomware: Average Ransom Payment Drops to $137,000
- Australia Says Uber 'Interfered' With Users' Privacy
- IoT Security Dangers Loom as Office Workers Return
- Mercenary Hacking Group Deploys Android Malware
- Tokyo Olympics could be threatened by cyberattack, FBI warns
- HHS Seeking Input on Improving Security Risk Analysis Tool
- Resiliency Is Key to Surviving a CDN Outage
- Congress Focuses on Industrial Control System Security
- US Customs Apps Put Travelers' PII at Risk
- ISMG Editors’ Panel: Examining the Pegasus Project
- Tokyo Olympics Contending with Cyber Threats, FBI Warns of More Coming
- Alert for Ransomware Attack Victims: Here's How to Respond
- Analysis: Implications of the Pegasus Spyware Investigation
- Kaseya Obtains Decryption Tool After REvil Ransomware Hit
- Saudi Aramco Traces Data Leak to Attack on Supplier
- Analysis: The Implications of Spyware Investigation
- Saudi Aramco Says Supplier Leaked Company Data
- Kaseya Obtains Decryptor Key
- Experts Testify on Cyberthreats to Water Treatment Plants
- Hospital Worker Charged in COVID Relief Fraud Case
- Dutch Police Arrest 2 Tied to Phishing Operation
- Chinese APT Group Attacks French Organizations
- Has REvil Disbanded? White House Says It Doesn't Know
- Patch Roundup: Windows, Linux, Oracle, Juniper
- Third Arrest in Connection With 2020 Twitter Hack
- Live Webinar Spain | Cisco Breach Defense: Mitigating the Top 5 Challenges
- Live Webinar | Solving Challenges of Modern Application Development with Java
- Cybereason, Rapid7 and Microsoft Announce Acquisitions
- Senators Introduce Federal Breach Notification Bill
- NIST Publishes 'Critical Software' Security Guidance
- World Leaders Included on Alleged Spyware Targeting List
- Cybereason, Rapid7 and Sysdig Announce Acqusitions
- Incident Response: Why Persistence Is Vital
- Microsoft Announces Takedown of Domains Used for BEC Schemes
- Indictments, Attribution Unlikely to Deter Chinese Hacking, Researchers Say
- Spyware Zero-Day Hits Show Apple Ecosystem's Imperfections
- Can the US Curb China's Cyber Ambitions?
- TSA Issues Cybersecurity Requirements for Pipelines
- Case Study: A REvil Ransom Negotiation
- Leak of Alleged Pegasus Target List Restokes Spyware Debate
- Law Firm Serving Fortune 500 Firms Hit by Ransomware
- Data Analytics: 3 Critical Questions
- Advisory Describes Chinese Attackers' Tactics
- China's Cyberattacks: Sizing Up International Response
- US: Chinese Government Waged Microsoft Exchange Attacks
- Live Webinar | Improve Cloud Threat Detection and Response using the MITRE ATT&CK Framework
- Spyware Exposé Highlights Suspected Apple Zero-Day Flaws
- Leak of 50,000 Contact Details Tied to Spyware Targeting
- US Indicts 4 Chinese Nationals for Lengthy Hacking Campaign
- Android Security: Over 150 Security and Privacy Issues Found on Stalkerware
- US Blacklists 6 Russian Organizations Over Security Concerns
- DOD and DHS Need More Collaboration on Cybersecurity Issues
- Overcoming Cyberthreat Intelligence Sharing Hurdles
- Google to Patch 8 Chrome Flaws, Including a Zero-Day
- Israeli Firm Candiru's Spyware Used to Target Dissidents
- What's Next Step for REvil Ransomware Victims?
- How 'Mespinoza' Ransomware Group Hits Targets
- Live Fireside Chat | Beyond Credit Risk: Onboard Thin-File Customers with Confidence
- ISMG Editors’ Panel: Challenges for New CISA Leader
- Is Cryptocurrency-Mining Malware Due for a Comeback?
- Analysis: Changing Nature of Ransomware Attacks
- Facebook Disrupts Iranian APT Campaign
- US Offering $10 Million Reward for Cyberthreat Information
- Why It's Time to Reassess IAM in Healthcare
- NortonLifeLock in Talks to Buy Antivirus Rival Avast
- A 'First Responder' Approach to Cybersecurity
- Live Webinar | Protecting Yourself From Your Supply Chain: A CISO Panel on Email Security
- SonicWall Urges Patching of Devices to Ward Off Ransomware
- For Sale: 'Full Source Code Dump' of DDoS-Guard Service
- National Cyber Security Alliance Announces Leadership Transition
- National Cyber Security Alliance on trends in automotive
- Educating and Training Future Cybersecurity Pros
- Iranian APT Gang Phishes Middle East Experts
- FCC Finalizes Plan to Rip and Replace Chinese Telecom Gear
- CISA Emergency Directive: Patch 'PrintNightmare' Flaw
- Live Discussion | Breaking the Chain: Hindering Ransomware’s Killchain
- Microsoft Releases Patches for 4 Exploited Zero-Day Flaws
- Is China's 'Cyber Capacity' Really 10 Years Behind the US?
- Live Discussion | Breaking the Chain: Hindering Ransomware’s Killchain
- Constant Ransomware Business Refinements Boosting Profits
- Using XDR to Detect Ransomware, Supply Chain Attacks
- Supply Chain Ransomware Breach Affects 1.2 Million
- Moving Forward With Identity-Centric Security
- Espionage Campaign Using Updated Variant of Bandook Spyware
- REvil's Infrastructure Goes Offline
- Guess Confirms Ransomware Attack and Data Breach
- 2 State Cybersecurity, Data Privacy Laws Enacted
- SolarWinds Issues Patches in Wake of Zero-Day Attacks
- There's a Clear Line From the REvil Ransomware to Russia
- US Senate Approves Jen Easterly As CISA Director
- Live Webinar | Implementing a Zero Trust strategy to protect IP in Manufacturing
- Ransomware Landscape: REvil Is One of Many Operators
- Prosecutors: Insider Trading Tips Sold on Darknet Sites
- Microsoft to Acquire RiskIQ
- Yearlong Phishing Campaign Targets Energy Firms
- Ransomware Landscape: Notorious REvil Is Only One Operator
- Scammers Poured Themselves a Glass and Got to Work on Wine-Themed Phishing Emails in 2020
- Kaseya Says Software Fully Patched After Ransomware Attack
- Kaseya Fixes Remaining VSA Vulnerabilities
- Interpol Calls For New Ransomware Mitigation Strategy
- Year-long Phishing Campaign Targets Energy Firms
- Biden's New Executive Order Looks to Address Data Privacy
- Malspam Campaign Targets Kaseya Victims
- Kaseya Ransomware Hit Casts Wide Net Of Potential Liability
- Government Cybersecurity Summit: A Preview
- The Business of Ransomware: Specialists Help Boost Profits
- ISMG Editors’ Panel: Analysis of Kaseya Attack
- Expert Analysis: The Battle Against Ransomware
- List of Victims of Kaseya Ransomware Attack Grows
- Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete
- Kaseya Announces New Service Restoration Date
- The Cybersecurity 202: The Kaseya attack is a revolution in sophistication for ransomware hackers
- Biden Faces Russian Ransomware Curtailment Challenge
- Kaseya Raced to Patch Before Ransomware Disaster
- FIDO Alliance Update: New Guidelines, Standards Enhancements
- Zero Trust: Two Models for Implementation
- Healthcare Workers Allege Amazon Alexa Violates Privacy
- Gartner Offers Insights on Migrating to SASE
- Kaseya Software Hack Highlights Small Business Security Squeeze
- Kaseya Ransomware Attack: 'This is a Dramatic Escalation'
- Kaseya Ransomware Attack: 'It Could Have Been Much Worse'
- Republican National Committee Says Systems Weren't Breached
- Kroger, British Airways Agree to Settle Data Breach Lawsuits
- Kaseya Update: Security Measures Implemented
- Did Kaseya Wait Too Long to Patch Remote Software Flaw?
- Microsoft Issues New Mitigation Advice on 'PrintNightmare'
- Kaseya Attack: REvil Offers $70 Million 'Universal Decryptor'
- Kaseya: Up to 1,500 Organizations Hit in Ransomware Attack
- Kaseya: Up to 1,500 Businesses Caught in Ransomware Attack
- Kaseya Attack: REvil Offers $70 Million 'Super Decryptor'
- Amateur Critical Infrastructure Attacks Growing in Frequency, Relative Severity
- Kaseya Was Working on Patches Before Ransomware Attack
- Kaseya Ransomware: 'Largest Attack I've Witnessed so Far'
- Biden Orders Investigation of Kaseya Ransomware Attack
- Kaseya is Focus of New Supply Chain Ransomware Attack
- Hades Ransomware Has Targeted 7 Large Companies
- CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices
- Congress Considers Measures to Improve Telecom Security
- REvil's Ransomware Success Formula: Constant Innovation
- Live Webinar | Keeping Up With AML and KYC in an Evolving Financial World
- Live Fireside Chat | The Evolving Role of Endpoint Security: Integrated Breach Defenses Secure Business Transformation
- Google Investigates Ad Injected Into 2FA SMS Messages
- Analysis: Why Ransomware Is No. 1 Cyberthreat
- Malicious Browser Notifications: The New Phishing Attack Not Blocked by Your Current Cyber Defense
- US Tracking Brute-Force Attacks Linked to Russia
- CISA Tool Helps Measure Readiness to Thwart Ransomware
- 700 Million 'Scraped' LinkedIn User Records Offered for Sale
- A Venture Capitalist’s View of Cybersecurity
- Multinational Police Raid Seizes DoubleVPN Servers
- Malware Actors Have Begun Using AutoHotkey Scripts For Attacks
- Capital One Breach Suspect Faces New Criminal Charges
- Live Webinar | An Alert has Fired. Now What?
- HHS OIG: Medicare Should Require Hospital Device Security
- Live Webinar | How Does Your Incident Response Program Stack Up?
- Zyxel Warns of Attacks on Its Firewall, VPN Products
- Live Webinar | Managing the Ongoing Complexity of Multiple State-Level Data Privacy Laws
- White House Will Release Details on Exchange Attacks
- OnDemand | Disrupting Watchlist Screening with Modern Technologies
- Webinar | Disrupting Watchlist Screening with Modern Technologies
- Should Western Digital Emergency-Patch Old NAS Devices?
- Attackers Increasingly Using Cobalt Strike
- Senate Bill Addresses Federal Cyber Workforce Shortage
- Microsoft Edge Vulnerabilities Let Hackers Steal Data
- Hackers Disguise Rootkit as Microsoft Drivers
- Report Urges NASA to Improve Cybersecurity Risk Management
- GAO: HHS Needs to Improve Cybersecurity Info-Sharing Efforts
- Ransomware attacks could crimp industry’s recovery from pandemic, report says
- Babuk Ransomware Mystery Challenge: Who Leaked Builder?
- Mercedes-Benz USA Says 1.6 Million Records Exposed
- 4 Dell Bugs Could Affect 30 Million Users
- Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack
- Data-Wiping Attacks Hit Outdated Western Digital Devices
- Cajee Brothers Deny $3.6 Billion Bitcoin Fraud
- NIST Releases 'Critical Software' Definition for US Agencies
- Group Behind SolarWinds Attack Targeted Microsoft Customers
- Researchers Identify New Malware Loader Variant
- Sizing Up the Security Features Slated for Windows 11
- US Secret Service Releases 'Most Wanted' Cyber Fugitive List
- Binance Says It Helped With Clop Money Laundering Bust
- High-Ranking FIN7 Gang Member Gets 7-Year Prison Term
- High-Ranking FIN7 Gang Member Receives 7-Year Prison Term
- Tulsa: Ransomware Attackers Leaked 18,000 Files
- ISMG Editors’ Panel: Examining Open Source Software Security
- Analysis: CISA's Conclusions on Firewall Missteps
- FBI Seeks Extra Funds to Fight Ransomware, Other Threats
- Repurposed REvil Ransomware Used in Attacks
- Ransomware Attack on Eye Clinic Chain Affects 500,000
- Irish Ransomware Attack Recovery Cost Estimate: $600 Million
- Battling Ongoing COVID-19-Themed Attacks and Scams
- Battling Ongoing COVID-19-Themed Attacks and Scams
- John McAfee Found Dead in Spanish Prison Cell
- Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity
- EU Proposes Joint Cybersecurity Unit
- Medicaid Contractor Data Breach Affected 334,000 Providers
- Australia Considers Mandating Ransom Payment Reporting
- Iranian Police Reportedly Crack Down on Illegal Cryptomining
- US Seizes Domains of Websites Linked to Iran, Iraq
- A 'Digital Vaccine' for Battling Ransomware Epidemic
- Using a Medical Device Software Bill of Materials
- CISA Shifting Einstein Detection System Deeper Into Networks
- CISA: Firewall Rules Could Have Blunted SolarWinds Malware
- The Changing Nature of the Insider Threat
- Live Webinar | Work Anywhere. Secure Everywhere.
- Lawmakers Unveil Cybersecurity Legislation
- N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack
- India Launches Effort to Track, Freeze Cyber Fraud Proceeds
- First American Financial's SEC Breach Settlement: $488,000
- New Buer Malware Loader Spread Through DHL Scam Email
- Fake DarkSide Ransomware Gang Targets Energy, Food Sectors
- Senators Draft a Federal Breach Notification Bill
- Pay Attention to the Fine Print on 'War Exclusions' in Cyber Policies
- NSA Offers Tips on Securing Unified Communication Channels
- Peak DDoS Traffic Up 100%, Researchers Report
- Live Webinar | Accelerating Investigation and Response Times in the SOC
- Russian Convicted of Aiding Kelihos Botnet Operator
- Law Enforcement's Cybercrime Honeypot Maneuvers Paying Off
- ISMG Editors’ Panel: NATO's Cybersecurity Policy and More
- Senate Approves Chris Inglis as National Cyber Director
- Law Enforcement's Cybercrime Honeypot Maneuvers Keep Paying
- Ransomware Roundup: Avaddon Exits; Clop Suspects Arrested
- Standardizing Patient Addresses: Privacy, Security Issues
- Analysis: The Cyber Impact of Biden/Putin Summit Meeting
- India Moves Toward Limiting What Telecom Tech Can Be Used
- India Moves Toward Limiting What Telcom Tech Can Be Used
- Cyberium Domain Targets Tenda Routers in Botnet Campaign
- Cybersecurity Safety Review Board – Kelvin Coleman, NCSA
- Live Webinar | Zero Trusts Given- Harnessing the Value of the Strategy
- Biden Promises Retaliation Unless Putin Stops Cyberattacks
- In Ransomware Battle, Bitcoin May Actually Be an Ally
- Cloud Infrastructure Entitlement Management: Next Generation of Solutions
- Researcher: 1 Billion CVS Health Website Records Exposed
- Biden Warns Putin of Cyber Retaliation
- DHS Preparing More Cybersecurity Requirements for Pipelines
- Behind the Scenes of a BEC Attack
- Forcepoint, Deloitte and Cerberus Sentinel Make Acquisitions
- Ukraine Arrests 6 Clop Ransomware Operation Suspects
- How 'SEO Poisoning' Is Used to Deploy Malware
- Live Webinar | Disrupting Watchlist Screening with Modern Technologies
- Cybersecurity Insurance: Has It's Time Come?
- The National Security Threat of Narcissism
- The Best of Virtual RSA Conference 2021
- CISA: Defibrillator Dashboard Security Flaws Pose Risk
- 'Fear' Likely Drove Avaddon's Exit From Ransomware Fray
- Live Webinar | Passwords & Remote Work: Mitigating the Top 3 Challenges
- Putin Raises Issue of Extradition Agreement
- NATO Endorses Cybersecurity Defense Policy
- Volkswagen, Audi Notify 3.3 Million of Data Breach
- Volkswagen, Audi Notify 3.3 Million People of Data Breach
- Fujifilm Reportedly Refused to Pay Ransom
- Union Benefits Administrator Says Data Deleted in Hack
- Will Ransomware Attacks Push Congress to Enact Regs?
- Avaddon Ransomware Operation Calls It Quits, Releases Keys
- Avaddon Ransomware Operation Call It Quits, Releases Keys
- Social Engineering Scam Asks for Bitcoin Wallet Recovery Codes
- U.K. Plans for Enhanced Cybersecurity Role
- McDonald's Breach Exposes Korean, Taiwanese Customer Data
- House Oversight Committee Probing JBS Ransomware Payment
- Security Firm COO Charged in Attack on Medical Center
- DOJ Shut Down Slilpp Marketplace for Stolen Credentials
- How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?
- What’s Behind Rising Ransomware Costs?
- ISMG Editors' Panel: The FBI's Global Cryptophone Sting
- Ransomware Gang Goes Nuclear, Hitting US Weapons Contractor
- TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud
- Fake Lazarus DDoS Gang Launches New "Attacks"
- Botnet Data Leak: 26 Million Passwords Exposed
- Colonial Pipeline Ransomware Fallout: Congress Grills CEO
- Colonial Pipeline Ransomware Aftermath: Congress Grills CEO
- Biden's Nominees Face Questions Over Cybersecurity Concerns
- Groups Urge Biden, Congress to Bolster Health Sector Cyber
- Protecting Financial Institutions against New Ransomware and Tech Supply-Chain Attacks
- RSA Spins Off Fraud and Risk Business
- Apple AirTags can be used to track you. Here’s how to make that stop
- Ransomware to Riches Story: JBS Pays Criminals $11 Million
- House Probes Specifics of Colonial Ransomware Attack
- Analysis: How Biden Executive Order Mirrors FDA's Cyber Plans
- Microsoft Patches 6 Vulnerabilities Currently Under Attack
- Biden Rescinds Executive Orders Banning TikTok, WeChat
- Joomla Content System Vulnerable to Multiple Flaws
- Chinese APT Group Reportedly Develops Custom Backdoor
- Not So Fastly: Global Outage Highlights Cloud Challenges
- Securing Industrial IoT: It’s All About the Architecture
- Private Equity Firms Acquire ExtraHop in $900 Million Deal
- Surge of Attacks on VMWare Hosts, Threat Intel Firm Says
- APT Group Kimsuky Has New Attack Technique, Researchers Say
- Colonial CEO at Senate Hearing Details Ransomware Attack
- Proposed Settlement in Nebraska Medicine Data Breach Lawsuit
- Profiles in Leadership: Stephenie Southard, CISO, BCU
- CISA Expanding Mandatory Vulnerability Disclosure Program
- NCSC Warns of Surge in Ransomware Attacks Against Schools
- Widespread Internet Outages: Fastly Reports Problem Fixed
- Verizon Breach Report: Ransomware, Phishing and Top Trends
- Encrypted Communications Network 'Anom' Was Sting Operation
- $2.3 Million of Colonial Pipeline Ransom Payment Recovered
- Hospital Pays Ransom in Exchange for Promised Data Destruction
- Siloscape Malware Reportedly Targeting Windows Containers
- Identity Theft: Impact on Victims Is Getting Worse
- US Prosecutors Charge Latvian Woman in Trickbot Gang Case
- Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'
- Hackers Stole $650,000 From Nonprofit and Got Away, Showing Limits to Law Enforcement’s Reach
- Cobalt Gang Members Sentenced by Kazakhstan District Court
- Evil by a Different Name: Crime Gang Rebrands Ransomware
- Fake Microsoft Store and Spotify Ads Lead to Ficker Malware
- EU Adopts New Privacy-Focused Data Sharing Tools
- Is STG Building a New Cybersecurity Powerhouse?
- UK Cyber Security Council to Tackle Education, Standards
- Cox Media Group Affiliates Go Offline
- Where's the Beef? Ransomware Hit Highlights Cyber Problems
- HHS OCR Issues 19th 'Right of Access' Settlement
- Google Finds New Exploit That Alters Chip Memory
- Profiles in Leadership: Mario Demarillas of Exceture
- Live Webinar | A Holistic Approach to Cybersecurity Program Management
- Live Webinar | Ransomware in Focus: Using AI for a Proportionate Response
- ISMG's Editors' Panel: US Election Security Lessons Learned
- White House Urges Businesses: Improve Ransomware Defenses
- Analysis: Ransomware Gang Disrupts Global Meat Production
- Scripps Health Attackers Stole PHI of 147,000 Patients
- Amazon Sidewalk Raises Privacy and Security Concerns
- Supreme Court Votes to Limit Computer Fraud and Abuse Act
- Network Intrusion, Suspected Ransomware Attack at Fujifilm
- Panel Discussion | Evangelising an Enterprises' Approach for the PAM Journey
- FBI Attributes JBS Attack to REvil Ransomware Operation
- FireEye to Separate from Mandiant Solutions
- Researchers Describe Antivirus Flaws
- US Army Apparently Rescinds IoT Device Ban
- Live Webinar | Mitigating the Risks Associated with Remote Work
- Encrypted EncroChat Network: Police Arrest More Suspects
- Uninstall Now: Critical WordPress Plug-In Flaw Exploited
- Uninstall Now: Critical WordPress Plugin Flaw Exploited
- White House Puts Russia on Notice Over JBS Ransomware Hit
- White House Presses Russia on JBS Ransomware
- Are Ransomware Attacks Impeding Criminal Prosecutions?
- EU to Unveil Digital Wallet App
- What's in Biden's Proposed FY 2022 HHS Budget?
- DOJ Seizes 2 Domains Linked to USAID Phishing Campaign
- Sweden Shut Down Infectious Disease Database After Intrusions
- Data Breach Culprits: Phishing and Ransomware Dominate
- Reimagining Digital Forensics
- Siemens Patches Critical Security Flaw in Certain Products
- Meat Processing Grinds to Halt After 'Cybersecurity Attack'
- $7 Million Digital Advertising Scam: Russian Man Convicted
- Leveraging Machine Learning to Fight Money Laundering
- Telegram Messenger Ads for ‘Hacker’ Software Hide Cryptocurrency Theft
- New Ransomware Variant Targets US Hospitality Sector
- Biden Budget Seeks to Invest Billions in US Cybersecurity
- Pulse Connect Secure VPNs Still Under Attack
- FBI: Attackers Continue to Exploit Unpatched Fortinet Flaws
- FBI to Share Compromised Passwords With Have I Been Pwned
- ISMG Editors’ Panel: Cyber Insurance; Ransomware Update
- Live Webinar: Cisco | Cloud-Based Email Security: Best Practices for Securing Office 365
- SolarWinds Attackers Return With Fresh Phishing Campaign
- Analysis: City of Tulsa's Ransomware Response
- Canada Post: Breach Affects 1 Million
- Health Data Breach Tally's 2021 Surge Continues
- DHS Unveils New Cybersecurity Requirements for Pipelines
- Suspected Iranian Group Wages Wiper Attacks on Israel
- Avoiding 'Alert Fatigue'
- Belgium Investigating Attack on Interior Ministry Network
- Eyes Wide Open: Visibility in Digital Risk Protection
- Why Clinical Lab HIPAA Settlement Is Significant
- Federal Agencies Struggling With Supply Chain Security
- Nearly 50,000 IPs Compromised in Kubernetes Clusters
- How the Hydra Darknet Market Broke the $1 Billion Barrier
- Live Webinar | 5 Disruptive New Techniques to Detect a Customer Data Breach
- Live Webinar EMEA | 5 Disruptive New Techniques to Detect a Customer Data Breach
- Live Webinar | The Role of Passwords in the Hybrid Workforce
- Quantum Computing: Assessing the Risks
- Data Breach Response Essentials for the Ransomware Age
- VMware Urges Rapid Patching for Serious vCenter Server Bug
- OnePlus Co-Founder Carl Pei Targeted in Twitter Hack
- UK Insurer Recovering From Ransomware Attack
- Fourth Guilty Plea in UPMC Hacking Incident
- Iran Devises Way to Convert Oil to Bitcoin
- OnDemand | Managing Insider Risk with a Hybrid Workforce
- Cybersecurity Regs for Pipelines Reportedly Coming Soon
- Privacy Rights: GDPR Enforcement Celebrates Third Birthday
- Live Webinar | Modern Security Programs - IT Evolution to Security Revolution
- FRENCH Webinar | Sécuriser le travail à distance: maintenir la visibilité et maximiser l'efficacité
- Live Webinar | Managed Security Services and the Evolving Role of MSPs in 2021: How to Meet Shifting Customer Expectations
- FBI Warns Healthcare Sector of Conti Ransomware Attacks
- Cyber Insurance: Higher Premiums, Limited Coverage
- Should Paying Ransoms to Attackers Be Banned?
- Live Webinar | Securing Remote in EMEA: Maintaining Visibility and Maximizing Efficiency
- StrRAT Masquerades as Ransomware
- Windows Push Notifications Used for Fraud
- Ransomware Hit: Tulsa Promises Recovery, Not Ransom-Paying
- Attackers Allegedly Target Russian Federal Networks
- Cisco Live Webinar | MITRE Engenuity ATT&CK: Using Attack Simulations to Boost Visibility and Control
- Colonial Pipeline CEO to Testify at Congressional Hearing
- LinkedIn Security Warning: Malware Sent via Fake Job Offers
- Insights on Mitigating Ransomware Risks
- ISMG’s Editors’ Panel: Improving Hiring Practices and More
- Ransomware Gangs 'Playing Games' With Victims and Public
- Solving the Data Vulnerability Problem
- Data Risk Governance: The BISO's Perspective
- Defending Entry Points: A New Approach
- RSA Conference 2021 Emphasizes 'Resilience' Theme
- Alaska Health Department Services Affected by Malware Attack
- Russian Sentenced in $1.5 Million Cyber Tax Fraud Scheme
- Attackers Were Inside SolarWinds in January 2019
- Solarium Commission's Recommendations: The Top Priorities
- Researchers Uncover Another DarkSide Ransomware Variant
- New WastedLocker Variant Exploits Internet Explorer Flaws
- Profiles in Leadership: Rebecca Wynn
- Live Webinar | 3 HIPAA Compliant Technologies You Can Implement Today
- Live Webinar: Cisco | Relentless Breach Defense that Solves Your Organisations Top 5 Challenges
- What Would National Data Breach Notification Law Look Like?
- International Student Health Insurer Breached
- Colonial Pipeline Ransomware Attack: CISOs React
- Developing a Culture of Security
- Colonial Pipeline CEO Confirms $4.4 Million Ransom Payment
- Will Crypto Displace the Dollar?
- The Rise of Surveillance States
- What Should a Modern SOC Look Like?
- Watering Hole Attack Targeted Florida Water Utilities
- Who’s in charge here? Colonial Pipeline hack exposes huge holes in U.S. cyber defenses, say experts
- Live Webinar | Considerations for Building Your Cybersecurity Strategy in 2021 and Beyond
- Tracking DarkSide Ransomware Gang's Profits
- Neuberger: Ransomware Requires International Response
- RSA Cryptographers' Panel: SolarWinds, NFTs and More
- FDA: Strong Smartphone Magnets Can Affect Cardiac Devices
- Taking on SOAR: The Challenges and Opportunities
- Driving Healthcare Innovation With a Security Mindset
- Introducing MITRE ATT&CK Defender
- Visible Figures: Bridging the Skills Gap
- Art Coviello: 'It's a Roaring '20s for Technology'
- Michael Daniel on Operational Collaboration
- Irish Healthcare Sector Was Hit by 2 Ransomware Attacks
- 2 Bills Introduced in Wake of Colonial Pipeline Attack
- RSA's CEO: For Maximum Resiliency, Unleash Chaos Monkeys
- How Vulnerable Is Critical Infrastructure?
- Making Zero-Day Flaws Disappear
- RSA's Zulfikar Ramzan: Beyond Digital Transformation
- RSA CEO Rohit Ghai on the New RSA
- Ruby Zefo on Extreme Makeover: Privacy Edition
- Welcome to RSA Conference '2021-and-Only'
- Paying a Ransom: Does It Really Encourage More Attacks?
- Ransomware Attack Leads to IT Shutdown for Irish Hospitals
- DarkSide Ransomware Gang Says It Has Shut Down
- ISMG Editors’ Panel: Analysis of Colonial Pipeline Attack
- Insider Risk Management: The Alternative to Traditional Data Protection is Here!
- Using Attack Simulations to Improve Visibility with Endpoint Security
- How to 'Demystify' Cybersecurity
- Patched Wi-Fi Vulnerabilities Posed Risks to All Users
- Teardown: Inside the Colonial Pipeline Ransomware Attack
- Analysis: Colonial Pipeline Attack
- Why a Lab Launched a Vulnerability Disclosure Program
- Biden's Cybersecurity Executive Order: 4 Key Takeaways
- Biden: Russian Government Not Behind Colonial Pipeline Attack
- Colonial Pipeline Restarts Operations Following Attack
- Colonial Pipeline Attack: 'We're Simply Unprepared'
- Biden Signs Sweeping Executive Order on Cybersecurity
- Colonial Restarts Operations Following Ransomware Attack
- Colonial Pipeline Attack Leads to Calls for Cyber Regs
- Babuk Ransomware Gang Posts More DC Metro Police Data
- APT Group Using Backdoor for Espionage
- Rise of DarkSide: Ransomware Victims Have Been Surging
- Microsoft Patches 4 More Exchange Flaws
- Colonial Pipeline Attack: “All Monsters Are Human”
- Assessing Whether a Nation-State Had a Role in Pipeline Attack
- Groups Call for Alignment of HIPAA Privacy Rule, Other Regs
- CISA Awaits Technical Details on Colonial Pipeline Attack
- Alerts: Avaddon Ransomware Attacks Increasing
- DarkSide's Pipeline Ransomware Hit: Strictly Business?
- FTC Nixes Cybersecurity as Point Against 'Right to Repair'
- Colonial Pipeline: “A Global Day of Reckoning”
- Tulsa City Officials Report Ransomware Attack
- More Healthcare Disruptions Tied to Vendor Incidents
- Pipeline Attack: 'Time for a Disproportionate Response'
- FBI: DarkSide Ransomware Used in Colonial Pipeline Attack
- To Improve Higher Ed Data Security, Address These Risks in Research Projects
- Significant Ramifications
- Malspam Campaign Used Hancitor to Download Cuba Ransomware
- Colonial Pipeline Starts Recovery from Ransomware
- Colonial Pipeline Confirms Ransomware Causing Disruptions
- Colonial Pipeline: Cybersecurity Attack Causes Disruptions
- US and UK Issue Joint Alert on Russian Cyber Activity
- Malspam Campaign Uses Hancitor to Download Cuba Ransomware
- Live Webinar | When Zero Trust is the Best Trust
- Live Webinar | Controlling the Current Cybersecurity Shift
- How Patched Android Chip Flaw Could Have Enabled Spying
- 'Panda Stealer' Targets Cryptocurrency Wallets
- The CISO Insider Scoop: The State of Threat Hunting and Growing Importance of Analysts
- The Ponemon Study for CISOs: Understanding the Current Threat Hunting Evolution
- Threat Hunting Combat: The State of Analyst Evolution
- CISA Alert Describes FiveHands Ransomware Threat
- DNS Flaw Can Be Exploited for DDoS Attacks
- Hybrid Work Means SASE: Rethinking Traditional Network and Security Architecture
- Why Visibility Is Critical for Reducing Endpoint Security Complexity
- ISMG Editors Discuss Cryptocurrency Regulations and More
- Can Evidence Collected by Cellebrite's Tools Be Trusted?
- US Physics Laboratory Exposed Documents, Credentials
- Newly Patched Peloton API Flaws Exposed Users' Private Data
- Intel, AMD Dispute Findings on Chip Vulnerabilities
- 'Hack the Pentagon' Program Expands
- Mitigating the Risks of Malicious OAuth Apps
- Exim Patches 21 Flaws in Message Transfer Agent
- DHS Secretary: Small Businesses Hard-Hit by Ransomware
- Why We Still Need World Password Day
- SmileDirectClub: Attack Taking Big Bite Out of Revenue
- Securing Your Building Management System
- 3 Bills Focus on Enhancing Electrical Grid Cybersecurity
- DDoS Attack Knocks Belgian Websites Offline
- Live Webinar | Changing the Entire Paradigm to Cybersecurity
- Personal Information Theft: Threat Actors Lurking in Car Insurance Quotes
- Ransomware Hits Australian Telecom Provider Telstra’s Partner
- PHP Composer Flaw That Could Affect Millions of Sites Patched
- Live Webinar: 2021 Australia Encryption Trends Study
- Millions of Dell Devices Vulnerable to Update Driver Flaw
- NIST Seeks Input on HIPAA Security Rule Guidance Update
- Iran's Military Reportedly Backs Ransomware Campaign
- Live Webinar | Accelerate Threat Detection Across AWS Cloud & Containers
- IT Modernization Grants Will Prioritize Cybersecurity
- Security Incident Leads Scripps Health to Postpone Care
- Buer Dropper Malware Updated Using Rust
- Pulse Secure VPN Zero-Day Flaw Patched
- Attackers' Dwell Time Plummets as Ransomware Hits Continue
- Chinese Group Apparently Targeted Russian Defense Contractor
- NSA Offers OT Security Guidance in Wake of SolarWinds Attack
- Vulnerability Management: Essential Components
- Live Webinar | Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products
- NSA: OT Security Guidance in Wake of SolarWinds Attack
- Ransomware Gang Exploits SonicWall Zero-Day Flaw
- GitHub Leaks: Lessons Learned
- CISA: 5 Agencies Using Pulse Secure VPNs Possibly Breached
- Babuk to Close Ransomware Operation After DC Police Attack
- ISMG Editors’ Panel: Cyber Extortion and More
- Google Sued, Lawsuit Claims COVID-19 Contact Tracing Tool Exposes Data
- Mamba Ransomware Weaponizing DiskCryptor Software, FBI Warns
- Analysis: 'Cybersecurity Call to Arms'
- Protect the Brand: Online Fraud and Cryptocurrency Scams
- Experian API Flaw Raises Questions
- Google COVID-19 Contact-Tracing Tool Exposes Data: Lawsuit
- Fighting Ransomware: A Call for Cryptocurrency Regulation
- Live Webinar EMEA | Protect ALL of Your Applications: A Low-Code Approach
- Live Webinar | Protect ALL of Your Applications: A Low-Code Approach
- ISC(2): Only 13% of Cybersec Pros Had a Cyber Education
- Chinese Cyberespionage Campaign Used Another Backdoor
- Civilian Cyber Reserve Program Proposed
- Touhill Takes Charge at Carnegie Mellon SEI’s CERT
- SPRING CLEAN YOUR DIGITAL FILES
- 'Ghostwriter' Disinformation Campaign Targets NATO Allies
- Case Study: Tackling CIAM Challenges During the Pandemic
- FluBot Spyware Spreads Across Europe
- Tips on Enhancing Supply Chain Security
- Cybersecurity Leadership: It’s About Cloud Security
- QBot Malware Spotted Using Windows Defender Antivirus Lure
- Thoma Bravo to Buy Proofpoint for $12.3 Billion
- Live Webinar | The Essential SASE Toolkit for Preventing the Next Breach
- Lawmakers Seek to Expand CISA's Role
- Cybersecurity Community Remembers Researcher Dan Kaminsky
- DC Metropolitan Police Hit With Cyberattack
- Cyber Extortion Thriving Thanks to Accellion FTA Hits
- COVID-19: Is the End in Sight?
- FBI Shares Email Addresses to Speed Emotet Cleanup
- Live Webinar | Why Effective Digital Banking Security Doesn’t Require Machine Learning Technology
- Attack on Radiation Systems Vendor Affects Cancer Treatment
- Click Studios Hacked, Exposing Users' Passwords
- FBI, CISA Warn of Ongoing Russian Cyberthreats
- Emotet Malware Automatically Uninstalled
- US Agencies Warn of Ongoing Russian Cyberthreats
- Florida Public Defender Describes Malware Attack's Impact
- Cryptomining Campaign Leverages Exchange Server Flaws
- Yes, It’s a $3 Million Ransomware Defense Warranty
- Why Every Business Should Train Employees to Spot Phishing Emails
- Cybersecurity Call to Arms Issued by British Spy Chief
- Hog Ransomware to Victims: ‘Join Our Discord Server to Get Your Files Decrypted’
- Facebook Disrupts Palestinian APT Activities
- Cryptomining Campaign Leverages MS Exchange Server Flaw
- Live Webinar | The True Human Impact of Financial Crime
- Rapid7 Acquires Open-Source Community Project Velociraptor
- QNAP Systems' Appliance Users Hit by Ransomware
- Analysts Uncover More Servers Used in SolarWinds Attack
- Smaller Can Be Better: Where SMBs Excel at Security
- Supernova Attack Leveraged SolarWinds, Pulse Secure
- ISMG Editors’ Panel: Securing Cryptocurrencies and More
- Turkish Police Probe Thodex Cryptocurrency Exchange
- Analysis: REvil’s $50 Million Extortion Effort
- Ransomware Attacks on Schools: The Latest Developments
- DOJ Launches Task Force to Battle Ransomware Threat
- Signal Founder Says Cellebrite's Forensics Tools Flawed
- New Fido Protocol Simplifies IoT Device Onboarding
- Joker Malware Targets More Android Devices
- Live Webinar | Solving The Cloud Identity Challenge
- Live Webinar | The Keys to Driving Accountability for AppSec Risk
- CISA Orders Agencies to Mitigate Pulse Secure VPN Risks
- Second Medical Researcher Sentenced in Hospital IP Theft Case
- Google Blocks Remote Access Trojan Targeting Android
- EU Unveils Proposed Strict AI Regulation
- Certificate Lifecycle Management Just Got More Strategic
- Mitigating Risks as Ransomware Tactics Change
- SonicWall Patches 3 Zero-Day Flaws
- REvil Ransomware Gang Threatens Stolen Apple Blueprint Leak
- Live Webinar | Are you SASE Ready? 5 Steps for Building Your SASE Roadmap
- Nation-State Actor Linked to Pulse Secure Attacks
- 100-Day Plan to Enhance Electrical Grid Security Unveiled
- XCSSET Malware Can Adapt to Target More Macs
- Telehealth: Safeguarding Patient Data
- Did Huawei Eavesdrop on KPN Mobile Network?
- Identity Management at the Core of Recent M&A Activity
- Geico Says Driver's License Numbers Stolen From Website
- SolarWinds puts national cybersecurity strategy on display
- Payment Card Theft Ring Tech Leader Gets 10-Year Sentence
- White House 'Stands Down' SolarWinds, Exchange Response Groups
- What Are the Reasons Behind Health Data Breach Surge?
- Live Webinar | Cloud-Based Email Security: Best Practices for Securing Office 365
- PR Campaign: Babuk Ransomware Gang Claims Decryptor Repaired
- Live Webinar | Deciphering the Enigma that is AppSec Risk
- Live Webinar | Deciphering the Enigma that is AppSec Risk
- Payment Card Theft Ring Tech Leader Sentenced to 10 Years
- AppSec Risk: You Can’t Manage What You Can’t Measure
- AppSec Risk: You Can’t Manage What You Can’t Measure
- ATM Attacks: Terminal Fraud Dives in Europe During Pandemic
- Attackers Continue to Target UK Universities
- How to Prevent Wire Transfer Fraud
- A Holistic Approach to Cybersecurity and Compliance
- Live Webinar | Empowering Financial Services with a Secure Data Path From Endpoint to Cloud
- Attack on Codecov Affects Customers
- US Pulls Back Curtain on Russian Cyber Operations
- Ireland’s Privacy Watchdog Launches GDPR Probe of Facebook
- Going Beyond HIPAA to Protect Health Data Privacy
- ISMG Editors’ Panel: The Facebook Breach and More
- Unscripted: 3 Security Leaders Dissect Today's Top Trends
- Does FBI Exchange Remediation Action Set a Precedent?
- Live Webinar | Software Security: Prescriptive vs. Descriptive
- Bank Groups Object to Proposed Breach Notification Regulation
- Live Webinar | 5 Disruptive New Techniques to Detect a Customer Data Breach
- Live Webinar EMEA | 5 Disruptive New Techniques to Detect a Customer Data Breach
- What Solar Winds Can Teach Us About Third-party Risk
- US Sanctions Russia Over SolarWinds Attack, Election Meddling
- The Top 5 Reasons Hackers Might Target Your Small Business
- Lazarus E-Commerce Attackers Also Targeted Cryptocurrency
- Trickbot: Attackers Using Traffic Violation Scam to Spread Malware
- Phishing Campaign Targeting COVID Vaccine 'Cold Chain' Expands
- Senators Push for Changes in Wake of SolarWinds Attack
- AppSec Risk: You Can’t Manage What You Can’t Measure
- Sweden: Russians Behind Sports Confederation Hack
- Defining Synthetic ID Fraud: How It Helps With Mitigation
- How Fraudsters Nearly Stole $17.5 Million via PPE Fraud
- FBI Removing Web Shells From Infected Exchange Servers
- State of the Marketplace: A Conversation With Dave DeWalt
- Beyond Identity Integration With Auth0 Enables Completely Passwordless Authentication
- On first-ever Identity Management Day, experts detail steps to a better IAM program
- 6 Significant Cybersecurity Implications in 2021
- Microsoft Patches 4 Additional Exchange Flaws
- Intelligence Report: 4 Nations Pose Serious Cyberthreat to US
- Former DHS Leader Shares Details on SolarWinds Attack
- Millions of Devices Potentially Vulnerable to DNS Flaws
- Over Half of Malware Delivered via Cloud Applications
- Initial Access Brokers: Credential Glut Weakening Prices?
- Cyber Daily: Biden Administration Announces National Cyber, CISA Director Nominations
- Modern Bank Heists: Attackers Go Beyond Account Takeover
- A Tale of 3 Data 'Leaks': Clubhouse, LinkedIn, Facebook
- Texas Man Charged With Planning to Bomb AWS Data Center
- HHS Information Security Program Still 'Not Effective'
- Iranian Nuclear Site Shut Down by Apparent Cyberattack
- Facebook Tries to 'Scrape' Its Way Through Another Breach
- NSA Veterans Nominated for Top Cyber Posts
- Microsoft to Buy Nuance Communications for $19.7 Billion
- Why Is Mastercard Working on Digital ID Assurance?
- Biden Nominates Former NSA Officials for Top Cybersecurity Roles
- Biden Seeks to Boost CISA's Budget by $110 Million
- Cofense and StrikeForce Announce Acquisitions
- Kentucky Unemployment Insurance Site Shuttered After Attack
- FDA's Kevin Fu on Threat Modeling for Medical Devices
- Implementing Cybersecurity Best Practices
- Fraudsters Flooding Collaboration Tools With Malware
- Lazarus Group Targets Freight Logistics Firm
- Death to 'Fluffy': Please Stop With the Pet Name Passwords
- Visa Describes New Skimming Attack Tactics
- US Blacklists 7 Chinese Supercomputer Entities
- Weekly Roundup: Biden’s Cybersecurity Proposals and More
- IRS and COVID vaccine email scams proliferating this tax season
- Crisis Communications: How to Handle Breach Response
- New Regs Aim to Improve Patient Records Access, Sharing
- 600,000 Payment Cards Stolen From Swarmshop Darknet Market
- Post-Ransomware Response: Victim Says 'Do the Right Thing'
- Krebs: States Need a Cyber Funding Boost
- Ransomware Gang Exploits Old Fortinet VPN Flaw
- Attackers Using Malicious Doc Builder Called 'EtterSilent'
- In Wake of Breaches, Accellion Faces at Least 14 Lawsuits
- Why Didn't Government Detect SolarWinds Attack?
- An Alternative Approach to Cryptocurrency Security
- Attackers Target Unpatched SAP Applications
- Malware Attack: States Work to Restart Vehicle Emissions Tests
- Ziggy Ransomware Gang Offers Victims Ransom Refunds
- OnDemand Webinar | Measuring Risk in Self-Service: Data Analysis on Real IVR Traffic
- More Accellion Health Data Breaches Revealed
- Senators Raise Security Concerns Over Selling Personal Data
- Crypto Malware ‘AppleJeus’ Opens Cryptocurrency Wallets to Thieves
- IG: Cybersecurity Weaknesses Persist in US Energy Dept.
- EMEA OnDemand | Mitigating Remote: Maintaining Visibility and Maximizing Efficiency
- Stolen Cards, Reportedly From Cardpool.com, Sold on Darknet
- Africa OnDemand | Mitigating Remote: Maintaining Visibility and Maximizing Efficiency
- Evolution of Endpoint Security
- Ransomware Cleanup Costs Scottish Agency $1.1 Million
- Ariel Weintraub Takes Charge of Cybersecurity at MassMutual
- Facebook Data Exposure: Lessons to Learn
- Healthcare Phishing Incidents Lead to Big Breaches
- Capital One Warns of More Data Leaked in 2019 Breach
- Ubiquiti's Breach Notification: The 'No Evidence' Hedge
- 533 Million Facebook Account Records Posted to Forum
- Live Webinar: Understanding the AppSec Challenges and Opportunities: The Way Forward
- FBI and CISA: APT Groups Targeting Government Agencies
- Vendor Breach Involved PHI Exposure on GitHub
- The Case for Central Bank Digital Currencies
- Agency Issues 2nd Alert for Instant Quote Website Schemes
- deutsche Sprache | Cloud-Based Email Security: Best Practices for Securing Office 365
- Kansas Man Faces Federal Charges Over Water Treatment Hack
- Synthetic Identity Fraud: How to Define and Detect
- North Korean Group Targets Security Researchers - Again
- Live Webinar | How To Build Trust And Maintain It... In A Zero Trust World
- Non-Fungible Tokens: Of Course They're Attracting Scammers
- Ubiquiti Acknowledges Extortion Attempt
- Leaker Dismisses MobiKwik's Not-So-Nimble Breach Denial
- Analysis: Fat Face's Awkward Breach Notification
- Weekly Wrap: Accellion FTA Breaches and More
- CISA Orders Agencies to Recheck for Exchange Compromises
- DeepDotWeb Portal Administrator Pleads Guilty
- VMware Patches 2 Flaws in vRealize Operations
- UK Cyber Security Council Hopes to 'Close the Skills Gap'
- CompuCom Expects $28 Million Loss From Cyber Incident
- Biden's Infrastructure Plan: 3 Cybersecurity Provisions
- Iran-Linked Phishing Campaign Targeted Medical Researchers
- Buying Breached Data: When Is It Ethical?
- As SolarWinds Announces More Patches, Analysts Offer Advice
- REvil Ransomware Gang Tells All About Alliances, Revenue
- Lengua española | Cloud-Based Email Security: Best Practices for Securing Office 365
- NIST Drafts Election Security Guidance
- Check Point: 50,000 Attempted Ransomware Attacks Target Exchange
- Fake 'System Update' App Targets Android Users
- Accellion Holdouts Get Legacy File-Transfer Appliance Blues
- HHS Issues Another HIPAA 'Right of Access' Settlement
- Is Your Security Stack Ready for the Modern Cloud?
- GAO Pushes for Speeding Up Cybersecurity Enhancements
- Hades Ransomware Gang Linked to an Exchange Attack
- deutsche Sprache | Securing Remote Workers in DACH: Using SASE to Maintain Visibility and Maximize Efficiency
- Cryptographic Keys: The Horseshoe Nail of Cyber Security
- Ransomware: Home Health Firm Reports 2nd Cloud Vendor Incident
- The Looming Threat of Broken Cryptography
- OnDemand | Spending Your Next Cybersecurity £ (Hint: It's Not on Prepping for Quantum Computing)
- Australian TV Channel Disrupted; Ransomware Suspected
- Attacker Updates PHP Source Code to Include Backdoor
- Live Webinar | Raising Your Security Game as a Managed Service Provider
- German Parliament Sustains Another Attack
- How Old Breaches Fuel New Identity Crimes
- Senators Raise Concerns About Energy Dept. Cybersecurity
- Live Webinar: The Role of Modern Identity Governance & Administration to a Zero-Trust Strategy
- COVID-19-Related Fraud: 474 Charged So Far
- Applying CIAM Principles to Employee Authentication
- OpenSSL Fixes Flaws That Could Lead to Server Takedowns
- ISMG Editors' Panel: Hot Cybersecurity Issues
- Retailer Fat Face Pays $2 Million Ransom to Conti Gang
- Microsoft: Exchange Ransomware Activity 'Limited' So Far
- FBI Issues Alert on Mamba Ransomware
- ISMG Panel Discussion: Hot Cybersecurity Issues
- Fat Face's 'Strictly Private' Data Breach Notification
- Panel Discussion: Cybersecurity Week in Review
- Analysis: Takeaways From Ransomware Gang Interviews
- Live Webinar | How Security Leaders Can Increase Coverage of Insider Threats
- Live Webinar | How Security Leaders Can Increase Coverage of Insider Threats
- Hades Ransomware Targets 3 US Companies
- SolarWinds Attack Illustrates Evolving Russian Cyber Tactics
- How cybercriminals exploit COVID-19, and how to protect against them
- Ransomware-Wielding Gangs Love to Phish With Trojan Loaders
- HHS Issues 17th HIPAA 'Right of Access' Settlement
- EMEA Webinar | Cloud-Based Email Security: Best Practices for Securing Office 365
- Ransom Paid Just Before Netwalker Gang Disrupted
- Insurer CNA Disconnects Systems After 'Cybersecurity Attack'
- Phishing Campaign Used Fake Office 365 Update Messages
- Phishing Attack Exposes Sensitive Data at California Agency
- EU Council Adopts New Cybersecurity Strategy
- REvil Ransomware Can Now Reboot Infected Devices
- Gartner on Enterprise IoT: Segment and Isolate Everything
- 'Black Kingdom' Ransomware Hits Unpatched Exchange Servers
- IoT Vendor Sierra Wireless Reports Ransomware Attack
- SolarWinds Attackers Manipulated OAuth App Certificates
- Fighting Fraud as Digital Payments Skyrocket
- CEO Pleads Guilty in Fraud Case Involving HIPAA Violations
- CISA Prepares to Use New Subpoena Power
- Accellion Data Breach Ensnares Energy Giant Shell
- Swiss Firm Says It Accessed SolarWinds Attackers' Servers
- Charm Offensive: Ransomware Gangs 'Tell All' in Interviews
- Cybercrime Forum Administrator Sentenced to 10 Years in Prison
- VMWare, Recorded Future, Others Announce M&A Deals
- IRS Scam Emails Ask Tax Preparers for EFIN Information
- Remote Work Creates Insider Threat Concerns
- Attackers Exploiting F5 Networks' BIG-IP Vulnerability
- Microsoft Exchange Flaw: Attacks Surge After Code Published
- Acer Reportedly Targeted by Ransomware Gang
- Attackers Exploiting Critical F5 Networks Vulnerability
- Microsoft Exchange Server Flaw Causes Spike in Attacks
- GAO: Electrical Grid's Distribution Systems More Vulnerable
- Hackers Used Trojanized Xcode to Target macOS Developers
- Panel Discussion: Cybersecurity Week in Review
- Russian Pleads Guilty in Tesla Hacking Scheme
- Tax-Themed Phishing Campaign Emerges
- Finland Says Chinese Hackers Responsible for 2020 Breach
- Feds Charge Verkada Camera Hacker With 'Theft and Fraud'
- Analysis: Microsoft Exchange Server Hacks
- Live Webinar | 10 million DDoS attacks in 2020: How Attackers Took Advantage of The Pandemic
- FCC Moves Toward Banning 3 Chinese Telco Firms From US
- The Case for 'Zero Trust' Approach After SolarWinds Attack
- FCC Moving Toward Banning 3 Chinese Telecom Firms From U.S.
- Internet-Enabled Crime: 2020 US Losses Exceed $4.2 Billion
- Researchers Uncover Widely Used Malware Crypter
- John Kindervag: Reflections on 'Zero Trust'
- 5 minutes with Kelvin Coleman – Remote learning and data privacy issues
- Live EMEA Webinar | Cloud-Based Email Security: Best Practices for Securing Office 365
- White House Establishes Group to Investigate Exchange Attacks
- Free Tool Helps Hospitals Block Ransomware
- Mimecast Update: SolarWinds Hackers Stole Source Code
- FBI: Pysa Ransomware Attacks Target Schools
- Live Webinar | DevSecOps Done Right
- Florida Teen Pleads Guilty in 2020 Twitter Hack
- Live Webinar | Mitigating the Risks Associated with Remote Work
- Fake Telegram Desktop App Malware Campaign Persists
- US Intelligence Reports: Russia, Iran Targeted 2020 Election
- Microsoft Exchange: Server Attack Attempts Skyrocket
- Live Webinar | Determining the Total Cost of Fraud
- Intelligence Reports: Russia, Iran Targeted 2020 Election
- Microsoft Exchange Attack Attempts Skyrocket
- Microsoft Issues Mitigation Tool for an Exchange Server Flaw
- Tips on Selecting a Protective DNS Service
- Exchange Hacks: How Will the Biden Administration Respond?
- Rushed to Market: DearCry Ransomware Targeting Exchange Bug
- Over 400 Cyberattacks at US Public Schools in 2020
- Hacking Incidents, Vendor Breaches Keep Surging
- Exchange Hacks: How Will the Biden Administration Respond?
- U.K. Set to Boost Cybersecurity Operations
- Federal Privacy Bill Reintroduced in Congress
- Cryptophone Service Crackdown: Feds Indict Sky Global CEO
- URL Phishing Campaign Hides Attack Behind Morse Code
- How Did the Exchange Server Exploit Leak?
- New Attack Uses Fake Icon To Deliver Trojan
- Spear-Phishing Campaign Distributes Nim-Based Malware
- Debt Collection Firm Reaches Breach Settlement With States
- GAO: CISA Has Many Unfinished Tasks
- Verkada's Camera Debacle Traces to Publicly Exposed Server
- Keeping Your Data Safe In The Remote Work Era
- Dearcry Ransomware Targets Unpatched Exchange Servers
- Microsoft Exchange: At Least 10 APT Groups Exploiting Flaws
- Analysis: Lessons Learned From Emotet Takedown
- SOC Management: Automation Best Practices
- At Least 10 APT Groups Exploiting Exchange Flaws
- Relief Package Includes Less for Cybersecurity
- Police Target Criminal Users of Sky ECC Cryptophone Service
- The Impact of COVID-19 on Cybersecurity Strategies
- Live Webinar | Securing Remote Workers in EMEA: Using SASE to Maintain Visibility and Maximize Efficiency
- Adobe Patches 8 Critical Vulnerabilities
- CISA Will Manage .Gov Domain in Effort to Enhance Security
- Microsoft Patch Tuesday: A Call to Action
- Hackers Waging 'Living Off the Land' Attacks on Azure
- Education Sector OnDemand | Authentication for the Evolving Campus Community
- Live Webinar | Attacks on Cloud Infrastructure
- Startup Probes Hack of Internet-Connected Security Cameras
- Patching, with special attention to Hafnium and the rest. Responding to the SolarWinds incident. Hactivists don’t like cameras. Dragnet in the Low Countries.
- European Banking Authority Sustains Exchange Server Hack
- List of Hacked Exchange Servers May Boost Recovery Efforts
- Correcting the Process of Continuous Monitoring
- Researchers Describe a Second, Separate SolarWinds Attack
- Could HIPAA Changes Weaken Patient Privacy?
- Bill Would Allow Americans to Sue Foreign Hackers
- ZLoader Malware Hidden in Encrypted Excel File
- Live Webinar | Managing Risk Where Hardware and DevOps Converge
- NCSA ON CYBERSECURITY: ‘UPDATE, UPDATE, UPDATE’
- The Cybersecurity 202: Scammers are Already Targeting the Next Round of Coronavirus Relief Checks
- Why Does EternalBlue-Targeting WannaCry Remain at Large?
- Lawmakers Urge FTC to Enforce Health Breach Notification Rule
- McAfee to Sell Enterprise Unit for $4 Billion
- Zero trust and the Critical Role for Strong Authentication
- Better Identity Coalition: A Project Update
- COVID-19: Are We Rounding the Corner?
- John McAfee Charged With Cryptocurrency Fraud
- When it comes to healthcare cybersecurity, the best defense is also the most simple
- Phishing Attack Uses Fake Google reCAPTCHA
- Supermicro and PulseSecure Issue Advisories on Trickboot
- Live Webinar | A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation
- VMWare Patches Vulnerability on View Planner
- Supply Chain Attack Jolts Airlines
- Hackers Exploit Exchange Flaws to Target Local Governments
- Fraudsters Devise More COVID-19 Vaccine Schemes
- Using Biometrics to Curb Unemployment Benefits Fraud
- Researchers Disclose More Malware Used in SolarWinds Attack
- Live Webinar: Datacenter in and out of Cloud: How Agile is Your Network Security?
- Mark of Ransomware's Success: $370 Million in 2020 Profits
- FTC Fraud Alert: Look Out for Fake ‘Trading Commission’
- Accellion Appliance Zero-Day Attack Breaches: Key Takeaways
- Accellion Breaches: Key Takeaways
- Datacenter in and out of Cloud: How Agile is Your Network Security?
- Researchers Disclose More Malware Used in SolarWinds Hack
- Lesson From SolarWinds Attack: It's Time to Beef Up IAM
- Google Patches Zero-Day Vulnerability in Chrome
- Qualys Gets 'Clopped' by Accellion-Exploiting Attackers
- Okta to Buy Auth0 for $6.5 Billion
- Russian Cybercriminal Forum 'Maza' Breached
- Changing Authentication for Employees
- Exchange Server Attacks Spread After Disclosure of Flaws
- GAO Report Highlights Need for Centralized Cyber Leadership
- Lazarus Group Tied to TFlower Ransomware
- Accellion Attack Involved Extensive Reverse Engineering
- Cybersecurity Leadership: Identity, Access, Complexity
- AI Supremacy: Russia, China Could Edge Out US, Experts Warn
- Microsoft Patches Four Zero-Day Flaws in Exchange
- India Fights Against Malware Targeting Power Supply
- Report Sizes Up How AI Poses a Security Threat
- Ransomware Attack's Economic Impact: $67 Million
- Live Webinar | 5 Cyber Security Tips You Can Ignore
- Hackers Use Search Engine Optimization to Deliver Malware
- Live Webinar | Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?
- Why This Facebook Privacy Settlement Is Unusual
- Indian Vaccine Makers, Oxford Lab Reportedly Hacked
- Rockwell Controllers Vulnerable
- Equifax CISO Jamil Farshchi on SolarWinds and Supply Chains
- Ryuk Ransomware Updated With 'Worm-Like Capabilities'
- FBI Warns Against Vishing Scams Over VoIP
- NSA Issues Guidance on Zero Trust Implementation
- Live Webinar: Going Passwordless and Beyond - The Future of Identity Management
- House SolarWinds Hearing Focuses on Updating Cyber Laws
- DHS to Provide $25 Million More for Cybersecurity Grants
- Big Data Healthcare Project Raises Privacy Issues
- Microsoft Patches Windows Remote Code Flaw
- Ransomware: Beware of 13 Tactics, Tools and Procedures
- Live Webinar | The Path to Zero Trust with Least Privilege & Secure Remote Access
- Microsoft Releases Queries for SolarWinds Attack Detection
- Legacy tech, privacy and security issues bog down healthcare innovation
- Analysis: Feds Crack Down on Cryptocurrency Scams
- Live Webinar | Zero Trust: The Role of Identity
- Illumination Summit: Poker & Cybersecurity: A Game of Skill, Not Luck
- Lazarus Hits Defense Firms with ThreatNeedle Malware
- Executive Order Focuses on Supply Chain Risk Management
- Secure Patient Access to Health Records: The Challenges
- 6,000 VMware vCenter Devices Vulnerable to Remote Attacks
- OnDemand Webinar: 2021 State of Physical Access Control
- Live Webinar | You Can’t Stop Human Attackers without Human Reporting and Analysis
- Not 'Above the Law' - Feds Target ICO Cryptocurrency Scams
- Federal Reserve's Money Transfer Services Suffer Outage
- Cybersecurity Agencies Warn of Accellion Vulnerability Exploits
- Senate SolarWinds Hearing: 4 Key Issues Raised
- Prison Time for Scheme to Frame Nurse for HIPAA Violations
- Updated Minebridge RAT Targets Security Researchers
- Using ID Screening to Fight COVID-19 Economic Relief Fraud
- Senators Grill Cybersecurity Execs on SolarWinds Attack
- Live Webinar | Your Journey to the Cloud Operating Model
- Ukraine Blames Russia for DDoS Attack on Defense Websites
- France Warns of Stolen Healthcare Credentials
- Indian Critical Infrastructure Protection Center Vulnerable
- Silver Sparrow Malware Infects 30,000 Macs
- US Marine Corps Looks to Expand Insider Threat Program
- Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021
- Analysis: Russia's Sandworm Hacking Campaign
- SonicWall Was Hacked. Was it Also Extorted?
- Fraudsters Using Telegram API to Harvest Credentials
- Chinese Hacking Group 'Cloned' NSA Exploit Tool
- Sequoia Capital Investigating 'Cybersecurity Incident'
- Creating a Digital ID to Verify COVID-19 Testing
- Creating a Digital ID to Verify COVID-19 Vaccinations
- Accellion: How Attackers Stole Data and Ransomed Companies
- The Importance of Supply Chain Risk Management in Government
- New Malicious Adware Exploits Apple M1 Chip
- M&A Update: CrowdStrike to Acquire Humio for $400 Million
- Eye Care Practice: Vendor Paid Ransom for Return of Data
- Live Webinar | Smart and Adaptive MFA for the Modern Campus
- IRS Warns of Fresh Fraud Tactics as Tax Season Starts
- 'Cuba' Ransomware Gang Hits Payment Processor, Steals Data
- Analysis: Sandworm's Hacking Campaign
- Live Webinar | Using Automation to Augment the SOC - EMEA
- White House Preparing 'Executive Action' After SolarWinds Attack
- Data Breaches: ShinyHunters' Dominance Continues
- Hackers Target 'Instant Quote' Websites
- Nigerian Gets 10-Year Sentence for BEC Scam
- 3 North Koreans Indicted for Conspiring to Steal $1.3 Billion
- Live Webinar | Prevent Account Takeovers and Fraud with Strong Authentication
- PACS Flaws Put Data at Risk for 18 Months
- Senators Push for Action on Water Treatment Hack Investigation
- 3 North Koreans Indicted for Stealing $1.3 Billion
- Darknet Markets Compete to Replace Joker's Stash
- File Sharing App SHAREit for Android Has Remote Code Flaw
- Becoming a CISO: Many Paths to Success
- When Cyber Gangs Disregard Ransomware Payments, Victims Can Be Hit Twice
- Live Webinar: Integrating Security Automation in Modern Application Development Environments
- Live Webinar | Determining the Total Cost of Fraud
- South Korea Claims North Korea Tried Hacking Pfizer
- NZ Reserve Bank Issues Update on Accellion Breach
- Mit Anwendungssicherheit Datenverstöße und Compliance-Anforderungen umschiffen
- Navigating Data Breach and Compliance Requirements with Application Security
- Biden Assesses U.S. Policies on China Cybersecurity Issues
- Bloomberg's Supermicro Follow-Up: Still No Chip
- Microsoft Patches 12-Year-Old Vulnerability
- Bloomberg's Supermicro Followup: Still No Chip
- France Ties 3-Year Hacking Campaign to Russia's Sandworm
- Privacy Legislation Progresses in 5 More States
- Health Data Breach Tally Crowded With Vendor Incidents
- Why Synthetic Identity Fraud Persists
- Fraud Investigations Holding Up Unemployment Payments
- Microsoft's Smith: SolarWinds Attack Involved 1,000 Developers
- M&A Update: Apax Partners to Acquire Herjavec Group
- Suspected Egregor Ransomware Affiliates Busted in Ukraine
- Mergers & Acquisitions: Apax Partners Reaches Deal for Herjavec Group
- Sharp Healthcare Latest to Be Fined for Records Access Failure
- Water Treatment Hack Prompts Warning From CISA
- 2 More Breaches Tied to Accellion File Transfer Appliance
- Siemens Patches 21 Vulnerabilities in 2 Tools
- U.S. Water Supply Has Few Protections Against Hacking
- Roses are Red, Romance Scammers Increasingly Make You Blue
- Zoom Bombing: How to Keep Intruders Out of Video Meetings
- Analysis: Implications of Water Treatment Plant Hack
- SAP Commerce Product Has Vulnerability
- Pro-India APT Group Deploys Android Spyware
- White House Taps Neuberger to Lead SolarWinds Probe
- Will Russian Cryptocurrency Law Drive Hacker Recruitment?
- HHS OCR Issues 15th Records Access Settlement
- Account Takeover: 2021 - and How to Prevent it
- World Health Organization CISO on Supply Chain Risk
- ‘DarkMarket’ Dark Web Marketplace Taken Down in International Operation
- Malware: Group Targeting Embassies Adds ‘Drovorub’ Campaign
- Florida City's Water Hack: Poor IT Security Laid Bare
- Florida's Water Hack: Poor IT Security Laid Bare
- Microsoft Issues Second Patch for Netlogon Vulnerability
- Senators Demand More Coordination in SolarWinds Investigation
- Chinese APT Group Deploys ‘Most Sophisticated’ Shellcode
- SIM-Swapping Hackers Steal Celebrities' Cryptocurrency
- How Deepfakes Can Defeat Video ID Verification Tests
- LodaRAT Malware Can Now Target Android Devices
- Investments in Israel's Cybersecurity Sector Grow 70%
- 5 Critical Questions Raised by Water Treatment Facility Hack
- Data Exfiltration Enabled by Google Chrome Sync Extension
- Malicious Malware Enabled by Google Chrome Sync Extension
- Case Studies: CISOs Take on the 'Zero Trust' Challenge
- After SolarWinds Attack, Courts Revert to Paper for Secrets
- NHS Reports COVID-19 App Success, Backed by Strong Privacy
- Hackers Breached Florida City's Water Treatment System
- Hacker Breached Florida City's Water Treatment System
- Data Sharing: The Need for Transparency
- FTC Finalizes SkyMed Data Leak Settlement
- After SolarWinds Hack, Courts Revert to Paper for Secrets
- Kelvin Coleman – TechStrong TV
- Plex Media Servers Used to Amplify DDoS Threats
- Cybersecurity Leadership: Asset Discovery and Visibility
- Ransomware in the Remote Era: Attackers Impersonate Parents to Target Teachers
- Fraudsters Target Discord Users in Cryptocurrency Scam
- Plex Media Server Used to Amplify DDoS Threats
- Microsoft: Office 365 Was Not SolarWinds Initial Attack Vector
- Fonix Ransomware Gang Shuts Down Operations
- CISOs on Ransomware and Malicious Insiders
- 2020 Breach Statistics: An Analysis
- Recently Uncovered Botnet Targets Android Devices
- Led by Hydra, Darknet Markets Logged Record Revenue
- French Security Firm Says Hackers Accessed Its Source Code
- Analysis: The Persistent Ransomware Threat
- How to Keep Telehealth Secure
- Medical Researcher Sentenced in IP Theft Case
- Unusual Phishing Campaign Extracted Office 365 Credentials
- Do Ransomware Operators Have a Russian Government Nexus?
- Updated Trickbot Deploys Fresh Reconnaissance Tool
- New DHS Secretary Pledges to Investigate SolarWinds Hack
- NCSC Warns of China’s Efforts to Collect US DNA Data
- The Accellion Mess: What Went Wrong?
- 'Kobalos' Linux Malware Targets Supercomputers Worldwide
- Wind River Systems Investigating Possible Data Breach
- Live Webinar | SolarWinds Breach: If Cyber Companies Can Get Hit, Do You Stand A Chance?
- China Tied to Separate SolarWinds Espionage Campaign
- What Did NSA Do to Help Prevent Supply Chain Attacks?
- Democrats Introduce COVID-19 Data Privacy Bill
- Updated Agent Tesla Malware Disables Endpoint Protection
- Is Biden’s $10B Enough to Make US Cybersecurity Great Again?
- Live Webinar | The EVIL-Ution Of Ransomware In 2021-Top Protection Tips
- Washington State Breach Tied to Accellion Vulnerability
- Ransomware Newcomers Include Pay2Key, RansomEXX, Everest
- SonicWall Confirms Zero-Day Flaw Affects Certain Products
- Ransomware's Helper: Initial Access Brokers Flourish
- Tackling ID Theft With Additional Security Layers
- FBI: Watch Out for Spoofed Websites With Deceptive URLS
- After Joker’s Stash Closes, What Comes Next?
- SolarWinds Hackers Cast a Wide Net
- The Hot 100 | 2020's Most Popular Passwords and Other Data Breach Exposure Trends
- The Rise of ‘Frankenstein Fraud’ for Synthetic Identities
- Ransomware: Average Ransom Payment Declines to $154,108
- Credit Card Skimmer Hidden Inside Social Media Buttons
- Is Trickbot Botnet Making a Comeback?
- Live Webinar | Zero Trust in 2021: Defending Against Supply Chain Attacks Like SolarWinds
- Phishing Kit Can Change Lures and Text
- OIG: VA Workers Hid ‘Big Data’ Project Privacy, Security Risks
- Lebanese Hacking Group Targeting Telcos and ISPs
- Live Webinar | Mobile Banking Application Security: Protecting the Extended Perimeter
- UScellular: Hackers Accessed Customer Data
- Microsoft Offers Details on Hack of Vulnerability Researchers
- Regulator Blasts NZ’s Stock Exchange Over DDoS Meltdown
- Police Using Emotet's Network to Help Victims
- Reported US Data Breaches Declined by 19% in 2020
- Live Webinar | Mobile Application Security: Protecting the Extended Perimeter
- Live Webinar: The State of Security Validation & Testing, Financial Sector 2021
- Analysis: Emotet and Netwalker Takedowns
- 'Clone Firm' Fraudsters Stealing Millions From UK Investors
- Lawsuit: App Maker Shared Health Data With Chinese Firms
- Data Privacy in the Crosshairs
- Data Privacy Day Coincides With Apple’s Ad Tracking Changes
- Researchers: Beware of 10-Year-Old Linux Vulnerability
- Live Webinar | Breaking the Phishing Attack Kill Chain
- Stopping Fraud at The IVR
- Singapore Expands Consumer IoT Labelling
- Another Takedown: NetWalker Ransomware Gang Disrupted
- Chris DeRusha Named Federal CISO
- Law Enforcement Operation Disrupts Notorious Emotet Botnet
- Dead System Admin's Credentials Used for Ransomware Attack
- Phishing Campaign Features Fake Office 365 Update
- Grindr Potentially Faces $12M GDPR Privacy Fine
- Live Webinar | How Automation Can Reduce Third-Party Cyber Risk
- Police Disrupt Emotet Botnet
- Australian Financial Regulator Hit by Data Breach
- Cypriot Hacker Pleads Guilty to Data Theft, Extortion
- Tips on Securing Endpoints, Ensuring Compliance
- Forrester Nordics Discussion: Re-Evaluating Appsec & Devops
- Ransomware: Should Governments Hack Cybercrime Cartels?
- 2 Arrested for Alleged Theft of COVID-19 Patient Data
- Mimecast Confirms SolarWinds Hackers Breached Company
- Combating SolarWinds Supply Chain and SUNBURST Backdoor - from Device to Cloud
- Jim Clark: Why He's Giving Away Passwordless Technology
- Speed of White House cyber appointments should make CISOs ‘a bit more confident’
- Vulnerability Researchers Hit by North Korean Hackers
- Researchers Identify Enterprise Attack Using New Ransomware
- Cyber Incident Knocks Construction Firm Palfinger Offline
- Automating the SOC: 'Start Small'
- DDoS Attackers Exploit Vulnerable Microsoft RDP Servers
- National Cyber Security Alliance Kicks off Data Privacy Day This Week to Raise Awareness for Responsible Data Privacy Practices
- Live Webinar | The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys
- Russian Pleads Guilty to Running Cybercrime Forum
- Assessing the SolarWinds Hack's Impact on Fraud
- SonicWall Investigating Zero-Day Attacks Against Its Products
- DDoS Attackers Revive Old Campaigns to Extort Ransom
- Fraudsters Are Using Google Forms to Evade Email Filters
- Intel Investigating Hack of Confidential Financial Report
- Researchers Identify SAP Flaw Exploit
- Biden's COVID-19 Plan Calls for Assessment of Cyberthreats
- DreamBus Botnet Targets Linux Systems
- President Biden Orders SolarWinds Intelligence Assessment
- Analysis: How Will Biden Address Cybersecurity Challenges?
- Microsoft Describes How SolarWinds Hackers Avoided Detection
- Data Exchange Expert Micky Tripathi to Head HHS ONC
- Webinar | A Look into Cisco Umbrella's Secure Internet Gateway (French Language Webinar)
- Fueled by Profits, Ransomware Persists in New Year
- Cryptomining Campaign Linked to Iranian Software Firm
- Fueled by Record Profits, Ransomware Persists in New Year
- Biden Fills 3 Cybersecurity Positions
- The Final HIPAA Actions Under Trump Administration
- Malwarebytes CEO: Firm Targeted by SolarWinds Hackers
- 'FreakOut' Botnet Targets Unpatched Linux Systems
- Trump Orders IaaS Providers to Track Foreign Users
- Free Auditing Tool Helps Detect SolarWinds Hackers' Malware
- COVID-19 First Anniversary: It's About Vaccines & Variants
- 'Raindrop' Is Latest Malware Tied to SolarWinds Hack
- Microsoft Taking Additional Steps to Address Zerologon Flaw
- FBI Warns of Increase in Vishing Attacks
- OpenWRT Project Community Investigating Data Breach
- Police Arrest Suspect in Pelosi Laptop Theft
- Why an ‘internet blackout’ probably isn’t coming on inauguration day
- Privacy Fines: Total GDPR Sanctions Reach $331 Million
- Drivers Beware: Text Phishing Disguised as New York State DMV Messages
- Biden's $10 Billion Cybersecurity Proposal: Is It Enough?
- Free cyber career training coursework emerges as a perk in tough times
- Is a U.S. National Privacy Law on the Horizon?
- COVID-19 Vaccine Themes Persist in Fraud Schemes
- Iranian Cyber Operation Posts Threats
- NZ Reserve Bank Governor Says He 'Owns' Breach
- FBI: Disinformation Campaigns Seek to Exploit Capitol Siege
- Hacker Blows Chance at Early Release By Hacking More
- Joker's Stash Reportedly Shutting Down Operations
- Iranian APT Group Revived Phishing Activities Over Holidays
- Magecart Groups Hide Behind 'Bulletproof' Hosting Service
- Appeals Court Vacates $4.3 Million HIPAA Penalty
- Biden Inauguration: Defending Against Cyberthreats
- Excellus Health Plan Hit With $5.1 Million HIPAA Settlement
- Capitol Riot Suspects Identify Themselves
- 'Scam-as-a-Service' Scheme Spreads
- NSA Offers Guidance on Adopting Encrypted DNS
- Ransomware Disrupts Scottish Environment Protection Agency
- SolarWinds Supply Chain Hack: Investigation Update
- Securing the "New Tomorrow" in Financial Services
- Get Security into Your CI/CD Pipeline
- FTC Orders Health App Vendor to Revamp Privacy Practices
- How Conti Ransomware Works
- CISA Warns of Surge in Attacks Targeting Cloud Services
- Sizing Up the Role of Deception Technology
- TechStrong TV – January 14, 2021
- Does Trump's Second Impeachment Have Cybersecurity Impact?
- Does Trump's Second Impeachment Affect Cybersecurity?
- Reducing Fraud Through Advanced IVR Technologies
- COVID-19 Vaccine Documents, Personal Data Leaked
- Beat the Bad Guys: Contact Center Security Solutions For Fraud Detection For 2021 and Beyond
- Watering Hole Operation Leveraged Zero-Day Exploits
- Mobile RAT for Android Offered on Darknet Forums
- Capitol Breach: Cybersecurity Lessons to Apply
- Mimecast Says Hackers Compromised Digital Certificate
- 'SolarLeaks' Site Claims to Offer Attack Victims' Data
- Joker Malware Hits Google Play with 17 Variants
- Live Webinar | Empower The Now Platform to Drive Safer Business Outcomes with Unisys Stealth
- New Year Kicks Off With Vendor Consolidation
- Biggest Fine Yet for Patient Records Access Violation
- Massive DarkMarket Underground Marketplace Taken Down
- Why can't security teams overlook the benefits of Collaboration & Automation?
- SolarWinds Describes Attackers' 'Malicious Code Injection'
- Data Privacy Day: Understanding COVID-19’s Impact
- Updated macOS Cryptominer Uses Fresh Evasion Techniques
- Vulnerable Database Exposed UN Employees' Data
- Parler Content Forcibly Archived by Researchers After Riot
- Kaspersky: SolarWinds Backdoor Similar to Russian 'Kazuar'
- IT cleanup at U.S. Capitol presents massive challenge
- VPN Security: Attackers Bundle VPN Installers With Backdoors
- Reserve Bank of New Zealand Investigates Data Breach
- Experts Weigh In on Cybersecurity Risks of Capitol-Like Attacks
- FBI Issues Alert on Growing Egregor Ransomware Threat
- Securing the New 'Branch Office'
- Why Compliance Teams Need a Dashboard
- Capitol Riot: Self-Surveillance Feeds Investigation
- Twitter Permanently Suspends President Trump's Account
- FBI Issues Alert Over Growing Egregor Ransomware Threat
- JPMorgan Chase Hacker Sentenced to 12 Years in Prison
- State Department Plans to Create Cybersecurity Office
- Cybersecurity Ramifications of the 2021 Storming of the United States Capitol
- Federal Courts Investigate 'Apparent Compromise' of System
- Ryuk Ransomware Profits: $150 Million
- Post-Riot, the Capitol Hill IT Staff Faces a Security Mess
- 2021: The State of Privacy
- SolarWinds Hires Chris Krebs to Reboot Its Cybersecurity
- Analysis: The Latest SolarWinds Hack Developments
- Researchers Warn Attackers Are Scanning for Zyxel Products
- IT Governance is Broken! - 5 Ways Enterprise Organizations Can Fix It
- The Cyber Risk Management Challenges After Capitol Riot
- Trump Executive Order Bans 8 More Chinese Apps
- Trump-Themed Phishing Campaign Spread Trojan
- Minecraft-Themed Fleeceware Apps Hide Steep Fees
- Was JetBrains Tool an Infection Vector for SolarWinds Hack?
- U.S Capitol Rioters Pose Cybersecurity Threat Due to Device Access, Theft
- Maritime Cybersecurity Plan Unveiled
- Leveraging 'Multisectoral' Authentication
- ElectroRAT Malware Targets Cryptocurrency Wallets
- Rioters Open Capitol's Doors to Potential Cyberthreats
- NSA Releases Guidance on Obsolete Encryption Tools
- Live Webinar | Cisco: A Practical Tool to Guide Your Security Investments
- SolarWinds Attack: Pointing a Finger at Russia
- Live Webinar | Leverage AI to Protect Against Phishing and Typosquatting Attacks
- UK Court Denies Assange Bail During Appeals Process
- Phishing Emails Spoof Australia's Cyber Security Center
- Shareholder Sues SolarWinds for Alleged Security Failures
- OnDemand | 2021 Pharmaceutical Threat Outlook
- Shareholder Sues SolarWinds
- Researchers Disclose Details of FIN7 Hacking Group's Malware
- Citrix Updates ADC Products to Help Block DDoS Attacks
- Severe SolarWinds Hacking: 250 Organizations Affected?
- Live Webinar | Important Steps to Implementing SASE Security
- Compliance Lessons From 2020 Fraud Cases
- Analysis: 2020 Health Data Breach Trends
- 100,000 Zyxel Devices Vulnerable to Backdoor
- Defense Funding Measure Includes 77 Cybersecurity Provisions
- $2.4 Million Settlement in 2017 Sabre Data Breach
- New Golang-Based Worm Targets Servers to Mine Monero
- British Judge Denies US Extradition of Assange
- 2021: The Evolution of Zero Trust
- Live Webinar | A Look into Cisco Umbrella's Secure Internet Gateway (French Language Webinar)
- Sabre Settles for $2.4 Million Over 2017 Breach
- Whirlpool Hit With Ransomware Attack
- Why Facebook's Diem is 'a Shadow of Libra'
- FBI Warns Of Swatting Attacks Targeting Smart Home Devices
- Ticketmaster Fined $10 Million for Hacking Competitor
- CISA Releases New Guidance on SolarWinds Patch
- Cybersecurity Leaders Talk Tactics, Techniques, Challenges
- Ransomware 2020: A Year of Many Changes
- T-Mobile Alerts Customers to New Breach
- Shaping the Future of Payments and Identity
- FinCEN: Beware Scams Related to COVID-19 Vaccines
- Paving the Road to Customer IAM
- Kawasaki: Cyber Incident May Have Resulted in Data Loss
- Fresh Card Skimmer Attacks Multiple E-Commerce Platforms
- SolarWinds Orion: Fixes Aim to Block Sunburst and Supernova
- Finnish Officials Investigate Hack of Lawmakers' Email
- 'WeLeakInfo' Site: UK Police Arrest 21 Alleged Users
- SolarWinds Attack: 'This Hit the Security Community Hard'
- SolarWinds Aftermath: 'This Hit the Security Community Hard'
- Citrix Warns Its ADC Products Are Being Used in DDoS Attacks
- UK Police Arrest 21 WeLeakInfo Users In Cyber Crackdown
- COVID-19: Evolving Regulatory Issues
- Microsoft Warned CrowdStrike of Possible Hacking Attempt
- Analysis: Supply Chain Management After SolarWinds Hack
- Lazarus Group Targeted COVID-19 Research
- Health Privacy, Security Priorities in Biden Administration
- DHS Warns of Data Theft Risk Posed by Chinese Technology
- Fake Amazon Gift Cards Deliver Dridex Trojan
- CISA Warns SolarWinds Incident Response May Be Substantial
- Live Webinar | How XDR with Extended Response Automation Brings Enterprise-Grade Security to Even the Smallest Security Teams
- Ex-NSA Director: SolarWinds Breach Is 'A Call for Action'
- Live Webinar | More Than Monitoring: How Observability Takes Your DevOps and ITOps Teams From Firefighting to Fire Prevention
- FBI Warns of COVID-19 Vaccine Fraud Schemes
- Emotet Botnet Returns After 2-Month Hiatus
- Phishing Email Campaign Uses Updated COVID-19 Theme
- NIST's Ron Ross: 'The Adversary Lives in the Cracks'
- Critical Flaws Put Dell Wyse Thin Client Devices at Risk
- Guidance Offered on Data Disclosures During Pandemic
- HHS Issues Another Settlement on Patient Access to Records
- Police Dismantle Cybercrime 'Bulletproof Hosting Service'
- Live Webinar | Three Steps to Better Security in the Middle East (Arabic Language Webinar)
- Live Webinar | A Look into Cisco Umbrella's Secure Internet Gateway (Italian Language Webinar)
- Other Tech Firms Back Facebook's Lawsuit Against NSO Group
- EU Launches Decryption Tool for Law Enforcement
- Former 'Silk Road' Associate Sentenced to 8 Months in Prison
- US Treasury Suffers 'Significant' SolarWinds Breach
- Live Webinar | More Than Monitoring: How Observability Take Your DevOps and ITOps Teams From Firefighting to Fire Prevention
- Live Webinar | Managing Software Security: Nature vs. Nurture
- Bill Spells Out New Factors to Weigh in Setting HIPAA Fines
- SolarWinds Hack: Is NSA Doing the Same to Russia?
- 5 Key Steps to Building a Resilient Digital Infrastructure
- DOJ Seizes Fake Domains Impersonating Moderna, Regeneron
- Live Webinar | 10 Incredible Ways to Hack Email & How to Stop the Bad Guys
- FireEye: SolarWinds Hack 'Genuinely Impacted' 50 Victims
- President Trump Downplays Impact of SolarWinds Breach
- NSA Warns of Hacking Tactics That Target Cloud Resources
- NSA Warns Over Hacking Tactics That Target Cloud Resources
- Pay2Key Ransomware Campaign Tied to Iran
- No Criminal Charges for Accessing Trump's Twitter Account
- At Last, Results of HIPAA Compliance Audit Program Revealed
- SolarWinds Hack: Lawmakers Demand Answers
- FBI Warns of DoppelPaymer Ransomware Attack Surge
- Analysis: The Impact of SolarWinds Hack
- DOJ Seizes $4 Million in Assets Tied to Phantom Secure
- Microsoft Finds Backdoor, CISA Warns of New Attack Vectors
- CISA: SolarWinds Hack Not the Only Attack Vector in Breaches
- After Data Leak, FTC Orders Firm to Fix Security
- Hackers Use Mobile Emulators to Steal Millions
- Cryptomining Worm Now Targets Web Apps, IoT Devices
- What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability
- Implementing 'Zero Trust' in a Hybrid Cloud Environment
- SolarWinds Supply-Chain Hit: Victims Include Cisco, Intel
- Cybersecurity employee training: How to build a solid plan
- At Hearing, Krebs Again Addresses Election Security
- AgentTesla Malware Has Updated Data Harvesting Capabilities
- OnDemand | Zero Trust & the Identity Perimeter
- Cybersecurity Workforce Shortage Diminishes
- Ransomware Operators Using SystemBC Malware as Backdoor
- SolarWinds Attack Fallout: 18K Customers at Risk, ExtraHop IDs 550 Suspicious IP Addresses
- Live Webinar | Seize Control Of Your Multi-Cloud Environments
- Here are the critical responses required of all businesses after SolarWinds supply-chain hack
- SolarWinds: The Hunt to Figure Out Who Was Breached
- Recent Spear-Phishing Attacks Originate From Legit Accounts
- Twitter Fined $547,000 Under GDPR for 2018 Data Breach
- Inside Job: Grabbing Patient Records for Fraud
- SolarWinds Breach: 'The Scale, the Scope, the Subtlety'
- COVID-19: 'The Whole Country Is on Fire'
- POS Device Makers Push Patches for Vulnerabilities
- Target Selection: SolarWinds Orion 'Big Fish' Most at Risk
- SolarWinds Breach Reports: 'Just the Tip of the Iceberg'
- Monero Mining Botnet Targets PostgreSQL Database Servers
- Cybersecurity: A Bleak 'Progress' Report
- SolarWinds Breach Response: 'Shields Up'
- SolarWinds Hack: 'We're at a Vulnerable Period in History'
- SolarWinds Incident Response: 4 Essential Security Alerts
- Phishing Campaign Uses Outlook Migration Message
- 7 Takeaways: Supply-Chain Attack Hits SolarWinds Customers
- Hacked: US Commerce and Treasury Departments
- US Commerce, Treasury Hit in Network Intrusions
- 'MountLocker' Ransomware Adds to Affiliate Extortion Racket
- Ransomware Attacks Hitting Vulnerable MySQL Servers
- Adrozek Modifier Affecting Edge, Chrome, Firefox Browsers
- CISA Warns of Increasing Cyberthreats to US K-12 Schools
- Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry
- Critical Factors to Consider Before Paying a Ransom
- FCC Upholds Ruling That Huawei Poses National Security Threat
- OnDemand | How to Manage Your Third-Party Risk
- Cybersecurity Leadership: Fighting Back Against Fraud
- Panasonic India's Data Released in Extortion Plot
- Analysis of FireEye Breach: Is Nothing Safe?
- Phishing Emails With COVID-19 Themes Delivered Zebrocy Malware
- OnDemand Webinar | The Third Question: What CISOs Aren't Asking, and What's at Stake
- HHS Reveals Proposed Changes to HIPAA Privacy Rule
- Phishing Emails With COVID-19 Theme Delivered Zebrocy Malware
- Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry
- Vendor to Dental Practices Hacked: 1 Million Affected
- Guilty Plea in 2016 Dyn DDoS Attack
- Following FireEye Hack, Ensure These 16 Bugs Are Patched
- Live Webinar | A Look into Cisco Umbrella's Secure Internet Gateway (Italian Language Webinar)
- Ex-Cisco Engineer Sentenced to 2 Years in Prison for Hacking
- Live Webinar | A Look into Cisco Umbrella's Secure Internet Gateway (French Language Webinar)
- Hacking Group Dropping Malware Via Facebook, Cloud Services
- Norway Says Russia-Linked APT28 Hacked Parliament
- FireEye Hack: Sizing Up the Impact
- EU Vaccine Approval Agency Investigating 'Cyberattack'
- Iranian-Linked Android Spyware Sneaks Into Private Chats
- Black Hat Europe: Hackers Need to Educate Policymakers
- Security Validation in 2021: Why It's More Important than Ever
- Fire in the Hole
- FireEye Says Nation-State Attackers Stole Pen Test Tools
- Payment Card Skimming Group Deployed Raccoon Infostealer
- Fresh Spear-Phishing Email Spoofs Microsoft Domain
- Authentication Flaws Found Again in GE Medical Imaging Gear
- Bitcoin Exchange Operator Sentenced to 5 Years in Prison
- As Ransomware Booms, Are Cyber Insurers Getting Cold Feet?
- Second Federal Judge Blocks White House's TikTok Ban
- First Federal IoT Security Legislation Becomes Law
- Meeting Identity Proofing Challenges
- Hackers Breached Israeli Water Reservoir HMI System
- NSA: Russian Hackers Exploiting VMware Vulnerability
- Europol Warns of COVID-19 Vaccine Crime Gangs
- 2 Charged With Hacking Italian Defense Contractor Leonardo
- Ransomware: Call Centers Cold-Call Victims to Demand Ransom
- The Impending Transaction Dispute Avalanche
- Egregor Ransomware Slams HR Firm and Transport Agency
- Google Play Source Code Flaw Makes Apps Vulnerable
- Hacker-for-Hire Group DeathStalker Implements New Malware
- US Senators Warn of National Security Threats From China
- Data Exfiltrated From Alaskan Voter Registration Servers
- Defense Bill Would Restore White House Cybersecurity Post
- Phishing Campaign Targeted Universities Worldwide
- Bad Cookies: Privacy Regulator Fines Supermarket Giant
- Balancing Security, Customer Service
- Hacking Group Used Crypto Miners as Distraction Technique
- Analysis: Apple iOS 'Zero-Click Exploit'
- Phishing Campaign Targets COVID-19 'Cold Chain'
- Trickbot Now Uses a Bootkit to Attack Firmware
- Microsoft Backpedals Over 'Productivity Score' Monitoring
- Researchers: 25 Countries Use 'Circles' Spyware
- Nintendo Hacker's Sentence: 3 Years in Prison
- Alert: APT Groups Targeting US Think Tanks
- Cybersecurity 2021: Threats, Technologies and Leadership
- Interpol: Organized Crime to Capitalize on COVID-19 Vaccines
- A New IVR Fraud Solution to Protect Banking Institutions and Customers
- FBI: BEC Scams Are Using Email Auto-Forwarding
- DarkIRC Botnet Exploiting Oracle WebLogic Vulnerability
- K12, Online Curriculum Provider, Pays Ransom to Hackers
- Russian Hacking Group's Backdoor Uses Dropbox
- Scammers step up efforts to target older Americans during pandemic
- Serious Apple iOS Exploit Enabled Nearby Device Takeover
- Researchers Find Updated Variants of Bandook Spyware
- Data Breach Affects 300,000 Mental Health Clinic Patients
- Hackers Using Compromised Websites to Deliver Gootkit, REvil
- Conti Ransomware Gang Posts Advantech's Data
- Fresh MacOS Backdoor Variant Linked to Vietnamese Hackers
- New Zealand's Refreshed Privacy Act Takes Effect
- Audit Found Baltimore County Schools Lacked Data Security
- Sizing Up Synthetic DNA Hacking Risks
- Canon: Ransomware Attack Exposed Employee Data
- 'Return to Office' Phishing Emails Aim to Steal Credentials
- Fired CISA Director Refutes Election Fraud Allegations
- CISA Warns of Password Leak on Vulnerable Fortinet VPNs
- Sophos Warns Customers of Possible Data Leak
- EU Law Enforcement Prevents $47.5 Million in Payment Fraud
- UK Ramps Up Capabilities to Deter Nation-State Hackers
- Government Watchdog Calls for 5G Cybersecurity Standards
- Productivity Tools May Be Monitoring Workers' Productivity
- Ransomware: IT Services Firm Faces $60 Million Recovery
- Hot Cybercrime Trend: Enterprise-Scale Ransomware Hits
- Ransomware Attack Targets Baltimore County Public Schools
- Ransomware Attack Will Costs French IT Services $60 Million
- Interpol Busts Massive Nigerian BEC Gang
- Automated Monitoring in the Cloud
- Botnet Operators Ditch Banking Trojans for Ransomware
- Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry
- Gone in 120 Seconds: Flaws Enable Theft of Tesla Model X
- Insurance Fraud is Evolving: So Must Our Response
- Linux Botnet Disguises Itself as Apache Server
- Google Removes 2 Android Apps That Collected User Data
- Botnet Operators Drop Banking Trojans for Ransomware
- FBI Warns of Uptick in Ragnar Locker Ransomware Activity
- Home Depot Settles 2014 Breach Lawsuit for $17.5 Million
- Fraudsters Spoof FBI Domain
- Chinese Hacking Group Rebounds With Fresh Malware
- Alleged Fraud at Billing Firm Spotlights Insider Risks
- Updated Trickbot Malware Is More Resilient
- Instagram Leaked Minors' PII Again, But Now It's Fixed
- UK Telecommunications Security Bill Would Ban Huawei
- Maze Ransomware Influenced LockBit’s New Data Leaks Website
- COVID-19 Latest: 'We Are Really Struggling'
- Biden Reveals Picks to Head DHS, Intelligence
- How to Keep Your Family Safe Online | Kelvin Coleman, Exec. Director
- Bill Looks to Close Federal Cybersecurity Loopholes
- From St. Louis to France, Ransomware Victim List Expands
- HHS Rule Changes Allow for Cybersecurity Donations
- Fraudsters Target Cryptocurrency Platforms Through GoDaddy
- The digital switch that blocks all websites from selling your personal data
- Cryptomining Worm Uses Third-Party Software to Target Cloud
- Florida Man Gets 3-Year Prison Term for Account Takeover Scam
- Qbot Banking Trojan Now Deploying Egregor Ransomware
- Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry
- Grelos Skimmer Variant Co-Opts Magecart Infrastructure
- 2 Arrested for Operating Malware Encryption Service
- Eye Care Center Operator's Customer Data Hacked
- Fraudsters Use Free Google Services in Phishing Campaigns
- UK Forms National Cyber Force
- Live Webinar | Application Security Trends, The Necessity of Securing Software in Uncertain Times
- Yet Another HIPAA Right to Access Records Fine Announced
- OnDemand | SASE:2021 Planning
- The Dark Side of AI: Previewing Criminal Uses
- Global Financial Industry Facing Fresh Round of Cyberthreats
- Christopher Krebs Describes Accomplishments
- AWS Flaw Allows Attackers to Find Users' Access Codes
- Analysis: Does Krebs' Firing Leave US Vulnerable to Attack?
- Chinese Hackers Exploit Zerologon Flaw for Cyberespionage
- Using an 'Intrinsic Security' Approach
- Senate Passes IoT Cybersecurity Improvement Act
- Strong Crypto and Policing: EU Again Debates Encryption
- Chinese Hacking Group Suspected of Far-Reaching Campaign
- Accused Ringleader of FIN7 Hacking Group Pleads Guilty
- Microsoft Warns of Office 365 Phishing Attacks
- InfoSec Community Supports Krebs After Ouster From CISA
- Brace for DNS Spoofing: Cache Poisoning Flaws Discovered
- Live Webinar: An Agile Approach to Security Validation in Healthcare
- Cybersecurity Leadership: '2020 Has Been the Perfect Storm'
- Gaming Company Confirms Ragnar Locker Ransomware Attack
- North Korean Hackers Suspected of Supply-Chain Attacks
- Live Webinar | MITRE ATT&CK: Outsmart Cyber Attackers When You Know Their Tricks
- Trump Fires Christopher Krebs, Head of CISA
- Is Teams Safe? Top Ten Teams Threats Explained
- Federal CISO Criticized for Investigating Voter Fraud
- Cold Storage Firm Reports Cybersecurity Incident
- More Ransomware-as-a-Service Operations Seek Affiliates
- Privacy Group Files Complaint Over iOS Tracking
- Drug Infusion System Flaw Could Lead to Attack
- Blockchain for Voting: A Warning From MIT
- Live Webinar | Excellence in Digital Experience: The Intersection of Process & Technical Exponentiality
- Live Webinar | 7 Lessons for CISOs from a Battle-tested, Ransomware Survivor Public Sector CIO
- Twitter Hires Famed Hacker 'Mudge' as Security Head
- Live Webinar | Application Security Beyond Effective Bot Mitigation - "Playful Platforms" and Exponential Outcomes
- Live Webinar | Excellence in Digital Experience: The Intersection of Process & Technical Exponentiality
- Healthcare Supply Chain Security: Updated Guidance
- Monitor and Identify Malicious Threat Before they Cripple your Organization
- IoT Supply Chains: Where Risks Abound
- Ticketmaster Fined $1.7 Million for Data Security Failures
- 'ModPipe' POS Malware Attacking Hospitality Industry
- Data of 27 Million Texas Drivers Compromised in Breach
- Banking on Cloud Security
- APT Groups Target Firms Working on COVID-19 Vaccines
- APT Groups Target Firms Working on COVID-19 Vaccines
- Commerce Department Lets TikTok US Operations Continue
- Report Says House Members Could Securely Vote Remotely
- Ransomware Gang Devises Innovative Extortion Tactic
- German Court Slashes a GDPR Privacy Fine by 90%
- HHS OCR Issues Another 'Right of Access' Settlement
- Europol campaign urges e-commerce retailers to #SellSafe this Black Friday
- Analysis: Cybersecurity Challenges Facing New President
- Webinar | Best Practices for Multicloud Monitoring & Investigation
- Live Webinar | How to Manage Your Third-Party Risk
- Senior DHS Officials, One in Cybersecurity, Resign
- Muhstik Botnet Targets Flaws in Oracle WebLogic, Drupal
- The Power of Actionable Threat Intel
- Analysis: The Latest Health Data Breach Tally Trends
- EU Prepares to Restrict Spyware Exports
- How a Game Developer Leaked 46 Million Accounts
- Palo Alto Networks Acquiring Expanse for $800 Million
- CyberEdBoard CISO Community Debuts
- 6 Cybersecurity Tips When You Work From Home
- Darkside Ransomware Gang Launches Affiliate Program
- Breach Lawsuit Spotlights Complex Vendor Issues
- IRS Domain Spoofed in Fraud Campaign
- Phishing Campaign Tied to Trickbot Gang
- Analysis: Threat Landscape Report
- Banking Trojan Can Spy on Over 150 Financial Apps
- Biden's Cybersecurity Mission: Regain Momentum
- What's New in Updated Cyber Risk Assessment Guide?
- Former Microsoft Engineer Sentenced to 9 Years in Prison
- Tom Kellermann: Post-Election Security Analysis
- Live Webinar | Why Wireless WAN Works for Mission-Critical Federal Teleworkers
- Live Webinar | Financial Institutions Seek a Step-In Approach to Sensitive Unstructured Data Compliance and Security
- Probing Marriott's Mega-Breach: 9 Cybersecurity Takeaways
- FTC Settlement With Zoom Sets Security Requirements
- Pay2Key Ransomware Hits Israeli Targets
- Analysis: HIPAA Enforcement in a Biden Administration
- 7 Online Shopping Tips for the Holidays
- RansomEXX Ransomware Can Now Target Linux Systems
- Cybersecurity Leadership: A Fresh Look at Fraud
- Hackers Stealing and Selling VoIP Access
- Age plays a role in end-user security training
- What a Joe Biden Presidency Means for Cybersecurity
- Defense Contractor Hacking More Expansive Than First Thought
- Call in the National Guard: Entities Respond to Threats
- India Regulator Allows For Expanded WhatsApp Payments
- Botnet Operators Abusing Legit GitHub, Pastebin Resources
- Chinese Hacking Group Using Fresh DLL Side-Loading Attack
- ISMG's CyberEdBoard Community Launches New Engagement App
- Data-Exfiltrating Ransomware Gangs Pedal False Promises
- Analysis: Are Marriott and BA's GDPR Fines Big Enough?
- Hong Kong Updates Cybersecurity Fortification Initiative
- Apple Fixes iOS Zero Day Flaws Found by Google
- How Final Is HHS' 'Final' 5-Year Health IT Strategic Plan?
- DOJ Seizes $1 Billion Worth of Bitcoin Linked to Silk Road
- Online Users Feel Safe, But Risky Behavior Abounds
- CISA says no evidence of successful foreign election hacks. QBot’s voting-themed malspam. RegretLocker arriving.
- US Election Interference-Themed Spam Spreads Banking Trojan
- DOJ Seizes 27 More Iranian-Operated Domains
- How Final is HHS' 'Final' 5-Year Strategic Health IT Plan?
- Hospitals said to tighten email security in response to CEO spear phishing attempts
- The COVID Payment Fraud Acceleration
- Bitcoins With Alleged Links to Silk Road Appear on the Move
- California Voters Pass Prop. 24 Amending CCPA
- Rackspace Hosted Email Flaw Actively Exploited by Attackers
- Emotet Attacks Continue to Soar as Botnet Spreads Globally
- State Slaps Supermarket Co-Op with HIPAA Settlement
- Americans Confident in IoT Device Security
- Federal Source Code Accessed Via Misconfigured SonarQube
- Proofing Digital Identity with Continuous Authentication & Behavioral Biometrics
- Hacking Group Targeted Zero-Day Flaw In Oracle Solaris
- New data shows just how badly home users overestimate IoT security
- Consumers overconfident of their connected device security
- Marriott Breach Takeaway: The M&A Cybersecurity Challenge
- CISOs on 2021: "Opportunity for a Re-set"
- 81% of Americans Highly Confident Connected Devices Secure Despite Overlooking Basic Security Hygiene
- NCSA: Confidence in security of connected devices often misplaced
- Politico Pro Morning Cybersecurity
- Post-Election Day: US on Guard for Hacking, Misinformation
- NCSC Reports Record Number of Cyber Incidents Amid COVID-19
- CISA and Oracle Warn Over WebLogic Server Vulnerability
- Precious Metal Trader JM Bullion Acknowledges Breach
- Blackbaud Expects Cyber Insurer Will Cover Most Attack Costs
- Marriott and BA's Reduced Privacy Fines: GDPR Realpolitik
- Russian Botnet Operator Sentenced to 8 Years in Prison
- U.S. Health Care Under Attack
- Five minutes in healthcare – featuring Kelvin Coleman
- Microsoft Will Patch Zero-Day Flaw Found by Google
- Additional Hacking Tools Tied to North Korea-Linked Group
- Maze Claims to End Its Ransomware and Extortion Operations
- Improving Medical Device Vulnerability Scoring
- Additional Hacking Tools Tied to North Korean-Linked Group
- Commerce Department Will Continue to Press for TikTok Ban
- Marriott Hit With $24 Million GDPR Privacy Fine Over Breach
- Live Webinar APAC | New Account Fraud: The Role of Digital Behavior in Detection
- Election Interference: Feds Detail Iran's Alleged Campaign
- Feds Release More Details on Emails Allegedly Sent By Iran
- Analysis: Tactics of Group Waging Attacks on Hospitals
- Live Webinar | New Account Fraud: The Role of Digital Behavior in Detection
- Updated Malware Tied to Russian Hackers
- City Faces HIPAA Fine After Health Department Breach
- Palo Alto Networks Ignite 20: Discover the Future of Cybersecurity, Today
- Georgia Election Data Leak: Sizing Up the Impact
- Government Agencies Warn of Imminent Cybercrime Threat from Ransomware Targeted at Hospitals
- Ransomware versus patient medical data. Patching and updating. A new loader in town.
- Agencies Urged to Patch Netlogon Flaw Before Election
- Post-Election Cyber Disruptions: What to Expect
- HHS Delays Data Sharing Regulation Deadlines
- Phishing Scam Costs Wisconsin GOP $2.3 Million
- 100,000 Windows Devices Still Exposed to SMBGhost Flaw
- Phishing Campaigns Mimic Microsoft Teams, HHS COVID-19 Vaccine Tracker
- Rapid Threat Evolution Spurs Crucial Healthcare Cybersecurity Needs
- Russian Hacking Group Upgrades Malicious Toolset
- Microsoft: Iranian Hackers Targeted Security Experts
- COVID-19 Update: 'We're in a Bad Place'
- CISA, FBI, HHS WARN HOSPITALS OF ‘INCREASED AND IMMINENT’ CYBERCRIME THREAT
- US Hospitals Warned Of Fresh Wave of Ransomware Attacks
- Cloud is Your Opportunity to get Security Right
- Aetna Fined $1 Million After 3 Data Breaches
- Cloud Pak for Security
- Analysis: The Security of 5G Devices, Networks
- Sizing Up Activities of North Korea's Kimsuky APT Group
- Ryuk Ransomware Delivered Using Malware-as-a-Service Tool
- The Future of Connected Devices
- FBI on Election: "There's Going to be a Lot of Noise"
- Live Webinar | Secure Work Anywhere: 5 Key Considerations for Security and Stakeholder Enablement
- Outpace the Attackers with the Latest Frontline Intelligence
- Apps Infected With Adware Found on Google Play Store
- French IT Services Firm Confirms Ryuk Ransomware Attack
- COVID-19: Growing Cybersecurity Risks
- Sizing Up Nation-State Cyberthreats to the US Election
- New Online Platform Coordinates IoT Bug Reports
- Fraudsters Alter Election Phishing Scam
- Even in Test Mode, New Mirai Variant Infecting IoT Devices
- KashmirBlack Botnet Targets Content Management Systems
- Insider Sentenced for Sabotaging PPE Shipments
- US Treasury Sanctions Russian Entity Over Triton Malware
- The UK's Current Cybersecurity Challenge
- Webinar | Securing Virtual Methodologies and the Future of Remote Healthcare
- Phishing Campaign Mimics Microsoft Teams Alerts
- Live Webinar | Decoding the 'Alphabet Soup'" of Security
- Massive U.S. Voter Database Offered for Sale
- EU Sanctions 2 Russians for German Parliament Hack
- Webinar | The Big C's - Compliance, Control, Customer
- LockBit Ransomware Uses Automation Tools to Pick Targets
- Ransomware Knocks Out Voter Database in Georgia
- Elite Russian Sandworm Hackers' Epic OPSEC Problem
- Analysis: The Significance of Russian Hackers' Indictment
- US Officials Blame Election Data Theft on Russian APT Group
- US Agencies Seize More Iranian-Linked Domains
- White House Denies Trump's Twitter Account Was Hacked
- Elite Russian Sandworm Hackers' OPSEC Problem
- Indian Pharmaceutical Company Investigates Security Incident
- The IRS Takes on Cryptocurrency-Funded Terrorists
- Home Loan Trading Platform Exposes Mortgage Documentation
- US Alleges Iran Sent Threatening Emails to Democrats
- Unsecured Voice Transcripts Expose Health Data - Again
- Phishing Emails Target Coinbase Exchange Users
- Microsoft Continues Trickbot Crackdown
- Analysis: Can Russia's Cyber Destruction Appetite Be Curbed?
- How SMBs Can Become Cyber Resilient Against Evolving Threats
- Live Webinar | LendingTree and Cloudflare: Ensuring Zero Trade-off Between Security and Customer Experience
- NSA: Chinese Hackers Exploiting 25 Vulnerabilities
- Live Webinar | Cloud Security: Overcoming Hybrid Environment Management Challenges
- Trickbot Rebounds After 'Takedown'
- Tom Kellermann on the Price of Digital Transformation
- Bitcoin 'Mixer' Fined $60 Million
- Cybersecurity's Inconvenient Truth: The Nation-State Threat
- 6 Takeaways: Russian Spies Accused of Destructive Hacking
- 6 Russians Indicted for Destructive NotPeyta Attacks
- Sensitive Voicemail Transcripts Exposed
- 6 Russians Indicted for NotPeyta Campaign, Other Attacks
- FCC Wants More Information on Threat Posed by China Unicom
- Instagram Investigated for Exposure of Minors' Details
- Building an Effective Ransomware Mitigation Strategy
- 'Active Threat' Warning: Patch Serious SharePoint Flaw Now
- Google Offers Fresh Details on China-Linked Hacking Group
- 20 Arrested in Money-Laundering Crackdown
- British Airways' GDPR Fine Dramatically Reduced
- For Sale: 3 Million Cards Used at Dickey's Barbeque Pit
- Live Event: CISO Perspectives on Distributed Workforce and Post-pandemic Enterprise
- Ransomware: Would Banning Ransom Payments Mitigate Threat?
- Iranian Hacking Group Suspected of Deploying Ransomware
- Singapore Launches IoT Cybersecurity Labelling
- Preparing for Better Payment Card Security With PCI DSS 4.0
- Analysis: Ransomware Dominates the Cybercrime Landscape
- Webinar | Cyber Security Threats to Your Document and Data Security
- Live Webinar | Mobile App & API Access Attacks: The New Security Frontier
- Another Threat Group Joins Ransomware Extortion Racket
- Barnes & Noble Investigates Hacking Incident
- Live Webinar | Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?
- Live Webinar | Securing the Weakest Link: The Human Factor
- Iranian Hacking Group Again Targets Universities
- Criminals Still Going Crazy for Cryptocurrency
- New York Calls for Federal Regulation of Social Media
- Cybersecurity Advice for the COVID-19 Era
- Norway Alleges Russia Orchestrated Parliament Email Hack
- More BEC Criminal Gangs Are Based in US
- Communicate With Confidence Through A Cyber Crisis
- Cybersecurity Advice for the COVID-19 Era
- Live Webinar | What's Hiding in Your DNS and Other Traffic?
- Health Data Breaches in 2020: Ransomware Incidents Dominate
- Ransomware Gangs Turn to Outsourcers for Network Access
- Risk Management Shortfalls Lead to $400 Million Citibank Fine
- Strong Crypto Again the Target of Western Governments
- Analysis: Will Trickbot Takedown Impact Be Temporary?
- Backdoor Discovered in Xplora Children's Smartwatch
- Cybercrime: 12 Top Tactics and Trends
- Senator Demands Answers on Universal Health Services Outage
- Morgan Stanley Fined $60 Million for Data Protection Mishaps
- Microsoft, Others Dismantle Trickbot Botnet
- A 7-Step Cybersecurity Plan for Healthcare Organizations
- Live Webinar | The State of Third-Party Risk Management
- Tesla's Autopilot Tricked by Split-Second 'Phantom' Images
- Star Witness in Case Against Cisco: Its Own Documents
- Hackers Chaining Zerologon, Other Vulnerabilities
- US Warns: Hackers Chaining Zerologon, Other Vulnerabilities
- HHS Issues Another 'Right of Access' Settlement
- Industrial Espionage Campaign Uncovered
- Video Conference Firm Targeted for Payment Card Skimming
- Cisco's $2.6 Billion Network Security Patent Infringement
- Profiles in Leadership: Adam Glick, CISO, Rocket Software
- Inside Job: Former Worker Allegedly Holds Records for Ransom
- DOJ Seizes Domains Used for Iranian Disinformation Campaigns
- Computer security expert shares tips on staying safe amid surge in cybercrime
- Cybersecurity Leadership: Marketing in the Maelstrom
- New FritzFrog Botnet Breaches Over 500 SSH Servers
- Analysis: Why Regulators Got Tough With H&M
- Live Webinar | Unlocking the Full Potential of Public Key Infrastructure
- More Breach Fines for Community Health Systems
- Mastercard's 'Dr. Jay' on the Future of Cybersecurity Leadership
- Trump's COVID-19 Illness Sparks Phishing Campaigns
- Ransomware: Cybercrime Public Enemy No. 1
- Healthcare cybersecurity needs a dose of threat modeling
- Azure Sphere IoT Bug Hunt Yields $374,000 in Bounties
- DHS: Russia Poses Greatest Threat to Election
- Biggest 'Right to Access Records' Penalty Announced
- Cyber conflict in the Caucasus. Zerologon exploited in the wild. Emotet rising. Silicon Valley’s Gilded Age?
- #NCSAM: Is Connected Ever Going to be Protected?
- 3 ways criminals use artificial intelligence in cybersecurity attacks
- CISA Warns of Emotet Attacks Against Government Agencies
- Iranian Hackers Exploiting 'Zerologon' Flaw
- Fileless Malware Injected in Windows Error Reporting Service
- Visa Alert: POS Malware Attacks Persist
- 'Heh' Botnet Targets Telnet on IoT Devices
- Back to Work: Secure Biometric Integration Enhances Workplace Testing Solution
- A New Understanding of Risk: 6 Steps to Modern Third-Party Security
- Ransomware Attack Hits Clinical Trial Software Vendor
- John McAfee Indicted on Federal Tax Evasion Charges
- CISA Leader Puts Health Sector Project on the Level of Election Security Initiative
- Hacking Group Used Rare UEFI Bootkit for Espionage
- OnDemand | The Risks of Cloud Computing
- Why Cyber Resilience Programs Are So Critical
- Cybersecurity Awareness Month Around The World: Bangladesh, Canada, And Central/South America
- Why Digital Identity Is Gaining Momentum
- Fresh Wave of Phishing Emails Use Election as a Lure
- Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers
- Avoiding a 'Checklist' Approach to Privacy
- Clothing Retailer H&M Told to Wear $41 Million GDPR Fine
- Apple Malware: OSX.Shlayer Tricks Notarization Mechanism
- Egregor Ransomware Adds to Data Leak Trend
- Treasury Dept. Warns Against Facilitating Ransom Payments
- Does Trump's COVID-19 Test Result Portend Cyber Chaos?
- 'InterPlanetary Storm' Botnet Infecting Mac, Android Devices
- Thousands of Exchange Servers Still Lack Critical Patch
- Unable to Throw the Book at Snowden, US Grabs Royalties
- Analysis: McAfee's Planned IPO
- Blackbaud: Hackers May Have Accessed Banking Details
- FBI, CISA Warn of DDoS Attacks Targeting November Election
- The Cybersecurity 202: Americans are as insecure as ever on the 17th annual Cybersecurity Awareness Month
- Millions Stolen in BEC Scam Campaign
- Universal Health Services Network Outage: Lessons to Learn
- APT Group Wages Cyber Espionage Campaign
- Profiles in Leadership: Nancy Hunter, CISO, Philadelphia Fed
- Thanos Ransomware Variant Fails to Overwrite MBR on Infected Devices
- Live Webinar | Fortify, Comply and Simplify Sensitive Data Security and Privacy Using a File Centric, Protect First Approach
- Anthem Hit With $48 Million in Additional Breach Penalties
- Russian Gets 7-Year Sentence for Hacking LinkedIn, DropBox
- Microsoft Issues Updated Patching Directions for 'Zerologon'
- Microsoft: Hacking Groups Shift to New Targets
- Live Webinar | A New Understanding of Risk: 6 Steps to Modern Third-Party Security
- Federal IoT Guidelines Move Closer to Becoming Law
- Fresh Joker Malware Variant Targeting Android Users
- Live Q&A: Address your Organisation's Greatest Security Challenges
- Compliance With 2 New Health Data Regs: Avoiding Pitfalls
- FBI, CISA Again Warn of Election Disinformation Campaigns
- Building Trust in Quantum Computing
- Cybersecurity Firm McAfee Files for IPO
- FBI Warns: Credential Stuffing Attacks on the Rise
- Universal Health Services' IT Network Crippled
- Government Software Supplier Hit By Ransomware
- Federal Judge Temporarily Blocks Trump's TikTok Ban
- It Is Cybersecurity Awareness Month: A Chat With NCSA And CISA To Learn What Is New This Year
- Want Your Coffee Machine Back? Pay a Ransom
- Microsoft Shutters Azure Apps Used by China-Linked Hackers
- Live Webinar | PKI as a Service: Exploring the Benefits and Selecting a Provider
- Federal Agency Hacked Using Stolen Office 365 Credentials
- Facebook Removes More Accounts Linked to Russia
- Premera Blue Cross Slapped With $6.8 Million HIPAA Fine
- Live Webinar | Mainframe Security For Today's Crazy World!
- Why Encrypted Chat Apps Aren't Replacing Darknet Markets
- Warning: Attackers Exploiting Windows Server Vulnerability
- GDPR Compliance Used as Phishing Lure
- Incident Response: Taking a More Deliberate Approach
- How a Phishing Awareness Test Went Very Wrong
- Calls Grow to Restore White House Cybersecurity Leader Role
- Mercenary Group Targets Real Estate and Architecture Firm
- Analysis: Are Darknet Markets Here to Stay?
- Live Webinar | App Defined, Autonomous and Delivered from the Cloud
- Lessons to Learn From Shopify Data Breach
- NIST Unveils Updated Guide to Privacy, Security Controls
- Drop Everything and Secure Remote Workforce, Gartner Warns
- Blackbaud Ransomware Breach Victims, Lawsuits Pile Up
- Police Crack SMS Phishing Operation
- HHS Issues Yet Another Big HIPAA Breach-Related Fine
- Former 'Silk Road' Associate Pleads Guilty to Lying to Feds
- Attacks Using Lokibot Information Stealer Surge
- OnDemand | Leveling Up Your Fraud Detection with Network Intelligence
- FBI, CISA Warn of Election Results Disinformation Campaigns
- COVID-19 Update: 'Live Like You're Contagious'
- Ransomware Danger: Russian-Speaking Gang Targets Russians
- 4 Phishing Attacks Making Waves Targeting VPNs and Brokers
- Continuously Validate Security to Maximize the Value of Your Investments
- Live Webinar | Mainframe Security Infrastructure That Is Ready For Today's Crazy World!
- Hefty HIPAA Fine After Breach Involving 'The Dark Overlord'
- 179 Arrested in Darknet Market Crackdown
- Unlocking the Five Steps to Proper Security Validation
- 'Dark Overlord' Hacker Sentenced to 5-Year Prison Term
- Cybercrime Review: Hackers Cash In on COVID-19
- Will US Indictments of Iranian Hackers Be a Deterrent?
- Cybersecurity Leadership: Risk Exposure Awareness
- Leaked FinCEN Reports Reveal Sensitive Security Details
- CISA Pushes Government Agencies to Patch 'Zerologon' Flaw
- CISA Pushes Gov't Agencies to Patch 'Zerologon' Flaw
- Live Webinar | M365 Security Concerns Inside Out
- Live Webinar | SASE Economics: The New Frontier of Cybersecurity
- Congress Questions NASA on Cybersecurity Efforts
- As TikTok Negotiations Continue, US App Ban Gets Delayed
- Hacking Group Used Malware to Bypass 2FA on Android Devices
- Live Webinar | Cisco: Securing Industrial IoT
- Senators Demand More Details on VA Breach
- Researchers Find Mozi Botnet Continues to Grow
- Analysis: Online Attacks Hit Education Sector Worldwide
- US Banning TikTok, WeChat Downloads
- Analysis: Cyberthreats in the Educational Sector Worldwide
- 3 Iranian Hackers Charged With Targeting US Satellite Firms
- Live Webinar | Leveraging AI in Next Generation Cybersecurity
- Why Darknet Markets Persist
- Analysis: Is Chinese Database Exposure a Cause for Concern?
- DOJ: 2 Russians Defrauded Cryptocurrency Exchanges
- U.S. Imposes Sanctions on Iranian APT Group
- Ransomware Attack at Hospital Leads to Patient's Death
- Dunkin' Data Breach Settlement Paves the Way for More Suits
- Maze Ransomware Attack Borrows RagnarLocker Hacking Move
- 2 Iranians Indicted for Lengthy Hacking Campaign
- Researcher Describes Risks Posed by Posting Boarding Passes
- Fines Tied to Failure to Provide Patients With Records
- 5 Chinese Suspects Charged in Connection With 100 Breaches
- 5 Fines Tied to Failure to Provide Patients With Records
- 2 Alleged Hackers Indicted for Defacing US Websites
- Iranian Hackers Exploiting Unpatched Vulnerabilities
- TikTok's Response to Trump? Let's Make a Deal
- Hackers Divert VA Payments Intended for Healthcare Providers
- Payment Card Skimming Hits 2,000 E-Commerce Sites
- Breach of COVID-19 Test Data Undermines Pandemic Response
- CISA: Chinese Hackers Targeting US Agencies
- Russia-Backed Hackers Try to Harvest Office 365 Credentials
- Patient Monitoring Software Vulnerabilities Identified
- IRS Seeks Fresh Ways to Trace Cryptocurrency Transactions
- TikTok Picks Oracle as US 'Technology Partner'
- TikTok Reportedly Picks Oracle as US 'Technology Partner'
- Does This Exposed Chinese Database Pose a Security Threat?
- Bipartisan Bill Looks to Create Secure Digital Identities
- Live Webinar | Are Your Cloud Solutions Multi-Taskers?
- Tally of Those Affected by Blackbaud Hack Soars
- Operators Behind ProLocker Ransomware Seek 'Big Game'
- DOJ Says Russian Went Beyond Election Disinformation
- Bug-Reporting Blues: The Vulnerability Disclosure Challenge
- Linux Malware Targets VoIP Networks to Steal Metadata
- Zeppelin Ransomware Floats Back Into View
- US Election Hack Attacks Traced to Russia, China, Iran
- Ransomware Gangs Find Fresh Ways to Make Victims Pay
- Microsoft: Hackers From Russia, China and Iran Target US Election
- Microsoft: Russia, China, Iran Hackers Target U.S. Election
- Palo Alto Networks Patches 6 Firewall Vulnerabilities
- Fed Studies Development of Digital Dollar
- Live Webinar | Trends in Third-Party Risk: How to Keep Your Program Ahead of the Curve
- Hackers Use Cloud Monitoring Tool to Install Cryptominers
- CISA Warns of Increased DDoS Attacks
- Cybersecurity Leadership: The New Threat Landscape
- Cybercriminals Prefer 'Old School' Money Laundering Methods
- Blackbaud Ransomware Victim Count Climbing
- Eyeing Bigger Targets, Ransomware Gangs Recruit Specialists
- JPMorgan Chase Investigating Misuse of Relief Loans
- Visa Warns of Fresh Skimmer Targeting E-Commerce Sites
- Phishing Campaign Uses Homepage Overlay to Trick Victims
- Ransomware and DDoS Attacks Disrupt More Schools
- Australian State Criticized for Breach Notification Delay
- Cyber Incidents Disrupt More Schools
- FCC: Rip and Replace Huawei, ZTE Gear to Cost $1.8 Billion
- Russian Indicted in Tesla Ransom Scheme
- Court Dismisses Privacy Case Against Google, Medical Center
- 99 Ransomware Problems - and a Decryptor Ain't One
- Live Webinar | Leveraging Machine Learning, Automation, and AI in Next Gen Cybersecurity
- EMV Contactless Payment Card Flaw Facilitates PIN Bypass
- BEC Scam Losses Surge as the Number of Attacks Diminish
- Privacy Framework Proposed to Address HIPAA Gaps
- Key Considerations for Privileged Access Management
- Stung by Ransomware, Australia Urges Better Preparation
- Ransomware Remains 'Significant' Threat, Australia Warns
- Online Voting Startup Wants to Limit Some Security Research
- Tracking the Targets of 'Cybersquatting' Attacks
- Senators Seek Sanctions for Election Interference
- US Agencies Must Create Vulnerability Disclosure Policies
- The Risks Posed by Mobile Health Apps
- 'Salfram' Email Campaign Spreads Malware to Businesses
- The Need to Modernize Fraud-Fighting Methods
- Equifax Breach: CISO Describes Lessons Learned
- Data Breach Reports Fall 45% in UK
- AlphaBay Moderator Sentenced to 11 Years in Prison
- Another Twitter Hack: This Time, India's Modi Targeted
- Live Webinar | Remote Working with Teams & Zoom - Stay Secure & Avoid Data Loss
- Regulator Offers Asset Management, Mobile App Advice
- Chinese Hackers Use Fresh Trojan for Espionage
- Modernizing client PCs to cope with today's security challenges
- 'Zero Trust': The Need for Micro Segmentation
- Which Cybersecurity Incidents Involve Misuse of Legitimate Services
- Fraudsters Use Telegram App to Steal Payment Card Data
- Norway's Parliament Investigates Email Hacks
- Bye-Bye Bitcoins: Empire Darknet Market 'Exit Scams'
- FBI, CISA Reject Russian Claim US Voter Data Was Stolen
- Iranian Hackers Reportedly Selling Network Access to Others
- Mental Health as a Security Vulnerability
- Building Privacy-Centered Contact-Tracing Apps
- Russian Election Misinformation Campaign Re-Emerges
- Morgan Stanley Hit With $5 Million Data Breach Suit
- Cybersecurity Leaders: Planning (and Budgeting) for 2021
- 'UltraRank' Gang Sells Card Data It Steals
- Cisco Alert: Hackers Targeting Zero-Day Flaws in IOS XR
- EHR Vendor Settles HITECH Fraud Case
- Class Action Lawsuit Questions Blackbaud's Hacker Payoff
- COVID-19 Phishing Scheme Spreads AgentTesla Trojan
- The SASE Model: What's Driving Adoption?
- Lack of MFA May Have Enabled Sendgrid Account Compromise
- Lack of MFA May Have Caused Sendgrid Account Compromise
- Ex-Cisco Engineer Pleads Guilty in Insider Threat Case
- Live Webinar: Make the Most of Least Privilege: A Pragmatic Strategy
- DOJ Seeks to Recover Stolen Cryptocurrency
- Proposal for HIPAA Modifications Coming by Year's End
- Iranian Hackers Using LinkedIn, WhatsApp to Target Victims
- Alleged BEC Scammer Extradited From Ghana
- Malware-Wielding Extortionists Target Tesla: 8 Takeaways
- Improving the Detection of Medicare Fraud
- 'Lemon Duck' Cryptominer Aims for Linux Systems
- Equifax CISO Jamil Farshchi Reflects on Breach, Recovery
- Elon Musk Says Tesla Saved From 'Serious' Ransom Attempt
- Analysis: The Unusual Case Against Former Uber CSO
- How SASE enables Zero Trust?
- New Zealand Stock Exchange Trades Again After DDoS
- Qbot Banking Trojan Now Hijacks Outlook Email Threads
- DDoS Attacks Shut Down New Zealand Stock Exchange
- US Agencies Warn of Uptick in North Korean Bank Heists
- Implications for CSOs of Charges Against Joe Sullivan
- Live Webinar | Identity as the Foundation of Zero Trust
- 'Hidden' PHI in Medical Images Poses Risks
- As Classes Resume, Schools Face Ransomware Risk
- Lazarus Group Uses Spear Phishing to Steal Cryptocurrency
- Using Artificial Intelligence to Fight Money Laundering
- Luxury Real Estate Rivalry Involved Hired Hackers
- State CISOs: Doing More With Less in the COVID-19 Era
- Live Webinar | Privileged Access 101: The Basics & Beyond
- Industry Groups Urge FTC to Modify Breach Notification Rule
- The 'Backdoor' Risks to Political Campaigns
- 4 Risk Mitigation Principles for the Remote Workforce
- More Ransomware Gangs Threaten Victims With Data Leaking
- Apple Disagrees With Report About Mintegral Ad SDK
- From Hero to Zero, What Does it Mean to Secure Using "Zero Trust"
- Tech Spotlight: Supporting work from home during unprecedented times
- COVID-19 Data Compromised in 'BlueLeaks' Incident
- Massive Freepik Data Breach Tied to SQL Injection Attack
- How Fraudsters Are Adapting to Changes in Payment Methods
- TikTok Sues Trump Administration to Fight Against Ban
- Alert: Vishing Attacks Are Surging
- Ransomware: DarkSide Debuts; Script-Kiddies Tap Dharma
- 2 ATM Manufacturers Patch Vulnerabilities
- FINRA Warns Of Spoofed Websites Impersonating Real Brokers
- Tech Spotlight: Securing the Remote Workforce: Managing Your Endpoints
- How Enterprises Can Effectively Operate 'Zero Trust'
- Tech Spotlight: Zeroing-in On Zero Trust
- COVID-19: A Test on Our 'Zero Trust' Posture
- 'Zero Trust': The Foundation for Next-Generation Security
- Analysis: Why a NotPetya Lawsuit Was Dismissed
- University of Utah Pays Ransom to Avoid Data Disclosure
- APT Group Targeting Military Refines Its Tactics
- Lucifer Botnet Now Can Target Linux Devices
- Australian Online Health Platform Fined for Data Practices
- Former Uber CSO Charged With Covering Up 2016 Data Breach
- Analysis: Why Ransomware Gangs Getting Bigger Payoffs
- Live Webinar | The Home is the New Battleground for CISOs and their Executive Teams
- Dozens Arrested in ATM Cash-Out Scheme
- Medical Records Exposed via GitHub Leaks
- CISA, FBI Warn of Malware Tied to North Korean Hackers
- Steve Bannon, 3 Others, Indicted for Online Fraud
- How Fraudsters Are Circumventing AI-Based Prevention Efforts
- IBM Finds Flaw in Millions of Thales Wireless IoT Modules
- So You Want to Build a Vulnerability Disclosure Program?
- Biometric Technology: Assessing the Risks
- How COVID-19 Is Changing CISOs' Approaches to Security
- 'FritzFrog' P2P Botnet Targets SSH Servers
- Twitter Hack: Incident Response Lessons
- Securing Remote Access With Risk-Based Authentication
- Marriott Faces Another Data Breach Lawsuit
- Marriott Hit With Data Breach Lawsuit
- Live Webinar | Maintaining Your Mission: The Need for Complete Cyber Protection
- Live Webinar | Avoid The Top 10 Excuses of Third-Parties: Refine Your Security Program
- Emerging Risk Management Issue: Vendors Hit by Ransomware
- Live Webinar | Cybersecurity in Healthcare Supply Chains: A CISO Perspective
- Final Report: More 2016 Russian Election Hacking Details
- Election Security: A Progress Report From CISA's Krebs
- Ransomware Payday: Average Payments Jump to $178,000
- The SASE Model: A New Approach to Security
- Phishers Grab Microsoft Credentials With Fake SharePoint Emails
- Credential-Stuffing Attacks Affect Canadian Services
- Technical Woes Hamper California's COVID-19 Data Collection
- Incident Response: Taking a More Deliberate Approach
- One Malicious Link Unlocks Alexa's Voice History
- Trump Orders TikTok Owner to Divest US Operations
- Trump Orders TikTok Owner to Divest From US Operations
- Is CREST Penetration-Testing Certification Being Gamed?
- $28 Billion for State Security, IT Upgrades Proposed
- Live Webinar | ANZ Third-Party Risk Management: Best Practices for an Effective and Efficient Program
- Live Webinar | EMEA Third-Party Risk Management: Best Practices for an Effective and Efficient Program
- North Korean Hackers Wage Job-Themed Spear-Phishing Attacks
- Live Webinar | Third-Party Risk Management: Best Practices for an Effective and Efficient Program
- Is CREST Penetration Certification Test Being Gamed?
- Live Webinar | Third-Party Risk Management: Best Practices for an Effective and Efficient Program
- DOJ Official Spells Out Concerns About TikTok, WeChat
- Alert: Russian Hackers Deploying Linux Malware
- How Dharma Ransomware-as-a-Service Model Works
- MassMutual Taps Into the Power of Data Science
- Analysis: Did Barclays Go Too Far in Monitoring Employees?
- Derek Manky of FortiGuard Labs on the Shift to Proactive Defense
- US Seizes $2 Million in Cryptocurrency From Terrorist Groups
- Health Data Breach Tally Surges
- NIST Issues Final Guidance on 'Zero Trust' Architecture
- Live Webinar | Defining the Value of Email Security
- RedCurl Cyber Espionage Gang Targets Corporate Secrets
- Thwarting BEC Scams That Target Privileged Users
- SANS Institute Sees Its Breach as Teachable Moment
- VP Pick Kamala Harris Has Supported Election Security Bills
- More Microsoft Zero-Day Flaws Being Exploited
- Live Webinar | Why Phish Slip Past Your 'Secure' Email Gateway - and What You Can Do
- Maze Reportedly Posts Exfiltrated Canon USA Data
- Unsecured Database Exposed on Web - Then Deleted
- Beware: AgentTesla Infostealer Now More Powerful
- Avaddon Ransomware Joins Data-Leaking Club
- Jeanette Manfra on 'Compliance Without Compromise'
- BEC Scam Costs Trading Firm Virtu Financial $6.9 Million
- Congressman Makes Case for National Patient ID
- University Investigates Skimming of Credit Card Data
- Snapdragon Chip Flaws Could Facilitate Mass Android Spying
- Snapdragon Chip Flaw Could Facilitate Mass Android Spying
- Ransomware Reportedly Hits Ventilator Maker
- Phishing Campaign Spoofs SBA Loan Offer
- Phishing Scam Spoofs SBA Loan Offer
- BEC Scam Targets Executives' Office 365 Accounts
- Panel
- Barclays Faces Employee Spying Probe
- How Was Reddit Defaced?
- US Intelligence Adds More Details on Election Interference
- FBI on China, Election Security and Impact of COVID-19
- The Debate Over Trump 'Ban' of TikTok, WeChat
- Researchers: IoT Botnets Could Influence Energy Prices
- Exploring the Forgotten Roots of 'Cyber'
- Capital One Fined $80 Million Over 2019 Breach
- 'Zero Trust': A Strategy for Success
- Using Machine Learning to Fight Money Laundering
- Fighting Fraud in a Hyper-Digital World: Intelligence, Interdependence, and Impact
- Trump Signs Executive Orders Banning TikTok, WeChat
- Analysis: Hijacking of Twitter Hacker's Virtual Hearing
- Global Cybercrime Surging During Pandemic
- Election Security: A Harsh Assessment
- Interpol: Global Cybercrime Surging During Pandemic
- Canon USA Websites Offline Following Cyber Incident
- Banking on Uncertainty - The Future of Financial Crime and Compliance
- Twitter Rushes to Fix Flaw in Android Version
- Building a Stronger Security Infrastructure
- Location Behavioral Biometrics for Frictionless Mobile Fraud Prevention
- Shape
- Security Operations In This New Paradigm
- Screams, Porn Interrupt Virtual Hearing for Twitter Suspect
- Expanding Telehealth: The Privacy, Security Issues
- Garmin Reportedly Paid a Ransom
- How WastedLocker Evades Anti-Ransomware Tools
- FBI Warns of Serious Risks Posed by Using Windows 7
- NSA: Beware of Devices Collecting Location Data
- Fighting Fraud in a Hyper-Digital World: Intelligence, Interdependence, and Impact
- How IAM Empowers Businesses to
- The Role of Digital Identity in New Account Opening
- A Flaw Used by Stuxnet Wasn't Fully Fixed
- Behavioral Biometrics: Avoiding Mistakes
- Effective Fraud Prevention - It takes a village
- Keep Ahead of the Fraudsters: Product Innovation and Scaling in Fraud Prevention
- The Next Wave of AI Technologies to Enhance your Fraud Platform
- Synthetic Identity Fraud: Another Pervasive Virus We Must Fight Together in 2020
- Users Beware: Spotting a Microsoft Renewal Scam
- FBI Warns of Surge in Fraudulent Shopping Websites
- House Again Votes to Lift National Patient ID Ban
- Alleged GandCrab Distributor Arrested in Belarus
- Alert: Chinese Malware Targeting IT Service Providers
- Extended Enterprise: Threats, Gaps and How to Fight Them
- Twitter Hack: Suspects Left Easy Trail for Investigators
- Live Webinar | Shadow IoT: Exposing Unknown and Unauthorized Devices
- Breaches Tied to Pharmacy Looting: Security Lessons
- Insights on Revamping Recovery Strategies
- Secret Service Agent Offers Cybercrime-Fighting Insights
- FastPOS Malware Creator Pleads Guilty
- Fraud Detection: Lessons From Novartis Case
- EU Issues First Sanctions for Cyberattacks
- Microsoft May Be TikTok's Privacy and Security Lifeline
- EU Issues First-Ever Sanctions Over Past Cyberattacks
- North Korean Hackers Targeted US Aerospace, Defense Firms
- FastPOS Malware Creator Pleads Guilty to Federal Charges
- 3 Charged in Twitter Hack
- Medical Device Security Alerts: The Latest Updates
- Twitter Hackers Targeted Employees With Phone Phishing
- Boot-Loading Flaw Affects Linux, Windows Devices
- Live Webinar: Top Use Cases for Risk-based Analytics in Banking
- FBI: COVID-19-Themed Phishing Spreads Netwalker Ransomware
- Blackbaud's Bizarre Ransomware Attack Notification
- Analysis: The Hacking of Mobile Banking App Dave
- ONC's Donald Rucker: More Work to Do on Health Data Privacy
- Questions Persist About Ransomware Attack on Blackbaud
- VPN Vulnerabilities Put Industrial Control Systems at Risk
- Lazarus Group Reportedly Now Wielding Ransomware
- An Attacker's IoT Paradise: Billions of Insecure Devices
- Former Twitter Staffers Face Additional Charges
- GOP Proposal: $53 Million for COVID-19 Research Security
- Rapid Digitization and Risk: A Roundtable Preview
- Privacy Provisions Pushed for COVID-19 Relief Bill
- 8 Tips for Crafting Ransomware Defenses and Responses
- GDPR Two Years On: Compliance Lessons Learned
- Navigating the Cybercrime Landscape
- Phishing Campaign Uses Fake SharePoint Alerts
- US, UK Agencies Warn: QNAP NAS Devices Vulnerable
- HCA Healthcare's CSO on Leadership Under Fire
- Mitigating Brand Impersonation Fraud
- Anatomy of a Breach: Criminal Data Brokers Hit Dave
- 7 Summer Travel Security Tips
- Emotet Returns With Old Tricks, Malware Partners
- Live Webinar | 3 Things To Consider When Building A Secure Identity-Based Perimeter
- LifeSpan Health System Hit With $1 Million HIPAA Fine
- Garmin Confirms Hackers Encrypted Several Systems
- US Intelligence Warns of Foreign Election Interference
- CISA: Attackers Are Exploiting F5 BIG-IP Vulnerability
- The Hacker Battle for Home Routers
- Building a Resilient Workforce
- Detecting Payroll Fraud With Data Analytics
- FBI Warns US Firms About Malware in Chinese Tax Software
- Lazarus Group Deploying Fresh Malware Framework
- FBI Warns US Firms Over Malware in Chinese Tax Software
- NSA, CISA Warn of Threats to US Critical Infrastructure
- How Criminals Are Using PPE as a Money-Laundering Tool
- $1 Million Rewards Offered for Help in Finding SEC Hackers
- COVID-19: The Impact of 'Uncontrolled Spread'
- The Celebrity Twitter Hack: What Happened?
- Live Webinar | Work from Anywhere: The Mission - Critical Workforce Needs Dedicated, Portable & Secure Connectivity
- Email Breach Leads to HIPAA Fine for Small Clinic
- Analysis: OCC's Decision on Banks and Cryptocurrency
- First American Title Insurance Co. Faces Charges in NY
- Dutch Lawmaker's Twitter Account Among 36 With Data Exposed
- Report on Russia Reveals UK Response: Don't Ask, Don't Tell
- FBI Alert Warns of Increase in Disruptive DDoS Attacks
- China-Backed APT Group Reportedly Targets India, Hong Kong
- Securing the Hybrid Cloud
- Back to the Office: Managing the Risks
- Update: Emotet Botnet Delivering Qbot Banking Trojan
- Phishing Attacks Dodge Email Security
- 'Crypto' Scammers Weren't the First to Crack Twitter
- Alleged Cypriot Hacker Extradited to US to Face Charges
- Here's How Your Phone Charger Could Be Hacked
- Using AI to Mitigate the Risk of Collusion With Vendors
- Democrats Request FBI Briefing on Election Interference
- UK 'Failed' to Probe Threat of Russian Election Interference
- DOJ: Chinese Hackers Targeted COVID-19 Vaccine Research
- Live Webinar | Beyond Passwordless: Identity as the New Perimeter
- Work from Anywhere: The Mission - Critical Workforce Needs Dedicated, Portable & Secure Connectivity
- CISO Notebook: Putting Frameworks Around Risk
- Conti Ransomware Identified as Ryuk’s Potential Successor
- Judge Rules Facebook's Lawsuit Against NSO Group Can Proceed
- Live Webinar | Redefining Endpoint Security: Three Ways to Maximize Operational Efficiency
- Breach Lawsuit Against Pediatric Dental Practice Dismissed
- Judge Rules Facebook's Lawsuit Again NSO Group Can Proceed
- Thousands of Flawed F5 BIG-IP Networking Products Unpatched
- Live Webinar: Exposed Environments: Cyber AI & Insider Threats
- Malicious Cryptocurrency Trading Apps Target MacOS Users
- Exposure Alert: Unsecured Internet Protocol Use Persists
- Battling ID Fraud With Behavioral Biometrics
- Twitter Hijackers Used Well-Honed Fraudster Playbook
- Iranian Hackers Accidentally Exposed Training Videos
- Emotet Botnet Returns After Months-Long Hiatus
- Congress Debates Renewal of National Cyber Director Role
- Live Webinar | Securing Modern Application Development
- Insights From INTERPOL on Using Threat Intelligence
- COVID-19 Contact-Tracing Apps: The Privacy Issues
- Industry Reactions to Twitter Hack: Feedback Friday
- Twitter attack highlights the need for security awareness training
- European Court Drops 'Privacy Shield' Over US Surveillance
- Cybersecurity Leadership: What We've Learned From COVID-19
- The Insider Threat: A Growing Concern
- Security Analysis: US Outmaneuvers UK on 'Huawei Question'
- ‘Tweet-tastrophe’? It could have been. Twitter hack reveals national security threat ahead of election
- Twitter Hack: A Sign of More Troubles Ahead?
- Several Prominent Twitter Accounts Hijacked in Cryptocurrency Scam
- Users Urged to Patch Critical Flaw in SAP NetWeaver AS
- US, UK, Canada: Russian Hackers Targeting COVID-19 Research
- Using Digital IDs to Fight Financial Fraud
- Several Prominent Twitter Accounts Hijacked in Crypto Scam
- Biden’s, Apple’s Twitter hacked in cryptocurrency scam
- Twitter Confirms it was Hacked in an Unprecedented Cryptocurrency Scam
- Contact tracing apps need to establish trust to be effective
- CISA funding bill, EAC hearing on 2020 primary woes on slate this week
- FBI, nonprofit distribute cybersecurity guidelines to fight employment scams
- Tech Startups Hemorrhaging Jobs During Pandemic
- Early Covid-19 tracking apps easy prey for hackers, and it might get worse before it gets better
- Be prepared: Why you need an incident response policy
- CLEAR is poised to lead the multibillion-dollar biometric screening race for the coronavirus
- Several Prominent Twitter Accounts Hijacked in Crypto Scam
- 2 Plead Guilty in Nationwide Telemedicine Fraud Scheme
- Microsoft: Patching 'Wormable' Windows Server Flaw Is Urgent
- Malware Hidden in Chinese Tax Software
- Security for Peripheral Devices at Energy Dept. 'Inadequate'
- How to Make the Most of Cyber Intelligence
- Phishing Campaign Used Chase Fraud Alert as Lure
- Britain's 5G Policy Failure: No Ideal Alternative to Huawei
- HHS Modifies Some Substance Use Disorder Privacy Provisions
- UK Reverses Course, Bans Huawei Gear From 5G Networks
- LiveAuctioneers Confirms Breach After Records Posted for Sale
- Completing Security Visibility with NDR
- Israeli Court Dismisses Complaint Against NSO Group
- Yet Again, Vulnerabilities Found in a Router
- Leveraging Analytics for Fraud Audits
- Fake DNS Security Upgrade Scam Compromises WordPress Websites
- Billing Vendor Breach Affects 275,000
- Wells Fargo Bans TikTok App on Company Devices
- Russian Found Guilty of Hacking LinkedIn, Dropbox
- No 'Invisible God': Fxmsp's Operational Security Failures
- Not the Cat's Meow: Petnet and the Perils of Consumer IoT
- US Secret Service Forms Cyber Fraud Task Force
- Zoom-Themed Phishing Campaign Targets Office 365 Credentials
- Coordinating Disclosures of Medical Device Vulnerabilities
- Updated Joker Android Malware Adds Evasion Techniques
- Cybercrime Research: For the Greater Good, or Marketing?
- 5 Billion Unique Credentials Circulating on Darknet
- Malware Found Pre-Installed on Low-Cost Android Smartphones
- Analysis: Monitoring the Risks Posed by Remote Workers
- Health Data Breach Trends: A Mid-Year Assessment
- APT Group Targets Fintech Companies
- Fxmsp Probe: Feds Say Group-IB Report Forced Its Hand
- Live Webinar | Work from Home: Identity and Access Governance and Data Breach Risks
- Live Webinar | Building a Secure, Convenient Customer Journey - The convenience-security paradox
- Alerts: Flaws in Ultrasound, Open-Source Hospital Systems
- Feds Indict 'Fxmsp' for Hacking Multiple Firms
- Employee Surveillance: Who's the Boss(ware)?
- CCPA Enforcement: What to Expect Now
- DIACC: Building a Fully Digital Canada
- Microsoft Seizes Domains Used for COVID-19 Phishing Scam
- Live Webinar | Protect Your Keys - or Don't Waste Time Encrypting Your Data (Portuguese Language)
- Russian BEC Gang Targets Hundreds of Multinational Companies
- Purple Fox Malware Targets More Vulnerabilities
- Ransomware + Exfiltration + Leaks = Data Breach
- More Than 1,000 IoT Security Guidelines: Which One to Use?
- Just How Lucrative Are BEC Scams?
- Lawsuits After Ransomware Incidents: The Trend Continues
- Patching Urged as F5 BIG-IP Vulnerability Exploited
- .CRIMSON Ransomware Module Shipped With Java STRRAT
- What You Don't Understand About Crypto Can Hurt You
- North Korean Hacking Infrastructure Tied to Magecart Hits
- Progress Report: FIDO's Effort to Eliminate Passwords
- Hey Alexa. Is This My Voice Or a Recording?
- How Ekans Ransomware Targets Industrial Control Systems
- NASA Still Struggling With Agency-Wide Cybersecurity Program
- Apache Guacamole Vulnerable to Reverse RDP Vulnerabilities
- Operators Behind Valak Malware Expand Malicious Campaign
- Detecting Network Security Incidents
- Digital IDs: A Progress Report
- European Police Hack Encrypted Communication System
- HHS Hopes to Tackle Long-Stalled Regulatory Tasks
- POS Malware Using DNS to Steal Payment Card Data
- WastedLocker Ransomware Targets US Newspaper Company
- Studying an 'Invisible God' Hacker: Could You Stop 'Fxmsp'?
- Ex-Fraudster Brett Johnson: 'There Are Going to Be a Lot of Victims'
- It's Official: CCPA Enforcement Begins
- 10 Steps to Improving Business Resilience with Third-Party Risk Management
- FCC: Huawei, ZTE Are 'National Security Threats'
- Building Trust in Digital Identities
- Guarding Against COVID-19 Fraud Schemes
- Ondemand Webinar | Navigating the Security Maze of the Remote Worker with Splunk
- OnDemand Webinar | Securing the New Hybrid Workforce: IT Best Practices for Balancing On-Premises and Remote Teams
- FakeSpy Android Malware Disguised as Postal Service Messages
- OnDemand | Secure & Streamline Workforce and Customer Experiences
- Ransomware Targets Mac Users
- Victim Count in Magellan Ransomware Incident Soars
- Bills Call for State, White House Cybersecurity Coordinators
- Brute-Force Attacks Targeting RDP on the Rise
- OnDemand | Excelling in Difficult Times and Doing Business in the New Normal
- US Cyber Command Alert: Patch Palo Alto Networks Products
- OnDemand | New Threats in the Age of the Dynamic Workforce
- Co-Creator of Site That Sold Payment Card Data Pleads Guilty
- Data Breach Settlement Has an Unusual Provision
- UCSF Med School Pays $1.1 Million Ransom
- Fxmsp Hackers Behind AV Source Code Heist: Still Operating?
- Hacking Timeline: Fxmsp's Rise and Apparent Fall
- Magecart Card Skimmer Hidden in Image's EXIF Metadata
- Japan's IoT Scanning Project: Insecure Devices Found
- Russian Cybercriminal Behind 'Cardplanet' Site Sentenced
- Live Webinar | The Post-Pandemic New Normal: Rethink and Rebuild Cyber Security
- Payment Card Skimmer Attacks Hit 8 Cities
- Breach Aftermath: Authorities Order Lab to Improve Security
- Attackers Target Vulnerable Exchange Servers
- Satori Botnet Co-Creator Sentenced
- PCI Council's Efforts to Fight Fraud During COVID-19 Crisis
- How Amazon and Walmart Could Fix IoT Security
- Hackers Used Malicious Docker Images to Mine Monero
- Analysis: Keeping IoT Devices Secure
- Breach Notification Delay: A Step-by-Step Timeline
- Live Webinar | 8 Ways to Tackle the Biggest Access-Related Information Security Challenges in Financial Services
- Hacker Group Stole $200 Million From Cryptocurrency Exchanges
- European Bank Targeted in Massive Packet-Based DDoS Attack
- US Now Accuses Assange of Conspiring With Hacking Groups
- Nurses Allege Hospital Falsified COVID-19 Testing
- $90 Million Seized in Fraud Case Tied to BTC-e Exchange
- Evil Corp's 'WastedLocker' Campaign Demands Big Ransoms
- Sodinokibi Ransomware Gang Targets POS Software
- Advantage CISO: Why Cybersecurity Should Shine in 2021
- Getting the Most From Information Security Investments
- Ransomware Gangs Go (Lady) Gaga for Data Breaches
- Enhancing the Security of Government Websites
- Ransomware Attacks in Healthcare: Are We Seeing a Surge?
- The Remote Workforce: Cloud Security Challenges
- Revamped IcedID Banking Trojan Campaign Uses COVID-19 Lure
- Police Data Leaked: A Sign of the Times?
- Spear-Phishing Campaign Uses Military-Themed Documents
- Microsoft's CyberX Acquisition: Securing IoT and OT
- French Court Upholds $56 Million Google GDPR Fine
- Nefilim Ransomware Gang Tied to Citrix Gateway Hacks
- French Court Upholds $57 Million Google GDPR Fine
- Telehealth After COVID-19: Privacy, Security Considerations
- Nephilim Ransomware Gang Tied to Citrix Gateway Hacks
- Nigerian Entrepreneur Pleads Guilty in $11 Million BEC Scam
- Smart Devices: How Long Will Security Updates Be Issued?
- Separate Phishing Attacks Target Wells Fargo, BofA Customers
- OnDemand Webinar | The "New Normal" Challenges Around Phishing, Remote Access, & Ease of Use
- Alerts: Vulnerabilities in 6 Medical Devices
- Google Removes More Than 70 Malicious Chrome Extensions
- Authorities Arrest Suspect in 2014 UPMC Data Breach
- When Offices Reopen, Will Security Incidents Be Discovered?
- COVID-19-Themed Phishing Campaigns Diminish
- Live Webinar: 10 Steps to Improving Business Resilience with Third-Party Risk Management
- Even Ethical Hackers Abuse Cloud Services
- Zoom to Offer End-to-End Encryption for All Users
- Deception Technology: Maximizing the Impact
- Britain Makes U-Turn on Digital Contact-Tracing App
- Analysis: Mitigating Risks in Multicloud Environments
- Congress Hears of Fresh Cyberthreats to US Financial Firms
- Maze Ransomware Gang Continues Data-Leaking Spree
- Cybersecurity Leadership: The Future Is Now - So, How Will You Secure It?
- Aerospace, Defense Firms Targeted With Fake LinkedIn Profiles
- Feds Indict Nigerian Nationals for Series of BEC Scams
- Live Webinar | Improving Third-party Security Management: A Case Study with CAPTRUST
- Coming Soon: 'Trust Mark' Certification for IoT Devices
- Ransomware News Roundup: Maze Gang Forms Extortion Cartel
- Many Mobile Banking Apps Have Exploitable 'Coding Errors'
- Business Associate Incidents Added to Breach Tally
- Live Webinar | Rise of the Machines: State of Unmanaged and IoT Device Security
- Mobile Banking Apps Riddled With Vulnerabilities: Report
- Ransom Demands: What Happens If Victims Pay or Don't Pay?
- Maze Ransomware Gang Strikes Chipmaker MaxLinear
- Race to the Cloud: Can Security Keep Pace With Adoption?
- Millions of Connected Devices Have Exploitable TCP/IP Flaws
- CIA Finds it Failed to Secure Its Own Systems
- Report: CIA Failed to Secure Its Own Systems
- HHS Issues COVID-19 Plasma Donation HIPAA Guidance
- Hackers Can Use Light Bulbs to Eavesdrop: Study
- White House: US Firms Can Work With Huawei on 5G Standards
- Data Breach Extortion Campaign Relies on Ransomware Fear
- Why It's Time to Update Your IAM
- Italian Security Firm Allegedly Pushed Malware: Report
- After Guilty Plea, DDoS Attacker Gets 5-Year Prison Term
- Live Webinar | 3 Best Practices for Converged Physical and Cyber Workplace Access at Banks and Financial Institutions
- Live Webinar | Why APTs Can Be So Difficult To Find, Investigate, And Resolve
- COVID-19: 'Are We Done Yet?'
- OnDemand Webinar | 4 Challenges of the Modern Endpoint Network: Beyond (traditional) Corporate Boundaries
- Delivery Hero Confirms Foodora Data Breach
- Claire's: Magecart E-Commerce Hackers Stole Card Data
- Live Webinar | Securing the New Hybrid Workforce: IT Best Practices for Balancing On-Premise and Remote Teams
- Gamaredon Group Using Fresh Tools to Target Outlook
- Kubeflow Targeted in XMRig Monero Cryptomining Campaign
- COVID-19: Privacy, Security Concerns as Businesses Reopen
- Academic Study Finds Security Flaws in Online Voting Tool
- Multistage Ransomware Attacks Threaten Critical Infrastructure
- City Pays Ransom Despite Pre-Ransomware Outbreak Hack Alert
- Inside Europol's Latest Anti-Financial Crime Center
- Europol's Latest Anti-Financial Crime Center
- Lawmakers Demand Details on 2015 Juniper Data Incident
- Unsecured AWS S3 Buckets Infected With Skimmer Code
- OnDemand Webinar | Protect Your Network From Encrypted Threats
- Lawsuit Filed Against Accounting Firm in Patient Data Hack
- FBI Warns Of Increasing Use of Trojans in Banking Apps
- National Guard Prepping for November Election Security Role
- UpNp Vulnerability Could Affect Billions of IoT Devices
- Telehealth App Breach Spotlights Privacy, Security Risks
- The State of Payments Fraud in a Pandemic
- Kingminer Botnet Targeting SQL Servers for Cryptomining
- Financial and Economic Crime Targeted by New Europol Center
- Can Mobile Voting Be Secure?
- Building a Collective Defense
- Senate Report: Chinese Telecoms Operated Without Oversight
- Analyzing the Role of Digital Identity Management
- Phishing Attack Targeted German COVID-19 Task Force Firm
- US Energy Utilities Targeted by FlowCloud Malware
- Study Finds Open Source Vulnerabilities Doubled in 2019
- Phishing Attacks Traced to Indian Commercial Espionage Firm
- IoT Privacy and Security: Will Product Labels Help Buyers?
- 7 Ransomware Trends: Gangs Join Forces, Auction Stolen Data
- COVID-19 Adds to US Election Security Challenges: Report
- Are Academic Healthcare Systems Top COVID-19 Attack Targets?
- 7 Ransomware Trends: Gangs Join Forces, Decryptors Improve
- Maze Ransomware Gang Hits Defense Contractor ST Engineering
- IoT Exploits, Accidents and Vulnerabilities
- The Role of Customer IAM for Financial Institutions
- Making the Case for Modern IAM
- Report: Tycoon Ransomware Targets Windows, Linux Systems
- Virtual Summit Dives Into Healthcare Cybersecurity Issues
- Malware Uses USBs to Help Steal Data: Report
- Should 'Killer Robots' Be Banned?
- Unilever CISO on Security Priorities for Remote Workforce
- Google: Phishing Attacks Targeted Trump, Biden Campaigns
- Analysis: Why Identity Management Is Still a Challenge
- Maze Promotes Other Gang's Stolen Data On Its Darknet Site
- Live Webinar | 3 Things To Consider When Building A Secure Identity-Based Perimeter
- Phishers Use Fake VPN Alerts to Steal Office 365 Passwords
- COVID-19 Drives Spike in Mobile Phishing Attacks: Report
- Live Webinar | Evolving API Security to Keep Pace with Financial Services
- How Fraudsters Search for Victims Online
- Ransomware Attacks Hit 2 More Healthcare Organizations
- Live Webinar: The New Tomorrow - Transforming Security to Meet Today's Challenges
- REvil Ransomware Gang Auctioning Off Stolen Data
- Thousands of Exim Servers Vulnerable to Critical Flaw: Report
- Researchers Disclose 2 Critical Vulnerabilities in SAP ASE
- Excel 4.0 Macro Functionality Incorporated Into Ursnif Delivery Campaigns
- 'Anonymous' Leak of Minneapolis Police Data Is a Hoax
- Survey: Security Concerns Slow Down IoT Deployments
- Federal Agencies Reported Fewer Security Incidents in 2019
- Data Breach Lawsuit Filed Against Pediatric Care Provider
- Study: Breach Victims Rarely Change Passwords
- Building a Corporate Culture That Values Cybersecurity
- Trickbot Using BazarBackdoor to Gain Full Access to Targeted Networks
- Secure Digital Identity in the Age of Coronavirus
- Researcher Discloses 'Sign in with Apple' Zero-Day Flaw
- TrickBot Update Makes Malware Harder to Detect: Report
- Analysis: Verizon's Latest Data Breach Investigation Report
- Big GDPR Fines in UK and Ireland: What's the Holdup?
- Trickbot Replaces ‘Mworm’ Propagation Method With New ‘Nworm’ Module
- Weekly Security News Roundup: Average Ransomware Demand Grew 14 Times in One Year
- Former IT Administrator Sentenced in Insider Threat Case
- Suspected Hacker Faces Money Laundering, Conspiracy Charges
- Hackers Breached 6 Unpatched Cisco Internal Servers
- Identity Verification in Healthcare: Revamping a Framework
- Revamped Valak Malware Targets Exchange Servers
- OnDemand | Implementing Zero Trust
- Top Ransomware Attack Vectors: RDP, Drive-By, Phishing
- NSA: Russian Hackers Targeting Vulnerable Email Servers
- Capital One Must Turn Over Mandiant's Forensics Report
- Analysis: Surge in Attacks Against Banks
- Live Webinar | Navigating the Security Maze of the Remote Worker with Splunk
- LiveJournal Blog Platform Credential Leak: What Happened?
- Bipartisan Bill Would Boost Cybersecurity Research
- Safeguarding COVID-19 Research, Other Intellectual Property
- 'Hack-for-Hire' Groups Spoof WHO Emails to Steal Data
- Ransomware Gangs' Ruthlessness Leads to Bigger Profits
- PonyFinal Ransomware Leverages Brute-Force Attacks to Access Networks
- 'Hack-for-Hire' Groups Spoofing WHO Emails to Steal Data
- Researcher Contends Trend Micro's RootkitBuster Busted
- How Smaller Companies Can Set Cybersecurity Priorities
- Live Webinar | 2021: A Cybersecurity Odyssey
- Live Webinar | EMEA 2021: A Cybersecurity Odyssey
- HHS's COVID-19 Response, Recovery Efforts to Be Scrutinized
- Another Alleged FIN7 Cybercrime Gang Member Arrested
- Live Webinar | How the Dynamic Workforce is Changing Threat Detection and Response
- Live Webinar | 5 Critical Security and Privacy Lessons From CCPA Litigation
- Russian Hackers Revamp Malware, Target Governments: Report
- Office 365 Credentials Targeted by Fake Supreme Court Phishing Attacks
- Videoconferencing: Think Twice Before Hitting 'Record'
- Discord Client Modified to Steal Users’ Plaintext Passwords
- test
- Modern Bank Heists 3.0: 'A Hostage Situation'
- AMA Outlines Privacy Principles for Health Data
- Setting IAM Priorities in the Shift to the Cloud
- Live Webinar | Customer Identity: Building Secure, Seamless Experiences
- Britain Re-Evaluating Huawei's Role in 5G Rollout
- New Android Malware Channels Malicious Activity Through Accessibility Services
- Lawmakers Demand Details on Fighting China-Linked Hacking
- How to Avoid Unnecessary Breach Reporting
- Mercedes-Benz Data Leak Lesson: Lock Down Code Repositories
- ZLoader Banking Malware Resurfaces
- New Version of ZLoader Banking Malware Resurfaces
- Weekly Security News Roundup: ‘Silent Night’ Malware Reminiscent of ZeuS
- UK Data Breach Reports Decline
- Mercedes-Benz Data Leak: Embarrassing But Endurable
- Framework for Managing Identity in Healthcare Introduced
- Phishing Campaign Leverages Google to Harvest Credentials
- Hackers Tried to Exploit Zero-Day Flaw in Sophos Firewall
- Microsoft Warns of COVID-19 Phishing Emails Spreading RAT
- RagnarLocker Deploys a Virtual Machine to Hide Ransomware
- Analysis: The Long-Term Implications of 'Work From Home'
- Live Webinar | Cloud Security for a New World of Work
- Magento Plugin Flaw Leaves Online Shoppers Open to E-Skimming Attacks
- Hacked Law Firm May Have Had Unpatched Pulse Secure VPN
- Bank of America: COVID-19 Loan Data May Have Leaked
- Remote Workforce Security - the Long Game
- AST as the Key to DevSecOps Maturity
- Hot Offering on Darknet: Access to Corporate Networks
- Apple and Google Release Contact-Tracing APIs for COVID-19
- What You Don't Understand About Crypto Can Hurt You
- Police Allege Hacker Sold Millions of Email Credentials
- Phishing Attack Bypassed Office 365 Multifactor Protections
- Australia's Digital Health Records System Was Attacked
- How CISOs Can Achieve Better Network Visibility
- New Microsoft Azure AD Sign-In Page Spoofed in Numerous Phishing Campaigns
- NCSA Announces Partnership with National White Collar Crime Center
- Toll Group Data Leaked Following Second Ransomware Incident
- Verizon: Breaches Targeting Cloud-Based Data Doubled in 2019
- U.S. Treasury Warning: Beware of COVID-19 Financial Fraud
- Spoofed Website Templates Help Spread COVID-19 Scams: Report
- DoJ Blasts Apple on Lack of Encryption Backdoor - Again
- Cybersecurity Leadership: What's Your 180-Day Plan?
- EasyJet Data Breach Exposes 9 Million Customers' Details
- Live Webinar | 5 Critical Items in EMEA to Consider When Securing Medical Devices
- Mandrake Espionage Platform Selects Android Devices for Exploitation
- Live Webinar | Evolving API Security to Keep Pace with Financial Services
- Why Cyberthreats Tied to COVID-19 Could Hit Diverse Targets
- GAO: Chemical Plants Vulnerable to Cyberattacks
- Live Webinar | Cyberthreats on the META Horizon: Threat Landscape in the New Reality
- Supercomputer Intrusions Trace to Cryptocurrency Miners
- Developer in Cyprus Claims Breach of Contacts App
- Weekly Security News Roundup: WannaCry Dominated Ransomware Detections in Q1 2020
- Ransomware Gang Demands $42 Million From Celebrity Law Firm
- Congress to Consider Competing COVID-19 Privacy Bills
- Android Spyware Hidden in Apps for 4 Years: Report
- 'Security Incident' Knocks UK's ARCHER Supercomputer Offline
- Australia Passes Privacy Law for Contact-Tracing App
- The Urgency of Re-Examining Security Practices During Pandemic
- Crypto-Lock and Tell: Ransomware Gangs Double Down on Leaks
- Investment Firm Hit by BEC Scam
- Analysis: Securing RDP to Prevent Ransomware Attacks
- Ransomware Reminder: Paying Ransoms Doesn't Pay
- Fresh Twist for Pandemic-Related Phishing Campaigns
- Cyber-Espionage Malware Targets Air-Gapped Networks: Report
- 'Smart' Factories Could Face Unique Attacks: Report
- Group Behind WannaCry Now Using New Malware
- US Says China-Linked Hackers Targeting COVID-19 Researchers
- Ransomware Attackers Exfiltrate Data From Magellan Health
- US Say China-Linked Hackers Targeting COVID-19 Researchers
- Live Webinar: What You Don't Understand About Crypto Can Hurt You
- Live Webinar | Your Next Security Risk Assessment Needs to Talk Dollars and Sense
- Patch or Perish: Nation-State Hacker Edition
- Cybersecurity Education for the Remote Workforce
- Microsoft Lists Critical Flaws That Need Urgent Patching
- Toll Group Says Ransomware Attackers Stole Data
- COVID-19: 3 Future Scenarios
- Health Data Breach Update: What Are the Causes?
- Live Webinar | The State of Application Security
- ATM Manufacturer Diebold Nixdorf Hit With Ransomware
- Enhanced Zeus Sphinx Trojan Used in COVID-19 Schemes
- Astaroth Trojan Employed YouTube Channels as C&C to Evade Detection
- Thunderspy Vulnerabilities Put Some Thunderbolt Users at Risk of Data Theft
- New Thunderbolt Flaws Disclosed to Intel
- As E-Commerce Surges During Pandemic, Fraud Spikes Too
- The Fraud Implications of E-Commerce Surge During Pandemic
- Pitney Bowes Battles Second Ransomware Attack
- Hacking Group Offers Another 27 Million Records for Sale: Report
- FTC Assessing Whether Its Health Data Breach Rule Is Stale
- The Fraud Implications of Ecommerce Surge During Pandemic
- ‘Blue Mockingbird’ Attempts to Distribute Monero Miners to Enterprise Targets
- The Future of Cloud Security
- Live Webinar | Hackers Have First-Move Advantage - How Can We Rapidly Equip Cyber Ready Humans To Respond?
- The 'Death' of the Office
- Remote Workforce Security: The Role of 'Zero Trust'
- Cognizant: Ransomware Attack Expense at Least $50 Million
- Botnet Watch: Anubis Mobile Malware Gets New Features
- Weekly Security News Roundup: Dacls RAT Begins Targeting Mac Users
- Hackers Try to Sell 26 Million Breached Records: Report
- Testing Medical Device Security During COVID-19 Crisis
- APT Group Wages 5-Year Cyber-Espionage Campaign: Report
- Zoom's NY Settlement Spells Out Security Moves
- Analysis: The Contact-Tracing Conundrum
- Webcast: Keeping Remote Workers Safe and Your Work Secure
- Challenges of 'Unique' Care Delivery During COVID-19
- Ransomware Slams Healthcare, Logistics, Energy Firms
- JavaScript Skimmers Found Hidden in 'Favicon' Icons
- Why Are We So Stupid About RDP Passwords?
- GoDaddy Confirms Breach Affecting 28,000 Accounts: Report
- Live Webinar | A Practical Approach to Zero Trust Security
- Russian a Suspect in German Parliament Hack: Report
- HHS Issues Security, Privacy Guidance for COVID-19 Issues
- Live Webinar | 2021: A Cybersecurity Odyssey
- Kaiji Botnet Targets Linux Servers, IoT Devices
- Digital Contact-Tracing Apps Must Win Hearts and Minds
- New ‘Kaiji’ Linux Malware Targeting IoT Devices
- Suspected InfinityBlack Hackers Arrested
- Malspam Campaigns Attempt to Install Remote Access Trojans
- Alert: APT Groups Targeting COVID-19 Researchers
- Malspam Campaigns Attempt to Install Remoted Access Trojans
- 2020 Cyber Threats, Trends and Attacks
- FINRA Warns of Phishing Emails Targeting Members
- Google, Apple Reveal More Contact-Tracing Details
- LockBit Ransomware Performs Targeted Attacks With Automated Distribution
- EventBot Mobile Banking Trojan Could Infect Over 200 Financial Services Apps
- Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'
- Identity: The Future is Now
- Executive Order's Focus: Protecting Power Grid Supply Chain
- GAO: HHS Has Failed to Act on Security Recommendations
- Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning
- Vulnerabilities in LMS Plugins Allow Students to Access Records, Edit Data
- Fake Labor Department Emails Designed to Spread TrickBot
- Digital Contact-Tracing Apps: Hype or Helpful?
- Nintendo Source Code for N64, Wii and GameCube Leaked
- Weekly Security News Roundup: Shade Ransomware Authors Release 750K Decryption Keys
- Account Takeovers: Why Fraud Losses Are Growing
- Live Webinar | Best Practices for Securing Unmanaged and IoT Devices at Massive and Growing Scale
- Latest Phishing Campaign Spoofs Microsoft Teams Messages
- Live Webinar | What Is the New Normal? What You Need to Know for Modern, Distributed Security Best Practices
- Live Webinar | Take Control: Complete Visibility and Unmatched Security for Unmanaged and IoT Devices
- CISA Urges Federal Agencies to Use Approved DNS Service
- Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2
- Work-at-Home: The Impact on Security
- Darknet Markets Push Fake Coronavirus Vaccines, Test Kits
- Phishing Campaigns Target Senior Executives via Office 365
- Analysis: Ransomware's Costly Impact
- LabCorp Shareholder Sues Company Over Data Breaches
- Contact-Tracing Apps: Privacy Group Raises Concerns
- RDP Brute-Force Attacks Rise During COVID-19 Crisis: Report
- Ransomware: Average Business Payout Surges to $111,605
- Data Breach Settlement Calls for Enhanced Security Measures
- Fresh Ransomware Targets Android Devices
- Privacy in the Pandemic Era
- Spyware Campaign Leverages Apps in Google Play Store
- 10 Ransomware Strains Being Used in Advanced Attacks
- ‘Black Rose Lucy’ Malware Botnet Returns With Ransomware Capabilities
- Data Breaches: How to Respond to a Tipoff of a Problem
- 'Zero Trust' and the Remote Worker
- Microsoft Patches Teams Vulnerability
- How Telework Is Changing Cloud Security
- Attack Resources Shared by New LeetHozer Botnet and Moobot Malware
- Shade Ransomware Operation Apparently Shuts Down
- Live Webinar | The New Cloud IAM
- Data-Stealing Asnarök Malware Exploits Zero-Day Flaw in Sophos XG Firewalls
- Colorado Hospital Hit by Ransomware as COVID-19 Continues
- Webinar | 4 Actions to Secure Work from Home Employees
- Network and Security Transformation - Enabling your Digital Business
- Colorado Hospital Latest Cyberattack Victim Amid COVID-19
- Latest Phishing Campaigns Spoof Federal Reserve, SBA
- ‘Florentine Banker’ Group Steals Approximately £600K in Successful BEC Scam
- Australia Releases 'COVIDSafe' Contact-Tracing App
- Contact-Tracing App Privacy: Apple, Google Refuse to Budge
- Judge Approves FTC's $5 Billion Settlement With Facebook
- Enabling Secure Access in Complex Environments
- WHO Reports 'Dramatic' Increase in Cyberattacks
- Weekly Security News Roundup: Vulnerability Lets Attackers Compromise Apple Devices via Email
- WHO Reports 'Dramatic' Increase in Attacks
- Hackers Targeted Chinese Agencies for COVID-19 Intel: Report
- COVID-19: Stages of Re-Entry Planning
- Genetic Testing Lab Hack Affects 233,000
- Threat Landscape: Everything Old is New Again
- Attackers Increasingly Using Web Shells to Create Backdoors
- GDPR and COVID-19: Privacy Regulator Promises 'Flexibility'
- Aussie Contact-Tracing App: Details Slowly Emerge
- Joker's Stash Sells Fresh US, South Korean Payment Cards
- Analysis: COVID-19 Contact-Tracing Privacy Issues
- Live Webinar | Your Phone and Your Face: Anchoring Users to Real Identities
- US, UK Authorities Crack Down on Suspicious COVID-19 Domains
- Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments
- Apple Rushes to Patch iOS Zero-Day Flaws
- DoppelPaymer Ransomware Hits LA Suburb, Demands 100 Bitcoins as Ransom
- Remote Workforce: Securing the Next Normal
- Attackers Target Oil and Gas Industry With AgentTesla
- COVID-19 Contact-Tracing App Must-Haves: Security, Privacy
- HHS Delays Enforcement of New Info Sharing Rules
- WHO, Gates Foundation Credentials Dumped Online: Report
- Moobot Leverages Zero-Day Vulnerability to Target Fiber Routers
- Continuity Amid the Chaos: Ensuring Secure Business Continuity During COVID-19
- Senate Report Affirms Russian Election Interference Findings
- Cybercriminals Using Zoom, WebEx as Phishing Lures: Report
- SBA May Have Exposed Data on 8,000 Loan Applicants
- Fraud Thrives in a Crisis - Why The Insurance Community Needs to Stay Vigilant
- A Tale of 3 Breaches: Incident Response Challenges
- The COVID-19 Crisis: A Perfect Storm for Fraud
- 267 Million Facebook User Records for Sale on Dark Net
- New AgentTesla Infostealer Variant Targets Wi-Fi Credentials
- Emotet Gets a Redesign to Improve Its Evasion Capabilities
- Cognizant: Ransomware Attack Disrupting Services
- Live Webinar: Ensuring Connected Medical Device Security and Integrity in Challenging Times
- Contactless Payments: Healthy COVID-19 Defense
- 7 Habits of Highly Effective (Remote) SOCs
- Will Telehealth Fraud Grow Amid the COVID-19 Crisis?
- Equifax Settles With Massachusetts, Indiana Over 2017 Breach
- Economic Stimulus Payments: A Fraud Target
- Contact-Tracing Apps Must Respect Privacy, Scientists Warn
- COVID-19 Phishing Emails Mainly Contain TrickBot: Microsoft
- What's Hot on Dark Net Forums? 'Fraud Guides'
- Live Webinar | How to Launch and Scale Integrated Endpoint & Server Workload Protection
- Tom Jermoluk on 'The End of Passwords'
- Weekly Security News Roundup: IoT Botnet Assembled by New Mozi Malware Family
- CISA Warns Patched Pulse Secure VPNs Still Vulnerable
- Ransomware Recovery in the 'New Normal'
- Demand for Phishing Kits Is Strong: Report
- 'Zero Trust' Turns 10
- FBI: Hackers Targeting US COVID-19 Research Facilities
- '5G Causes COVID-19' Conspiracy Theory: No Fix for Stupid
- Addressing Shadow IT Issues During COVID-19 Crisis
- GAO: Pentagon's Cyber Hygiene Programs Come Up Short
- Analysis: Insider Threats Posed by Remote Workforce
- US Offers $5 Million Reward for N. Korea Hacker Information
- Third-Party Risk Considerations During COVID-19 Crisis
- Stolen Zoom Credentials: Hackers Sell Cheap Access
- Australia's Contact Tracing App May Be a Hard Sell
- When Will COVID-19-Related Scams Show Up on Breach Tally?
- OnDemand Webinar | Benchmarking Digital Risk Factors
- Fresh COVID-19 Phishing Scams Try to Spread Malware: Report
- Phishing Campaign Tries to Fool WebEx Users With Bogus IT Security Warnings
- APT41 Distributing Speculoos Backdoor in New Attack Campaign
- Malware Risk Higher for Those Working at Home: Report
- Microsoft Issues Patches for 3 Zero-Day Vulnerabilities
- Emotet, Ryuk, TrickBot: 'Loader-Ransomware-Banker Trifecta'
- Pandemic Creates 'Perfect Storm' for Insider Threat
- TikTok Content Could Be Vulnerable to Tampering: Researchers
- New York State Investigates Network Hack
- Investing in Cybersecurity's Post-Pandemic Future
- Researchers: Fake Fingerprints Can Bypass Biometric Sensors
- Battling Cybercrime During the COVID-19 Crisis
- FBI: Fraudsters Targeting Medical Equipment Purchasers
- Live Webinar | Social Engineering Campaigns Target You: Don't be a Victim, Be Prepared
- Live Webinar | Five Things You Need to Know About New CCPA Regulations
- OnDemand Webinar | Disruption Is The 'New Norm'
- Live Webinar | Staying Secure and Compliant in a Work From Home Environment
- Cybersecurity for Remote Workers
- Using COVID-19 Patient Data for Research: Sizing Up Risks
- Coronavirus: UK Government Promises App for Contact Tracing
- Dutch Police Shutter 15 DDoS 'Booter' Sites
- Hackers Breach San Francisco Airport Websites
- Weekly Security News Roundup: Dark_Nexus Vies for Supremacy on Compromised Machines
- SEC Settles With 2 Traders Over EDGAR Hacking Case
- Safeguarding PHI During Covid-19 Crisis: Emerging Challenges
- Zoom Still Addressing Security, Privacy Concerns
- Travelex Paid $2.3 Million to Ransomware Gang: Report
- Trump Administration Wants China Telecom's US License Revoked
- China Builds COVID-19 Recovery on Blockchain
- Analysis: Remote Workplace Security Challenges
- Live Webinar: The Importance of Cyber Resilience for the Financial Sector
- CISO Conversations: 'Moving at the Speed of Medicine'
- Latest Botnet Offers DDoS Attacks on Demand
- Russia Used Fake US Documents for Disinformation: Report
- UK and US Security Agencies Sound COVID-19 Threat Alert
- Faces of Fraud 2020: COVID-19's Impact
- Hackers Have Targeted Linux Servers for Years: Report
- Mshta Replaces PowerShell in New Ursnif Campaign
- NASA: At-Home Workers Targeted by Hackers
- Australia Considers How to Approach Pandemic Contacts Tracing
- Microsoft Exchange: 355,000 Servers Lack Critical Patch
- Panel Discussion: Cybersecurity and Privacy in the 'New Now'
- FBI: COVID-19-Themed Business Email Compromise Scams Surge
- COVID-19: CISOs Take on More Security, Privacy Challenges
- FBI: Covid-19-Themed BEC Scams Are on the Rise
- Researchers Propose COVID-19 Tracking App
- Hackers Target Chinese Government Agencies Via VPNs: Report
- Emotet Brings Down Entire Corporate Network by Overheating Computers
- Kinsing Malware Hits Container API Ports With Thousands of Attacks per Day
- No COVID-19 Respite: Ransomware Keeps Pummeling Healthcare
- Mitigating the Risks Posed by AI Meeting Assistants
- Role of Deception in the 'New Normal'
- NIST Specialist Offers Telework Security Insights
- The Right Roles for SIEM and EDR
- Weekly Security News Roundup: MS-SQL Servers Targeted by ‘Vollgar’ Campaign
- AZORult Variant, Other Malware Payloads Delivered by Multi-Pronged Attack Campaign
- Researcher Finds Flaws in HP's Software Assistant Tool
- Prosecutors: 'Zoom-Bombing' Could Lead to Charges
- Zoom Promises Geo-Fencing, Encryption Overhaul for Meetings
- Online Brand Spoofing - How to Stop it Before it Hurts
- Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World
- Spear-Phishing Campaign Uses COVID-19 to Spread LokiBot
- CISO Conversations: Healthcare's Unique Opportunity
- Magecart Group Hits Small Businesses With Updated Skimmer
- What Went Wrong at Equifax? We Have Good Answers
- Italian Social Security Website Disrupted
- Botnet Targets Devices Running Microsoft SQL Server: Report
- The Cybersecurity Follies: Zoom Edition
- Analysis: The Path Back to Business as Usual After COVID-19
- Live Webinar | Explainable Threat Intelligence to Securely Accelerate Trusted Digital Business Processes
- Washington Governor Signs Facial Recognition Law
- COVID-19 Crisis Triggers More HIPAA Policy Changes
- Zoom Rushes Patches for Zero-Day Vulnerabilities
- Australian Kids' Smartwatch Maker Hit By Same Bug Again
- Coalition Offers Remote Workforce Security Tips
- Morrisons Not Liable for Breach Caused by Rogue Employee
- Live Webinar | Anatomy of a Botnet Log: What Cybercriminals See When Users Fall for Coronavirus Malware Lures
- A CISO Conversation: Managing the Remote Workforce
- Alerts: Security Flaw in Medication, Anesthesia Systems
- Live Webinar | Enable Your Employees to Work from Home Quickly and Securely
- COVID-19 Response: The Re-evaluation Phase
- FBI Alleges Russian Man Laundered Cybercriminals' Money
- Nigerian BEC Scammers Increase Proficiency: Report
- Election Campaign Security Revisited
- Zoom Contacts Feature Leaks Email Addresses, Photos
- Marriott Suffers Another Massive Data Breach
- Marriott Suffers Another Massive Data Brach
- Fraudsters Take Advantage of Zoom's Popularity
- FBI Warns of 'Kwampirs' Malware Supply Chain Attacks
- Is COVID-19 Driving a Surge in Unsafe Remote Connectivity?
- API Security: Making Sense of the Market
- Another Marriott Breach Affects Millions
- Phishing Campaigns Leverage Latest COVID-19 Themes
- Phishing Campaigns Leverage New COVID-19 Themes
- Health Data Breach Tally Spikes in Recent Weeks
- Live Webinar | Disruption is the 'New Norm' - How will you Secure the Dynamic Workforce?
- FBI: Cybercrime Gang Mailing 'BadUSB' Devices to Targets
- Will 5G Networks Inherit Vulnerabilities in 4G Networks?
- COVID-19 and the Human Side of Cybersecurity Leadership
- Covid-19 Crisis: How to Manage VPNs
- Weekly Security News Roundup: 24 Children’s Gaming Apps Laden With Tekya Clicker
- Zoom Stops Transferring Data by Default to Facebook
- Insurer Chubb Investigating 'Security Incident'
- Coalition Formed to Address COVID-19 Crisis
- COVID-19: The Digital Exposure Crisis
- Russia's Cybercrime Rule Reminder: Never Hack Russians
- Analysis: Russia's COVID-19 Disinformation Campaign
- Social Engineering's Role in Cyber Fraud - And What We Are Doing About It
- Tupperware Website Hit by Card Skimmer
- Tupperware Website Hit by Credit Card Skimmer
- The Ecommerce Surge: Guarding Against Fraud
- Analysis: Impact of HHS' HIPAA Moves for COVID-19 Crisis
- Chinese Cyber Espionage Continues Despite COVID-19
- Chinese Cyber Espionage Continues Despite COVID-19: Report
- Newly Discovered APT Group Targets Middle East Firms: Report
- Microsoft to Pause Non-Essential Software Updates
- The Best of RSA Conference 2020
- Live Webinar | Transforming the Customer Experience with Modern Identity and Access Management
- FBI Shutters Alleged Russian Cybercriminal Forum
- Mobile Malware Bypasses Banks' 2-Factor Authentication: Report
- More Ransomware Gangs Join Data-Leaking Cult
- COVID-19 and the CISO: Jim Routh on Leadership
- Microsoft Alert: Fresh Zero-Day Flaws Found in Windows
- What's the Return on Investment of a Vendor Management Platform?
- Microsoft Warns of New Zero-Day Vulnerabilities in Windows
- New Mirai Variant Exploits NAS Device Vulnerability
- Hackers Targeted World Health Organization
- Election Integrity in COVID-19 Era
- Demystifying FBI Notes on Cyber Attacks Involving Multi-Factor Authentication
- MFA Trials Can Be a Burden or a Breeze
- California Modifies Consumer Privacy Regulations - Again
- Live Webinar | GDPR vs. CCPA vs. CCPA 2.0: 10 Critical Differences
- CA AG Modifies CCPA Regs - Again
- COVID-19: Security Risks As Manufacturers Shift Gears
- Fintech Firm Finastra Recovering From Ransomware Attack
- Russia Blamed for COVID-19 Disinformation Campaigns
- Mirai Variant Mukashi Conducts Brute-Force Attacks Against Vulnerable NAS Devices
- BEC Campaign Targets HR Departments: Report
- COVID-19 Phishing Schemes Escalate; FBI Issues Warning
- Weekly Security News Roundup: Nefilim Ransomware Victims Given a Week to Pay
- COVID-19 and the Need for 'Digital Distancing'
- Should Location Data Be Used in Battle Against COVID-19?
- Russian Hackers Relying on Compromised Accounts: Report
- Coronavirus Cybercrime Victims: Please Come Forward
- COVID-19 Response: How to Secure a 100% Remote Workforce
- COVID-19 and Financial Markets: 'Unprecedented Times'
- Analysis: COVID-19 as a Cybercrime Opportunity
- OnDemand Webinar | Trust or Zero Trust?
- FAIR Play: Measuring and Managing Information Risk
- COVID-19-Themed Malware Goes Mobile
- A Blueprint for PAM Success
- Why Visibility Is Essential to Managing Risk
- Teleworking by Healthcare Employees: Security Challenges
- The State of Integrated Risk Management
- New TrickBot Variant Targets Telecoms in US, Asia: Report
- The Changing DDoS Landscape
- Researcher: Microsoft Edge Least Private of 6 Browsers
- Living and Working Amid COVID-19 Crisis
- Tips on Ransomware Defense Strategies
- Ursnif Campaign Leverages New Infection Chain to Target Italian Users
- Unsecured Database Exposes Financial Records: Report
- Live Webinar | How to Identify & Address Risk with Attack Simulation
- Fighting Coronavirus-Themed Ransomware and Malware
- 9 Cybersecurity Takeaways as COVID-19 Outbreak Grows
- Snoop Attacks via L1 Data Sampling Threaten Security of Intel CPUs
- Protecting Election Integrity One Email at a Time
- Data Governance: How to Tackle Three Key Issues
- Is Your Account Takeover Prevention Program Leaving Your Organization Exposed?
- DOD Warns of Cyber Risks as Employees Work From Home
- COVID-19 Response: 5 Tips for Securing Remote Workplace
- COVID-19: How to Adjust Business Continuity Plans
- COVID-19: HHS Issues Limited HIPAA Waivers
- ACLU Files Lawsuit Over Facial Recognition at US Airports
- Varied Functionality of MonitorMinor App Outstrips All Other Mobile Stalkerware
- Security Firm Checkmarx Getting New Owner
- Why Not MFA?
- Uncertain Markets May Drive Cybersecurity Consolidation
- Nation-State Hackers Using COVID-19 Fears to Spread Malware
- Cookiethief: Cookie-Stealing Trojan Targets Social Media Accounts
- Baking Security Into DevOps
- The DevSecOps Challenges
- Numerous Arrests in 2 SIM-Swapping Schemes
- Tackling Network Visibility Challenges
- Deriving Actionable Threat Intelligence
- SOC as a Service: Making the Case
- COVID-19 Complication: Ransomware Keeps Hitting Healthcare
- How Automated Workflows Boost Cybersecurity
- Weekly Security News Roundup: njRat Spread by Trojanized Hacking Tools
- Telehealth and Coronavirus: Privacy, Security Concerns
- Facebook, Twitter Remove More Russia-Linked Accounts
- For Sale: Card Data From Online Stores Using Volusion
- Trump Signs Law Banning Federal Funding to Buy Huawei Gear
- Microsoft Patches Wormable SMBv3 Flaw
- Analysis: Coronavirus Cybersecurity and Privacy Issues
- Election Interference - Deep Fakes, Disinformation and Social Engineering
- Live Webinar | How to Stop Firefighting and Make Security Strategic
- Commission Calls for Revamping US Cybersecurity
- Sharing Cloud Security Responsibilities
- Google Will Appeal Latest GDPR Fine
- Visual Journal: RSA 2020 Conference
- The Cutting Edge of Behavioral Biometrics
- FBI Arrests Suspected Admin of Russian Cybercrime Market
- The Maturity of Third-Party Risk Management
- State of Privacy: California Takes the Lead With CCPA
- Microsoft Disrupts Necurs Botnet
- 2020 Election Security: Sizing Up Preparedness
- 2 RSA Conference Attendees Test Positive for Coronavirus
- Windows Alert: Critical SMB_v3 Flaw Requires Workaround
- Watchdog Finds Security Weaknesses in NIH's Records System
- How Threat Intelligence Feeds Are Evolving
- Threat Actors Launch Attacks Based on Exchange Control Panel Vulnerability
- Coronavirus: The Public Health Cybersecurity Issues
- Durham, North Carolina Shuts Down Phone System Following Ryuk Ransomware Attack
- Live Webinar | 4 Identity Management Best Practices for Improving Patient Care as Learned from Top US Children's Hospitals
- Coronavirus Fears Lead to New Wave of Phishing, Malware
- 2020 Predictions: Targeted Ransomware and 5G Vulnerabilities
- PwndLocker: Free Decryptor Frees Crypto-Locked Data
- Cybersecurity Sector Faces Reckoning After Coronavirus Hits
- Ransomware Gangs Hit Larger Targets, Seeking Bigger Paydays
- HHS Releases Final Data Sharing Rules
- Ex-DHS Officials Charged With Stealing Software, Database
- Live Webinar | Four Identity Management Best Practices for Improving Patient Care as Learned from Top US Children's Hospitals
- Geost Banking Trojan Targets Russian Banks Via Unofficial Webpages
- Debunking AppSec Myths
- Protecting the Cloud Through Automation
- Weekly Security News Roundup: Ransomware Attackers Targeting Victims’ Cloud Backups
- Why Risk Literacy is Essential for Digital Transformation
- Cyber Candid: Edna Conway and Wendy Nather Unplugged
- 2020 Security Agenda: Who Owns it?
- Assessing the Human Element in Cloud Access
- Hot Topics in Cybersecurity Research
- Addressing the Cybersecurity Skills Gap
- The Evolution of Cloud Governance
- The Human-Centric Cybersecurity Stance
- 7 RSA Takeaways: 'Human Element' Meets Covid-19 Concerns
- An Analyst's Observations of RSA Conference
- Steve Katz on the CISO Role in 2020
- GAO: Federal Data Centers Remain Vulnerable to Cyberthreats
- Let's Encrypt: We Won't Revoke All Certificates Right Now
- Deception Technology in 2020
- The New Insider Risk - When Creativity Goes Bad
- Securing the Modern Workplace
- National Cyber Security Alliance Encourages Vigilance Against Coronavirus Scams, Best Cybersecurity Practices for Remote Workers
- Preventing a Repeat of Capital One Breach with an NDR Layer: A Case Study
- What if Sherlock Holmes was the Brains Behind Your Security Architecture?
- HIMSS20 Cancelled Due to Coronavirus
- Cathay Pacific Airlines Fined Over Data Breach
- 8 Takeaways: The Cryptographer's Panel at RSA 2020
- Open Cybersecurity Alliance (OCA) Advances Mission to Bring Interoperability Across Cybersecurity Products
- Taming Regulations: Frameworks Needed More Than Ever
- 'SweynTooth' Cyber Flaws Could Affect Medical Devices
- Payment Security: The Role of Behavioral Biometrics
- Senators Demand More Info on Google's 'Project Nightingale'
- Why Doesn't Software Get Sold With a List of Ingredients?
- DevOps and the State of Software Security
- Lessons Learned: Securing Valuable Genomic Data
- U.S. Cities Targeted by New PwndLocker Ransomware
- Application Security Imperative: Earlier Is Better
- Coronavirus Spread: Preparing for 'The Long Haul'
- Big HIPAA Fine for Solo Doctor Practice
- The Cost of CISO Stress
- 2 Chinese Nationals Indicted for Laundering Cryptocurrency
- Researchers Estimate Krøøk Vulnerability Could Put a Billion Wi-Fi Devices at Risk
- New Malvertising Campaign Launched by Domen Social Engineering Toolkit
- Can a 'Zero Trust' Approach Work in the Supply Chain?
- Cybersecurity for the Midmarket
- RSA President on 'The Human Element'
- America Seeks 5G and Supply Chain Security
- Defenses Beyond Mere Deception
- Wendy Nather on Democratizing Security
- Live Webinar | Benchmarking Digital Risk Factors
- Managing the Risks Posed By APIs
- DoppelPaymer Ransomware Slams Supplier to Boeing and Tesla
- HIMSS 2020: The Show Will Go On - Trump Added as Speaker
- Live Webinar | Can Medium-Sized Companies Automate Access to Critical Multi-Cloud IT Environments?
- Cerberus Android Malware Gains Ability to Steal 2FA Tokens, Screen Lock Credentials
- A New Approach to Application Threat Detection and Response
- The 'Human Element' in Privacy
- Alleged Ticketfly Hacker Indicted for Extortion
- Sizing Up Cyberthreats to the 2020 Presidential Election
- HIMSS 2020: The Show Will Go On - And Trump Invited
- Inside Webroot 2020 Threat Report
- Careless and Malicious Insiders: The Threat Persists
- Redefining Security Analytics
- The (Growing) Problem of Password Reuse
- Walgreens Mobile App Exposed Health-Related Messages
- Weekly Security News Roundup: Attacks on Personal Data More Frequent in 2019
- Live Webinar | More Data, More Problems: Applying the Right Automation to Propel Security Operations
- AI's Impact on SOC Maturity
- Medical Device Cybersecurity: EU vs. U.S. Approaches
- 5G Security: Former DHS Leader and Huawei CSO Offer Views
- The Role of Visualization in Vulnerability Management
- Zero Trust: Definitions, Practicalities, Challenges
- CISO Panel: Tackling the Insider Threat
- Report: FCC to Fine US Carriers Over Location Data Sales
- RSA 2020: Roundup of Key Themes
- Boundless Cybersecurity for Hyper Distributed Era: Tackling the Unknowns
- Former Microsoft Engineer Convicted of Insider Fraud
- How Machine Learning Can Strengthen Insider Threat Detection
- The Need for a 'Collective Defense'
- Israeli Marketing Company Exposes Contacts Database
- Why The Cloud Is The New Network
- OnDemand Webinar | Fighting Fraud With Connected Security
- Experts Warn: Targeted Ransomware Attacks to Surge
- Sizing Up the Roles of Behavioral Analytics, 'Zero Trust'
- Cloud Snooper Attack Uses Innocent-Looking Requests to Bypass Firewall Rules
- OnDemand Webinar | How CISOs Scale Their AppSec Programs
- Ransomware Attacks Growing More Targeted and Professional
- Modified Draft CCPA Regulations: How They Impact Businesses
- Cloud Protection: How to Secure Server Environments
- Live Webinar: Securing Healthcare with Limited Time and Resources
- Reducing Security Complexity a Top Challenge for CISOs
- Security and Privacy: Often Aligned, But Sometimes Not
- CISA's Krebs: 2016 US Elections Were Cyber 'Sputnik' Moment
- RSA President Rohit Ghai on 'The Human Element'
- Raccoon Malware Capable of Stealing Information From Nearly 60 Applications
- Phishing Schemes Use Google Forms to Steal Office 365 Credentials
- 'Raccoon' Infostealer Now Targeting 60 Apps: Report
- Facebook Investigated Suspicious Pro-Sanders Content: Report
- Next Cloud Security Challenge: Containers and Kubernetes
- Lawsuit Claims HIV Data Exposed in Leak
- Irish Privacy Report Gives Glimpse Into GDPR Investigations
- WLAN Employed by Emotet as New Distribution Method
- BEC Group Favors G-Suite, Physical Checks: Report
- FBI Makes Arrest in DDoS Attack on Candidate's Website
- 'Privacy by Design' Implementation Tips
- New Mexico Sues Google Over Children's Privacy
- Weekly Security News Roundup: Haken Clicker, Joker Samples Spotted on Google Play
- Plenary Session: Speeding Up the Response to Critical Infrastructure Breaches: Are Enterprises Equipped?
- Ransomware Attack on EHR Vendor Impacts Home Health Chain
- Defense Department Agency Reports Data Breach
- US, UK Blame Russia for Cyberattack in Country of Georgia
- SMS Phishing Campaign Used to Spread Emotet: Report
- Facilities Maintenance Firm Recovering From Malware Attack
- What to Look for at RSA 2020 Conference
- Hacking of Accounting Firm Affects Medical Group
- New Hacking Group Targets Gambling Firms: Report
- GAO: Census Bureau Comes Up Short on Cybersecurity
- Hackers Post Details on MGM Resorts Guests: Report
- OnDemand Webinar | DevSecOps in the Cloud Is More Than Just CI/CD
- OnDemand Webinar | From Zero to Hero: Continuous Container Security in 4 Simple Steps
- Health Data Breach Tally Update: 2020 Trends
- AZORult Trojan Uses Fake ProtonVPN Installer to Disguise Attacks
- Live Webinar: How to Address Fraud Through the Use of Risk Analytics
- Preview: 12 Top Keynote Sessions at RSA Conference 2020
- Evolving Turkish Phishing Campaign Targets More Than 80 Companies With Adwind Malware
- Phishing Campaigns Tied to Coronavirus Persist
- Ransomware Attack Hit US Natural Gas Facility
- Canadian Government Breaches Exposed Citizens' Data: Report
- Amazon's Ring Mandates Two-Factor Authentication
- Coronavirus Update: Tips for Travel
- Hacked Off: Patients Sue Ransom-Paying Hospital Group
- Live Webinar | Lessons on Defeating Ransomware for Business and Tech Leaders
- Live Webinar: Taking Your Third Party Security Program to the Next Level
- Mobile Banking Users Targeted in SMS Phishing Campaign
- Lawsuit Filed in Wake of Ransomware Attack
- RSA Conference 2020 Preview
- Dell to Sell RSA to Private Equity Firm for $2 Billion
- Unpatched VPN Servers Hit by Apparent Iranian APT Groups
- APT Groups Planting Backdoors: Report
- Cybersecurity Plan for 2020 US Election Unveiled
- Google Removes 500 Chrome Extensions Tied to Malvertising
- IBM Exits RSA Conference 2020 Over Coronavirus Worries
- Weekly Security News Roundup: Coronavirus-Themed Emotet Spam Tops Malware List
- RSA Conference 2020: ISMG Spotlights Security Leaders
- Watchdog Agency: Improper Use of Medicare Data Rampant
- MIT Researchers: Online Voting App Has Security Flaws
- US Charges Huawei With Stealing Trade Secrets
- Facebook Delays EU Dating Service Rollout After 'Dawn Raid'
- Senator Calls for Creation of Federal Online Privacy Agency
- GDPR Compliance: Should CISO Serve as DPO?
- Analysis: Indictments in Equifax Hack
- Ransomware Hit a Florida Voting System in 2016
- RSA 2020: The Show Must Go On
- US Has Evidence of Huawei Backdoor: Report
- FBI: BEC Losses Totaled $1.7 Billion in 2019
- Services Provider to Government Left Database Exposed: Report
- FBI Warns Supply Sector Software Providers to Watch Out for Kwampirs Malware
- Trump's Proposed HHS Budget: A Close Look
- States Press for Federal Resources to Fight Cyberthreats
- CIA Secretly Owned Swiss Encryption Firm for Years: Reports
- Unsecured Estee Lauder Database Exposed 440 Million Records
- Learn From How Others Get Breached: Equifax Edition
- US Counterintelligence Outlines 5 Key Priorities
- More Phishing Campaigns Tied to Coronavirus Fears
- WiFi: A New Way to Spread Emotet Malware
- No Surprise: China Blamed for 'Big Data' Hack of Equifax
- Bringing Outsiders Into Your Compliance Team: Four Considerations
- KBOT Malware Is the First ‘Living’ Virus Spotted in Years
- NIST Privacy Framework: The Implementation Challenges
- Coding Flaw Exposes Voter Details for 6.5 Million Israelis
- Was Internet in Iran Hit by DDoS Attack?
- RobbinHood Ransomware Abuses Vulnerable Driver to Delete Security Products
- 10 Hot Cybersecurity Topics at RSA Conference 2020
- 4 in Chinese Army Charged With Breaching Equifax
- Four in Chinese Army Charged With Breaching Equifax
- Weekly Security News Roundup: Enterprise Networks Targeted by Mailto Ransomware
- Facebook's Privacy Practices Targeted by Canadian Regulator
- Coronavirus: HIPAA Compliance Issues
- Barr: US Should Invest in Nokia, Ericsson
- UK's Brexit Transition Period: Keep Complying With GDPR
- Report: U.S. Struggled to Counter 2016 Election Interference
- Financial Firms Targeted With New Type of Backdoor: Report
- Joker's Stash Advertises Second Batch of Indian Card Data
- Analysis: Iowa Election App Missteps
- Coronavirus: How to Plan and Protect
- FTC Shutters Hundreds of 'Fake' Websites
- Fraudsters Pose as Journalist in Phishing Campaign: Report
- Live Webinar | Risk Exchanges: The Key to Vendor Risk Management Efficiency
- To Combat Rogue AI, Facebook Pitches 'Radioactive Data'
- EKANS Ransomware Capable of Stopping ICS-Related Processes
- Report: Iowa Caucus App Vulnerable to Hacking
- FBI Reportedly Says DDoS Attack Targeted Voter Registration
- Magecart Attacks Olympic Ticket Resellers, Other E-commerce Sites With OpendoorCDN Skimmer
- Ireland's Privacy Watchdog Probing Google's Data Use
- Australian Delivery Firm Confirms Ransomware Attack
- Britain's 5G Lesson: Choose or Choice Will Be Made for You
- New Ransomware Targets Industrial Controls: Report
- The Iowa Caucus: No Hacking, But a Bungled Risk Matrix
- YouTube Takes Steps to Stop Spread of Election Disinformation
- Hackers Pose Increasing Risk to Medical Research Data
- California Man Pleads Guilty to Hacking Nintendo
- Android Malware Attempts to Steal Money From Diabetic Patients
- DoppelPaymer Ransomware Gang Threatens to Dump Victims' Data
- EU Likely to Drop Plan to Ban Facial Recognition
- India Tests Instant Messaging Service for Government Workers
- Twitter Warns API Flaw Abuse May Have Unmasked Users
- NIST Drafts Guidelines for Coping With Ransomware
- TA505 APT Group Returns With New Techniques: Report
- Growing Medical Device Sophistication Opens Security Issues
- FCC: Wireless Carriers Violated Law by Sharing Location Data
- National Cyber Security Alliance Supports RSA® Conference Theme “The Human Element” with Expert Panel on Cybersecurity and Changing Human Behavior
- Ashley Madison: The Impact of Some Data Breaches Is Forever
- Weekly Security News Roundup: Citrix ADC Servers Targeted by Ragnarok Ransomware
- Iowa Drops Trespassing Charges Against Penetration Testers
- Privacy Advocate Tackles Issue of Patient Consent Rights
- 6 Suspects Arrested in Maltese Bank Hacking Heist
- Fake Coronavirus Messages Spreading Emotet Infections
- Judge Rules Insurer Must Pay for Ransomware Damage
- Avast Stops Using Security Software to Track Browsing Data
- Analysis: Government Policies on Huawei's 5G Role
- Long-Awaited HHS Data Sharing Rules Raise Privacy Worries
- Facebook Settles Facial Recognition Lawsuit for $550 Million
- Interior Dept. Grounds Drones Over Cybersecurity Concerns
- Live Webinar | Trust or Zero Trust? Going Beyond Privileged Access Management
- Will UK's Huawei Decision Become a 5G Rollout Blueprint?
- AlphaBay Moderator Pleads Guilty to Racketeering Charge
- OnDemand Webinar | Practical Steps to Determine Your Data Breach Risk
- Zoom Fixes Flaw That Could Allow Strangers Into Meetings
- UN Kept Hacker Attacks Under Wraps
- Court Invalidates Certain Patient Info Access Requirements
- Live Webinar | Connected Intelligence: The Future of Fraud Defense
- Fake Factory Experiment Illustrates Attackers' Tactics
- NY Times Reporter Targeted by Spyware: Report
- How Deception Technologies Enable Proactive Cyberdefense
- Wawa's Stolen Payment Cards Are Now for Sale
- Why Was Electronic Health Records Vendor Fined $145 Million?
- UK Approves 'Limited' Role for Huawei in 5G Networks
- UK Government Proposes IoT Security Measures
- Live Webinar | Who's In Your Cloud? How Privileged Access Controls are Leaving You Exposed
- Tampa Bay Times Cyberattack Attributed to Ryuk Ransomware Actors
- Ryuk and Sodinokibi Surge as Ransom Payments Double
- Are Companies Adhering to CCPA Requirements?
- Health Data Breach Not Reported for Seven Months
- Sen. Wyden Asks NSA About Trump Administration Device Security
- Ryuk's Latest Victim: Tampa Bay Times
- Dave DeWalt on Securing Business-Critical Applications
- US Agency Hit With N. Korean-Themed Phishing: Report
- Police Bust 3 Suspected Magecart Hackers in Indonesia
- Weekly Security News Roundup: GDPR Fines Imposed Total €114M Thus Far
- Vulnerabilities Found in Some GE Healthcare Devices
- UK Considers Limited Role for Huawei in 5G Rollout: Report
- Stolen Payment Card Trafficking Mastermind Pleads Guilty
- Hackers Target European Energy Firm: Researchers
- The Bezos Phone Hack: Narrative Framed by Loose Facts
- Analysis: New Details on the Hacking of Jeff Bezos' iPhone
- Live Webinar | Application Security for Modern Dev
- POS Vendor for Cannabis Dispensaries Exposed Data: Report
- Treasury Wants to Collect More Cyber Risk Details From Banks
- Live Webinar: CISO's Guide to Application Security: Accelerate Your Software Velocity
- FBI Warns: Beware of Spoofed Job Application Portals
- Emotet Malware Alert Sounded by US Cybersecurity Agency
- Microsoft Error Exposed 250 Million Elasticsearch Records
- Updated FTCODE Ransomware Now Steals Credentials, Passwords
- FTCODE Ransomware Adds Functionality for Stealing Credentials From Web Browsers, Email Clients
- EFS Ransomware Attacks Overcome Major Antivirus Tools in Proof-of-Concept Tests
- Documents Describe US Cyber Command's Campaign to Hack ISIS
- Investigators: Saudis Hacked Amazon CEO Jeff Bezos' Phone
- Saudi Arabia Hacked Amazon CEO Jeff Bezos' Phone: Report
- BT and Vodafone Reportedly Want Huawei 5G Gear
- Report: Apple Scuttled Encryption Plans for iCloud Backups
- Federal Breach Tally: 2020 Trends So Far
- Maryland Considers Criminalizing Ransomware Possession
- TrickBot Uses UAC Bypass to Quietly Infect Windows 10 Machines
- Google CEO Backs EU's Proposed Facial Recognition Ban
- GDPR: $126 Million in Fines and Counting
- Ransom-Demanding Gangs Target Fresh Victims: Patients
- Mitsubishi Electric Blames Anti-Virus Bug for Data Breach
- New Data Ransom Target: Patients
- Citrix Releases First Patches to Fix Severe Vulnerability
- Sizing Up Today's Deception Technology
- How Cybercriminals Are Converting Cryptocurrency to Cash
- Live Webinar | Building a DevSecOps Culture in EMEA: 2020 & Beyond
- Live Webinar | Targeted Attacks: How Sophisticated Criminals Bypass Enterprise Security Measures
- Bill Would Create State Cybersecurity Leader Positions
- The Role of Satellites in Quantum Key Distribution
- Weekly Security News Roundup: Nemty Ransomware Plans to Begin Leaking Victims’ Data
- Microsoft Warns of Zero-Day Internet Explorer Exploits
- 'WeLeakInfo' Website Shut Down
- Live Webinar | Changing the Equation: Ensuring Faster Payments Do NOT Equate to Faster Fraud
- OnDemand Webinar | The Ripple Effect - An Examination of Multi-Party Security Incidents
- Live Webinar | The Evolution of IT Audit: Continuous Compliance for Financial Institutions
- Cyberattack on a Major Bank Would Have Ripple Effect: Study
- FBI Promises 'Timely' Election Breach Reports for Officials
- Aussie Bank Says Server Upgrade Led to Data Breach
- BEC Fraudsters Targeting Financial Documents: Report
- Analysis: Huawei 5G Dilemma
- Windows Vulnerability: Researchers Demonstrate Exploits
- Congress Hears Warnings of Iranian Cyberthreats
- Microsoft Patches CryptoAPI Flaw Following Discovery From NSA
- Cloud Security: Overcoming Roadblocks
- Alarming Trend: More Ransomware Gangs Exfiltrating Data
- On January 28, Data Privacy Day Encourages Consumers to “Own Their Privacy” and Businesses to Improve Their Data Privacy Practices
- Senators Field Legislation to Build Huawei 5G Alternatives
- Cyber AI: Securing Cities from Tomorrow's Cyber-Threats
- HHS Reveals Draft of 5-Year 'Strategic Health IT Plan'
- 5G, IoT, & Cyber AI: Securing Cities from Tomorrow's Cyber-Threats
- How Wireless Carriers Open the Door to SIM Swapping Attacks
- Ryuk Ransomware Waking Up Powered-Down Devices to Encrypt Them
- Cable Haunt Leaves an Estimated 200 Million Modems Open to Potential Attacks
- 'Wartime' Security Mentality Revisited
- 5G Security in the Balance as Britain Navigates Brexit
- Equifax Settles Mega-Breach Lawsuit for $1.38 Billion
- NSA Uncovers 'Severe' Microsoft Windows Vulnerability
- Report: Russian Hackers Targeted Ukrainian Gas Firm Burisma
- Attorney General Presses Apple to Unlock Shooter's iPhones
- Australian Bushfires Donation Website Compromised by Magecart Credit Card Skimming Attack
- Microsoft Sway Domains Used in Phishing Campaigns to Create Bogus Landing Pages
- Windows 7: Microsoft Ceases Free Security Updates
- Baby's First Data Breach: App Exposes Baby Photos, Videos
- Class Action Breach Lawsuits: The Impact of Data for Sale
- Why Penetration Tests Are So Essential
- Albany Airport Pays Off Sodinokibi Ransomware Gang: Report
- 'Cable Haunt' Modem Flaw Leaves 200 Million Devices at Risk
- Weekly Security News Roundup: Mirai-Inspired ‘LiquorBot’ Botnet Mining for Monero
- Severe Citrix Flaw: Proof-of-Concept Exploit Code Released
- Voting Machine Firm CEOs Open to Greater Federal Oversight
- Georgia Man Charged With Making 'Fake' HIPAA Violation Claims
- Facebook's FTC Privacy Settlement Challenged in Court
- Quantum-Proof Cryptography: How It Would Work
- Reality Check: How Vulnerable Is the Power Grid?
- Hackers Increasingly Probe North American Power Grid
- Analysis: 'Orwellian' Surveillance in 2020
- Analysis: 'Orwellian' Suveillance in 2020
- UK Fines Dixons Carphone for Massive Breach
- Congressmen Call for Enhanced Financial Sector Security
- Router Cryptojacking Campaigns Disrupted
- Router Cryptojacking Campaign Disrupted
- TikTok App Had Major Security Vulnerabilities
- New York Man Gets 5-Year Sentence for ATM Skimming
- Live Webinar | Does your SOC Need a Triad Strategy?
- NY Man Gets 5-Year Sentence for ATM Skimming
- Currency Exchange Travelex Held Hostage by Ransomware Attack
- What Orwell's '1984' Missed: Free Social Media Apps
- FBI Asks Apple For Access to Saudi Shooter's iPhones
- Preparing for Potential Iranian 'Wiper' Attacks
- NIST 800-171 & Why Organizations Need Password Similarity Blocking in Active Directory
- Accenture to Buy Former Symantec Services Unit From Broadcom
- Insight Partners' Latest Purchase: IoT Security Firm Armis
- Pulse VPN Bug Means ‘Big Game Ransomware’ Could Access Corporate Networks
- Malware Authors Make DeathRansom a Proper Crypto-Ransomware Family
- Iranian Cyberattacks: 10 Must-Have Defenses
- Patch or Perish: VPN Servers Hit by Ransomware Attackers
- Global Cyber Alliance President on Iranian Cyber Threat
- Iran's Cyber Response: 'They're Going to Unleash the Hounds'
- Lawsuit Filed in Wake of Ransomware Attack
- FBI Investigating How Town Defrauded of $1 Million: Report
- Live Webinar | Detection and Response: Why Three is the Magic Number
- Colorado Town Loses More Than $1 Million to a BEC Scam
- Attackers Invent New Evasion Techniques to Conceal Web Skimmer Activity
- Live Webinar | Data Breach Myth Vs. Reality
- Analysis: Threat Posed by Pro-Iranian Hackers
- Live Webinar | Cyber AI: Securing Cities from Tomorrow's Cyber-Threats
- Analysis: Pro-Iranian Hackers' Past, Present, Future Threats
- Weekly Security News Roundup: Maritime Facility Struck by Ryuk Ransomware
- US Government Website Defaced With Pro-Iran Message
- US Conflict With Iran Sparks Cybersecurity Concerns
- Malware Infects Small Hospital's Medical Imaging Server
- Cybersecurity Data Sharing: A Federal Progress Report
- Researcher Spots New Tricks in Web Payment Card Skimmers
- Maze Ransomware Victim Sues Anonymous Attackers
- Analysis: Countering Nation-State Attacks in 2020
- Ambulance Company Slapped With HIPAA Fine
- Restaurant Chain Landry's Investigates Malware Incident
- US Army Follows Navy in Banning TikTok App: Report
- Huawei: US Trade Ban Will Make 2020 'Difficult'
- Microsoft Removes 50 Domains Tied to North Korean Hackers
- Report: Cloud Hopper Attacks Affected More MSPs
- Chivalric Disorder as Knight and Dame Data Goes Errant
- 2020: The Year of Zero Trust?
- Health Data Security: Federal, State Trends for 2020
- A CISO's Security Predictions for 2020
- Ready for the New York SHIELD Act?
- Weekly Security News Roundup: Emotet Unveils New Attacks, C&C URI Structure
- Live Webinar | Your Ultimate Guide to Phishing Mitigation
- US Coast Guard Warns Over Ryuk Ransomware Attacks
- Job Search: Head of UK's National Cyber Security Center
- Do Breach Remediation Efforts Affect Patient Outcomes?
- Smart Home Device Maker Wyze Exposed Camera Database
- US Cybercom Considers Bold Election Security Moves: Report
- Live Webinar | Why 2020 should be the year of DevOps and not DEVops
- Ransomware Attackers May Lurk for Months, FBI Warns
- Will the U.S. Get a Federal Privacy Law?
- Analysis: 2020 Cybersecurity Issues
- Managing Third-Party Risks: CISO Insights
- Managing Open Source Components
- Ingredients of an Incident Response Playbook
- Citrix Vulnerability Could Affect 80,000 Companies: Report
- Researchers: Chinese APT Espionage Campaign Bypasses 2FA
- HIPAA Standard 164.312(d): MFA to the Rescue
- Art Coviello on Misinformation in the Age of Cyber Warfare
- The Ethics of ML and AI
- Redefining Mobile Security (and Why it Works)
- Phishing Scams Target Canadian Bank Customers
- Apple and Google Stop Distributing ToTok Messaging App
- The 'Axis of Evil' and Escalation of Destructive Attacks
- MasterCard Inks Deal for Startup RiskRecon
- What About Ransomware?
- Tying Up Loose Ends for Health Data Privacy, Security
- Building Cyber Resilience at a Foundational Level
- Three Members of GozNym Malware Gang Sentenced
- The Promise and Reality of AI and ML in Security Management
- Maze Ransomware Gang Names More Alleged Victims
- Cybersecurity Leadership: The 2020 Vision
- Weekly Security News Roundup: Exposed Credit Card Details Abused Within 2 Hours
- Ransomware 2.0: Cybercrime Gangs Apply APT-Style Tactics
- Gartner's Avivah Litan on the Rise of 'Fake Everything'
- MyKings Cryptomining Botnet Leverages EternalBlue Flaw
- How Apps Open the Door to Bots
- Database Left 267 Million Facebook IDs Exposed: Report
- NIST's New Biometrics Databases Offer Help With IAM
- Wawa Stores: POS Malware Attack Undetected for 8 Months
- 5 Top Health Data Regulatory Issues to Watch in 2020
- Facebook Wins an EU Privacy Ruling
- New Orleans' Mission: Clean 4,000 Computers in 48 Hours
- Analysis: The Latest Ransomware Targets
- Judge: Government Can Collect Royalties From Snowden Memoir
- US Navy Memo Raised Cyberscurity Concerns About DJI Drones
- Alleged Dark Overlord Member Extradited, Pleads Not Guilty
- Canadian Lab Pays Ransom to 'Retrieve' Data
- Ransomware Risk Management: 11 Essential Steps
- Cyberespionage Campaign Spreads: Report
- Would You Rather be Cloud Smart or Cloud First in Government?
- Cyber Ground Truth in the Financial Sector
- Who Else Is in That Video Meeting? Maybe a Hacker
- Bill Spells Outs Steps to Help Schools With Cybersecurity
- Why Securing Medical Devices Is So Challenging
- Nearly a Quarter of a Million RSA Keys Broken Using Certificate Vulnerability
- Fraud Prevention: Keeping Up With Attackers
- Study: 3 in 4 Users Required a Reset of a Forgotten Password in the Last 90 Days
- Mozilla: Firefox Add-On Developers Must Use 2FA
- Study: IoT Devices Have Alarmingly Weak RSA Keys
- Maze Ransomware Gang Dumps Purported Victim List
- Payroll Data of 29,000 Facebook Employees Stolen: Report
- Insurer Races to Fix Security Flaws After Whistleblower Alert
- Identity Theft Protection: A Crucial Consideration in Today's Heightened Environment
- Cybersecurity 2020: Connected Devices Strike Back
- AI: 'We're Having the Wrong Conversation'
- High-Profile Users in the US and Europe Targeted by Zeppelin Ransomware
- BuleHero Botnet Uses Multiple Lateral Movement Modules to Drop XMRig Miner, Gh0st RAT
- Visa: Gas Station Networks Targeted to Steal Card Data
- The Lifecycle of Stolen Payment Data
- Why Cyber Confidence Matters
- Keybase Nixes Stellar Airdrop After Spam, Fake Accounts
- Weekly Security News Roundup: Flaw in Attackers’ Ryuk Decryptor Could Hinder Recovery
- Ryuk Eyed as Culprit in New Orleans Ransomware Outbreak
- Another Fine Tied to Patient Access to Records Announced
- Securing the 2020 Election
- North Korean Hackers Tapping Into TrickBot: Report
- Is your Organization Suffering From Third-Party "Compliance Drift"?
- Georgia Wire Manufacturer Struck by Ransomware
- Analysis: A Better Approach to Cyber Defense
- Scrutiny of Google's Access to Patient Data Intensifies
- Electrical Grid Cybersecurity Measure Advances
- Why We Need Quantum-Proof Keys
- Building Security Into Cloud Migration
- Managing Identity in a 'Zero Trust' Environment
- Visual Journal: Black Hat Europe 2019
- Five Charged in $722 Million Cryptomining Ponzi Scheme
- Health Data Breach Tally: Trends in 2019
- McAfee Considers Purchase of NortonLifeLock: Report
- Fake Payroll Emails Used by Phishing Campaign to Deliver TrickBot
- HawkEye Keylogger Acts as First-Stage Loader for Cryptocurrency Miner
- Intel Chips Vulnerable to 'Plundervolt' Attack
- Vietnamese APT Group Targets BMW, Hyundai: Report
- Joker's Stash Celebrates Turkey Day With Stolen Card Data
- Malicious Office 365 App Leveraged by Phishing Campaign to Access Victims’ Accounts
- Snatch Ransomware Reboots Machines In Safe Mode to Bypass Endpoint Protection
- City of Pensacola Recovering From Ransomware Attack
- Lazarus Group Targets macOS Users With Fileless Malware Threat
- Quantum-Proof Cryptography: What Role Will It Play?
- Decryptor Bug Means Ryuk Victims Stuck in Ransomware Rut
- Decryptor Bug Means Victims Stuck in Ryuk Ransomware Rut
- GDPR Violation: German Privacy Regulator Fines 1&1 Telecom
- GDPR Breach: German Privacy Regulator Fines 1&1 Telecom
- Banner Health Breach Lawsuit Settled
- FTC Sanctions Defunct Cambridge Analytica: So What?
- $200,000 Internet Fraud: Will Anyone Investigate?
- 8 Takeaways: Black Hat Europe's Closing 'Locknote' Panel
- How the Adversarial Mindset Is Making Cybersecurity Better
- AI, Machine Learning and Robotics: Privacy, Security Issues
- Don't forget the basics: KYE means KYC
- OnDemand Webinar | Using Security Ratings to Achieve Security Goals
- Misconceptions About 'Zero Trust'
- How to Make a Security Transformation
- Balancing Digital Transformation and Security
- Wiper Malware Targets Middle Eastern Energy Firms: Report
- Analysis: Smart TV Risks
- Two Russians Indicted Over $100M Dridex Malware Thefts
- John Halamka on Privacy, Security of Mayo Clinic Platform
- Skimming Campaign Leveraged Heroku Cloud Platform: Report
- Singapore's 'Fake News' Law Enforcement Draws Criticism
- The Hidden Cost of a Third-Party Data Breach
- 2 Phishing-Related Health Data Breaches Grow Even Bigger
- Cybersecurity Defenders: Channel Your Adversary's Mindset
- PSD2: The Compliance and Enforcement Update
- FaceApp Could Pose 'Counter-Intelligence Threat': FBI
- Three-Way Street Cybersecurity: Addressing the Cross-Functional Challenges
- GOP Federal Privacy Bill Would Supersede CCPA
- Digital Transformation: The Privileged Access Imperative
- FBI Warns of Smart TV Dangers
- A Tale of Two Breach Lawsuits
- New Malware Campaign Uses Trojanized 'Tetris' Game: Report
- SAP Software Update Exposed New Zealand Firearms Register
- 15 Hot Sessions at Black Hat Europe 2019
- Analysis: Vendor Contract Changes Under CCPA
- Sentara Hospitals' HIPAA Settlement: Why $2.2 Million?
- Live Webinar: Would You Rather be "Cloud Smart" or "Cloud First" in Government?
- Surviving a Breach: 8 Incident Response Essentials
- TrueDialog Unsecure Database Exposes SMS Data: Report
- Live Webinar | Cyber Recovery in the Age of Ransomware
- Mixcloud Breach Affects 21 Million Accounts
- To Survive a Data Breach, Create a Response Playbook
- Google: Government-Backed Hackers Targeted 12,000 Users
- Security Firm Prosegur Hit By Ryuk Ransomware
- The Threat of Ransomware and Doxing
- Hackers Steal $49 Million in Ethereum From Upbit Exchange
- Facebook Breach Victims Can Sue For 'Reasonable' Security
- Securing Your Journey To The Cloud
- Magento Marketplace Suffers Data Breach, Adobe Warns
- New US Federal Privacy Bill Gets Proposed
- Watchdog Finds DOE Falling Short on Cybersecurity
- Medical Device Cybersecurity: A Team Approach
- Dell Considering Selling RSA: Report
- Election Hacking: What You Need to Know
- Auditor: Australia's Digital Health Records Need Improvement
- Analysis: The Ambiguities in CCPA
- Attackers Demand $14 Million Ransom From IT Services Firm
- FCC Takes Steps Toward Squeezing Out Huawei, ZTE
- T-Mobile Says Prepaid Accounts Breached
- Unsecured Server Exposed Records of 1.2 Billion: Researchers
- NeverQuest Banking Trojan Co-Creator Sentenced to 4 Years
- Ransomware Attackers Leak Stolen Data
- Analysis: The Latest Ransomware Trends
- Twitter No Longer Wants a Phone Number for 2FA
- Target Sues Insurer Over 2013 Data Breach Costs
- Federal Reserve Report Raises Concerns About 'Stablecoins'
- A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals
- Microsoft Debunks Dopplepaymer Ransomware Rumors
- Ransomware Analysis: 'Shade' Surges; Other Trends Emerge
- Senators Call for a National 5G Coordinator
- 5 Things All Smart Security Leaders Need to Do Right Now
- The UK's 2020 Cybersecurity Challenge
- Microsoft Moves Toward DNS Over HTTPS
- 4 Automated Password Policy Enforcers for NIST Password Guidelines
- Bill Aims to Fill Consumer Health Device Data Privacy 'Gap'
- New Kids On The Block: Novel Tactics and Perpetrators
- Taking Advantage of EMV 3DS
- 4 Key Considerations for Employee Password Hardening & Compromised Password Monitoring
- Louisiana Government Recovering From Ransomware Attack
- Live Webinar | Use Security Ratings to Achieve Your Security Goals
- IoT Security: 20 Years Behind Enterprise Computing
- The Security Impact of Digital Transformation
- Macy's E-Commerce Site Hacked
- This Time, Election Protection Bill Gets Bipartisan Support
- OnDemand Webinar | 6 Steps to Securing Unstructured Data
- Watchdog Agencies Report on VA Privacy, Security Woes
- Senator Raises Concerns Over Insider Breach at Twitter
- Compromised Website Led to Australia Parliament Hack
- New JavaScript Skimmer Found on Ecommerce Sites
- Update: More Alerts About Medical Device Security Flaws
- Roger Stone Found Guilty on All 7 Counts
- 7 Takeaways: Insider Breach at Twitter
- Phishing Campaigns Spoof Government Agencies: Report
- DOJ: Pair Used SIM Swapping Scam to Steal Cryptocurrency
- Risky Dialing: Trump Call Raises Security Worries
- Analysis: Instagram's Major Problem With Minors' Data
- DOJ: Pair Used SIM Swapping Scam to Steal Cryptocurency
- Why Medical Device Security Is So Challenging
- Ransomware: Mexican Oil Firm Reportedly Refuses to Pay Up
- Beating The Crypto-Criminals
- 'Zero Trust': Can It Be Defined?
- The Dark Web's Automobile Hacking Forums
- Report Calls for Enforcing Voting Machine Standards
- Google's Push Into Health Sector: Emerging Privacy Issues
- Researchers Describe Significant Flaw in Intel's PMx Driver
- 3 Reasons to Do a 'Proof of Concept' With MDR Providers
- Russian National Charged in Payment Card Scheme
- Privacy Analysis: Google Accesses Patient Data on Millions
- Live Webinar | 2020 Outlook for Healthcare Security
- New Ransomware-as-a-Service Offered at Deep Discount: Report
- Identity Fraud: Account Origination
- CCPA Compliance: Identity Verification Challenges
- Microsoft Will Apply California's Privacy Law Nationwide
- Labour Party Hit by Massive Online Attack Attempt
- Election Interference Notification Protocols Unveiled
- Live Webinar: Best Practices for Mitigating Third-Party Remote Access Risk
- Sen. Warner Asks HHS for Answers on Unsecured Medical Images
- Microsoft Warns Users: Beware of Damaging BlueKeep Attacks
- 'Digital Climate Change': An Inconvenient Truth
- Democrats Pose Phone Data Privacy Questions to FCC
- Take Two: Why Organizations Are Reviewing GDPR Efforts
- Privacy Nirvana: Some Assembly Still Required
- Insider Threat: Greater Risk Mitigation Required
- UAE Forms Defense Firm to Help Tackle Cyberthreats
- Despite Instagram Changes, Minors Are Still at Risk
- Live Webinar | The Ripple Effect - An Examination of Multi-Party Security Incidents
- Health Data Breach Tally Update: Top Causes
- Protecting Data in Sprawling Computing Environments
- Following Massive Breach, Capital One Replacing CISO: Report
- Update: PCI SSC's Enhanced Contactless Payment Standard
- DOJ: Company Sold Gear With Security Flaws to US Military
- Sen. Wyden Pushes FCC on 5G Security
- Live Webinar | How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC
- Bill Would Create a Federal Digital Privacy Agency
- Analysis: Using Twitter for Espionage
- Why Is Third-Party Risk Management So Complex?
- Facebook: Developers Wrongfully Accessed User Data - Again
- Trend Micro Employee Sold Consumer Data to Scammers
- Feds Allege Saudi Spies Infiltrated Twitter
- Feds Allege Twitter Infiltrated by Saudi Spies
- IT Misconfiguration Leads to 15 Breach Reports
- Malvertising Campaign Used Fake Blockchain Ad to Distribute New Capesand Exploit Kit
- Social Media Political Ad Ban Before UK Vote Sought
- Alleged Capital One Hacker Released From Prison
- Getting Ready for the NIST Privacy Framework
- 'Soviet Tactics': Russia Tries Prisoner Swap for Hacker
- The Malicious Macros Problem May Be Solved Soon
- OCR Issues Two HIPAA Enforcement Actions, Plus Adjusts Future Fines
- Inside the Sophos 2020 Threat Report
- Cyber Insurance: Benefits and Pitfalls
- Making Email Safe Again
- Identity as the New Security Perimeter
- Wireless Routers Exploited by Gafgyt Variant Could Be Used in DDoS Attacks
- Business Email Compromise: Battling Advanced Attackers
- Phishing Campaign Uses Salary Increase Ploy: Report
- Threat Actor Using C&C Server to Host Ransomware, POS Carding Malware and Other Threats
- National Cyber Security Alliance Hosts Online Safety Workshops for Consumers and Small Businesses in Indianapolis
- Latest BEC Victims: Nikkei, City of Ocala
- Goodbye, Symantec for Consumers; Hello NortonLifeLock
- Beam Me Up, Alexa: Digital Assistants Hacked By Lasers
- Missed Connections: Rare Cyberattack Blindsides Utah Utility Company
- Chinese APT Group Targets Mobile Networks: FireEye Mandiant
- Live Webinar: Don't Let Cyber Threats Jeopardize Cloud Transformation
- ICO: UK Police Should Go Slow on Facial Recognition
- Android Emoji Keyboard Exposes 40 Million Users to Unauthorized Purchases of Premium Digital Content
- Ransomware Gangs' Not-So-Secret Attack Vector: RDP Exploits
- Weekly Security News Roundup: Xhelper Malware Infects 45K Android Devices in 6 Months
- BlueKeep Attacks Arrive, Bearing Cryptomining Malware
- The Rise of Bulletproof Proxies
- Autonomous Response: A Game Changer?
- Call for Action: Election Security a 'National Emergency'
- Ransomware School: The Rise of GandCrab Disciples
- Govt. Officials in 20 Nations Targeted Via Whatsapp: Report
- OnDemand Webinar | Evaluating the Security of Software
- Ransomware: Average Ransom Payout Increases to $41,000
- Trio of Web Registrars Disclose 22 Million Accounts Breached
- Analysis: Preventing Data Exposure in the Cloud
- HHS Updates Security Risk Assessment Tool
- McAfee: Malicious Voicemails Target Office365 Users
- Pwn2Own Contest to Focus on Industrial Control Systems
- Two Uber Hackers Plead Guilty
- Mobile Devices: Protecting Critical Data
- Cyber Insurance: The Myths and Realities
- Combating Cybercrime: Key Challenges for 2020s and Beyond
- Skimming Malware Found on American Cancer Society Webstore
- Facebook Agrees to Pay UK Fine in Cambridge Analytica Case
- FCC Chair's Proposal Targets Chinese Technology Firms
- Turla Teardown: Why Attribute Nation-State Attacks?
- How to Think Like an Attacker
- Facebook Sues Spyware Maker Over WhatsApp Exploit
- Quest Diagnostics Proposed Breach Settlement Approved
- Consumers Are Paying More Attention to Their Data: Multi-Layered Security Gets Personal
- Massive Cyberattack Slams Country of Georgia
- FuxSocy Ransomware Borrows Techniques From Cerber Family
- Fast Food Chain Krystal Investigates Card 'Security Incident'
- Joker's Stash Lists 1.3 Million Stolen Indian Payment Cards
- Joker's Stash Lists 1.3 Million Indian Payment Cards
- Live Webinar: A New Strategy for Effective Cyber Security Awareness Campaigns
- Clinics Serving Uninsured Hit by Ransomware
- Two Data Leaks Expose Millions of Records
- Cloud Security: 'Big Data' Leak Prevention Essentials
- Live Webinar: Dynamic Network Security Strategies
- Senator Demands Review of How DHS Shares PII With Contractors
- How to Manage Supply Chain Risks
- Weekly Security News Roundup: NordVPN Confirms Third-Party Provider Breach
- Johannesburg Struggles to Recover From Ransomware Attack
- 42 Phony Google Play Apps Delivered Adware: Report
- Using Standards to Bolster Medical Device Cybersecurity
- Here's Why 'Raccoon' Infostealer Is Popular With Criminals
- Senators Push for FTC Probe Into Amazon Over Capital One
- Analysis: Russian Hackers Hijack Iranian Hacking Tools
- FBI Issues Payment Card Skimming Warning
- Phishing Schemes Continue to Plague the Healthcare Sector
- Resolve and Evolve: Machine Learning for Email Threat Protection
- Three Charged in $11 Million BEC Scam
- Live Webinar: A New Strategy for Effective Cyber Security Awareness Campaigns
- Congress Grills Facebook's Zuckerberg on Cryptocurrency Plans
- Florida Health System Slapped With $2.1 Million HIPAA Penalty
- Ransomware Attack Affects Municipal Computer Systems in Johnson City, Tennessee
- NCSC Investigated 658 Serious Cybersecurity Incidents
- Helping Consumers Respond to Data Breaches
- 12-Year Prison Term for Hacking LA Court System
- PSD2 Authentication Deadline Extended: Here's What's Next
- Avast: Stolen VPN Credentials Led to CCleaner Attack Redux
- Veterans' Data at Risk on Shared Network Storage Devices
- Live Webinar | Enterprise Container Services for Fast and Flexible Cloud Native Adoption
- Unsecure Database Exposed US Military Personnel Data: Report
- Facebook Shuts Misleading Accounts Ahead of 2020 Election
- Alexa and Google Home Exposed Users to Phishing Attacks, Eavesdropping via Developer Backends
- Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities
- NordVPN Says Server Compromised Due to Misconfiguration
- Clinton Email Probe Cites 38 for Violations
- Spelevo EK Exploits Flash Player Vulnerability to Deliver Maze Ransomware
- Assange Denied Delay for US Extradition Hearing
- Russian Hackers Coopted Iranian APT Group's Infrastructure
- Zappos' Offer to Breach Victims: A 10 Percent Discount
- Weekly Security News Roundup: Ransomware Still the Top Cyberthreat, Reports Europol
- Malicious Tor Browser Fleeces Darknet Users of Bitcoins
- Healthcare E-Commerce Site Breach Undetected for Years
- Malicious Tor Bowser Fleeces Darknet Users of Bitcoins
- Russia-Linked Cyber Espionage Group APT29 Remains Active
- Domain 'Typosquatting' Hits 2020 US Elections
- Sodinokibi Ransomware Gang Appears to Be Making a Killing
- Fresh Privacy Legislation Would Jail CEOs for Violations
- Darknet Markets: As Police Crack Down, Cybercriminals Adapt
- Cybercrime Tool Prices Continue to Rise on Darknet Sites
- Open Cybersecurity Alliance: In Pursuit of Interoperability
- Phorpiex Botnet Behind Large-Scale 'Sextortion' Campaign
- Email Breaches: A Growing Healthcare Challenge
- How 'Zero Trust' Better Secures Applications and Access
- Robotic Process Automation: Security Essentials
- Phony Company Used to Plant macOS Malware: Report
- 'Graboid' Cryptojacking Worm Spreads Through Containers
- OCR's Severino Outlines Top HIPAA Enforcement Initiatives
- The Ultimate Missing Link in Cyber: Continuous Compromise Assessment
- 'Graboid' Cryptopjacking Worm Spreads Through Containers
- Ransomware Attacks: STOP, Dharma, Phobos Dominate
- 3 Key Risks with Employee Passwords in the Financial Services Industry
- 'Silent Librarian' Revamps Phishing Campaign: Proofpoint
- Stung by Takedowns, Criminals Tap Distributed Dark Markets
- Libra Association Launched Amidst Defections, Congressional Scrutiny
- How Has FTC Data Security Enforcement Changed?
- FIN7 Gang Returns With New Malicious Tools: Researchers
- Report: Hackers Spied on Moroccan Human Rights Activists
- New Corporate Phishing Attacks Mimic Performance Appraisal Processes to Steal Credentials
- Winnti Group Uses New PortReuse Backdoor to Target Asia’s Gaming Industry
- Pitney Bowes Says Ransomware Behind System Outages
- Analysis: New ISO Privacy Standard
- Hepatitis Patients' Data Exposed
- CCPA Amendments Signed; Draft Regulations Released
- Thoma Bravo to Buy Sophos for $3.9 Billion
- Impostor Email Attacks Targeting Healthcare Increased by 300 Percent Between Q1 2018 and Q1 2019
- New BitPaymer Ransomware Campaign Exploits Apple Zero-Day Vulnerability
- Imperva's Breach Post-Mortem: API Key Left Exposed
- Weekly Security News Roundup: Adware-Laden Apps Found Lurking on Google Play Store
- On The Frontlines: Patch Management
- Making the Case for National Unique Patient ID
- The Threat Smokescreen: Key Attack Commonalities
- Capital One Hacking Trial Delay Likely
- A Platform for the Future: IBM i in 2019
- Singapore Man Charged in Large-Scale Cryptomining Scheme
- Nation-State Hackers Greatest Threat to 5G Networks: Report
- Hacked Off: Lawsuit Alleges CafePress Used Poor Security
- Analysis: Twitter's Phone Number Repurposing 'Mistake'
- Fighting Human Nature: How to Combat Socially Engineered Account Takeover Attacks
- Compliance: Mississippi State Agencies Have a Long Way to Go
- Complying with New York's SHIELD Act
- How Cybercriminals Continue to Innovate
- Privacy: How Technology Is Outpacing Regulation
- Preventing Election Interference: New Recommendations
- Volusion Payment Platform Sites Hit by Attackers
- Report: Attacks Target Sites Running Volusion Payment Platform
- Georgia City Avoids Data Loss After Third Ransomware Attack of 2019
- HHS Proposes Allowing Cybersecurity Donations to Doctors
- Application Security: Why Open Source Components Matter
- Preventing Election Meddling: New Recommendations
- FBI: Cybercriminals Are Bypassing Multifactor Authentication
- The Unspoken Insider Threat
- Twitter Apologizes for Repurposing Phone Numbers
- NSA Is Latest Intelligence Agency to Sound VPN Patch Alarm
- Live Webinar | Lessons from the Fortune 1000: Exploring Third-Party Account Takeover Risk and What to Do About It
- Health Data Breach Tally: Ransomware Proliferates
- The Case Against a 'SOC in a Box'
- Minimizing File Transfer Risk
- DevSecOps: Overcoming Resistance
- Geost Banking Botnet Has Infected 800,000 Android Users Since 2016
- Insider Threat Mitigation: Sanctions and Incentives
- Regional Trends in Payment Fraud
- Two-Thirds of Industrial Organizations Don’t Report Cybersecurity Incidents to Regulators, Survey Finds
- Implementing a 'Machine Speed' Response to Attacks
- Webinar | Security Leaders Share "Secret Sauce" for Success with Digital Transformation
- Live Webinar | Making Security Part of the Business Team
- Update: Internet Security Threat Report
- Addressing Privacy Compliance Challenges
- Developers' Code Reuse Security Conundrum: Cut, Paste, Fail
- Open Cybersecurity Alliance: An Open Source Initiative for Enabling Improved Interoperability
- Initial CCPA Compliance Costs Could Hit $55 Billion: Study
- How Google Is Using AI to Help Ensure Android App Security
- Responding to Ransomware Attacks: Critical Steps
- Malicious Bots: Mitigating the Threat
- New Card Fraud Countermeasures
- Attackers Exploit Certified Emails to Target Italians With sLoad Malware
- Report: Android Banking Botnet Targeted Russians
- How to Prioritize Vulnerability Patching
- Weekly Security News Roundup: eGobbler Exploits Browser Bugs to Infect More Than 1 Billion Ads
- Unpatched VPN Servers Targeted by Nation-State Attackers
- Microsoft: Iran-Backed Group Targeted a Presidential Campaign
- Preparing for Security in Cloud 3.0
- Canada's 2020 Privacy Outlook
- URGENT/11 Vulnerabilities: Taking Action
- Toronto Sees 300% Increase in Ransomware Reports
- Nigerian Man Charged in Phishing Scam Targeting US Agencies
- Just How Widespread Is Ransomware Epidemic?
- Malware Most Foul: Emotet, Trickbot, Cryptocurrency Miners
- Facebook Pressured Over Encrypted Messaging Plans
- Ransomware Everywhere
- Analysis: Huawei's U.S. Trust Problem
- HHS Gives Dental Practice Posting PHI on Yelp a Bad Review
- Senators Press Social Media Firms to Fight 'Deepfake' Videos
- Lemon_Duck PowerShell Malware Targets Windows Users With Cryptojacking Campaign
- OnDemand Webinar | Post-GDPR and CCPA: What Must Security Leaders Know about Privacy?
- Silent Starling Group Stages Vendor Email Compromise Attacks
- Report: 'PKPLUG' Espionage Campaign Targets Southeast Asia
- Live Webinar | Six Steps to Secure Unstructured Data
- Remote Desktop Protocol: Securing Access
- 'Vendor Email Compromise': A New Attack Twist
- Latest U.S. Healthcare Ransomware Attacks Have Harsh Impact
- Live Webinar | Cloudspotting Risk: Findings of the 2019 Cloud Risks Report
- Support for Expunging Huawei Gear From Carrier Networks Grows
- Australian Medical Facilities Hit by Ransomware
- Live Webinar: 3 Things You Need to Know About User Apathy and Authentication
- UK Police Auction TalkTalk Hacker's Cryptocurrency Stash
- Bill Calling for DHS Cyber Incident Mitigation Teams Advances
- FDA Issues Alert on Medical Device IPnet Vulnerabilities
- Live Webinar | Unlocking CIAM - the secret to balancing frictionless registration and high data integrity
- New Gucci Botnet Capable of Launching Multiple Types of DDoS Attacks
- Masad Stealer Preys on Telegram Users in Cryptocurrency Theft Campaign
- Sophos Launches Managed Threat Response
- Zynga's Breach Notification: How to Not Inform Victims
- Russian Troll Farm Targeted With Fresh US Sanctions
- 16th Annual National Cybersecurity Awareness Month Begins Today
- Report: US Voting Machines Still Prone to Hacking
- Live Webinar | Intrusion Detection and Prevention Systems: The Reports of Its Death Are No Longer Exaggerated
- Rheinmetall Investigating Malware Attack at Three Plants
- Live Webinar | 3rd Party Application Assessments for Modern Development
- AI Surveillance Tech Promises Safety, But at What Cost?
- Why Did Trump Mention CrowdStrike to Ukraine's President?
- Baltimore Ransomware Carnage Compounded by Local Storage
- 'Privacy by Design': Building Better Apps
- Healthcare Cybersecurity Info Sharing Resource Unveiled
- Analysis: President Trump and 'The Server'
- Case Study: How IU Health Manages Vendor Security Risk
- Live Webinar | Empowering Your Human Firewall: The Art and Science of Secure Behavior
- Former Army Contractor Gets Prison Term for Insider Attack
- Live Webinar | Mobile DevSecOps at Speed - The 5 Steps from 'Dusted' to 'Trusted'
- Live Webinar | Modernize with Monitoring: Keys to Third-Party Risk Management Success
- NIST SP 800-39: Managing Information Security Risk
- NIST FIPS PUB 201-2: Personal Identity Verification of Federal Employees and Contractors DRAFT
- NIST SP 800-61 Revision 1: Computer Security Incident Handling Guide
- DoD: Notice of Proposed Rulemaking on Privacy Training
- Senator Demands Answers About Exposed Medical Imaging Data
- Apple iOS Has Permanent Bootrom Vulnerability
- Life After Snowden: US Still Lacks Whistleblowing Rules
- GOP Rep. Chris Collins Resigns Ahead of Reported Guilty Plea On Insider Trading
- How Big Oil Of The Past Helped Launch The Solar Industry Of Today
- NFL Suspends Oakland Raider Vontaze Burfict For Rest Of Season Over Head-To-Head Hit
- Ousted National Security Adviser Bolton Slams Trump's Approach To North Korea
- Pediatricians Stand By Meds For ADHD, But Some Say Therapy Should Come First
- A Biopsy Came With An Unexpected $2,170 'Cover Charge' For The Hospital
- In Guatemala, A Bad Year For Corn — And For U.S. Aid
- Nothing Lasts, Forever 21 Discovers, As Another Clothing Chain Files For Bankruptcy
- California Governor Signs Bill Allowing College Athletes To Profit From Endorsements
- Up To 4 Feet Of Snow: Montana Hit By 'Unprecedented' Winter Storm
- Explained: Two-Factor vs. Multi-Factor Authentication
- Weekly Security News Roundup: REvil Ransomware Takes Over for GandCrab
- Just A Handful Of Nuts May Help Keep Us From Packing On The Pounds As We Age
- 'The Campaign Is The Amplifier': How Trump Plans To Fight Impeachment Push
- At 70, People's Republic Of China Faces Economic And Political Headwinds
- David Cameron Talks Brexit And His 'Greatest Regret' In New Book 'For The Record'
- Hong Kong Protests: Chaotic Scenes Unfold In Streets Ahead Of China's National Day
- German Cops Raid “Cyberbunker 2.0,” Arrest 7 in Child Porn, Dark Web Market Sting
- MyPayrollHR CEO Arrested, Admits to $70M Fraud
- A Vulnerability in PHP Could Allow for Arbitrary Code Execution
- A Vulnerability in vBulletin Could Allow for Remote Code Execution
- Spotlight Podcast: Breaking Bad Password Habits to Fight Advanced Threats
- Interview With the Guy Who Tried to Frame Me for Heroin Possession
- A Vulnerability in LibreOffice Could Allow for Arbitrary Command Execution
- Zebrocy Malware Receives Updated Downloaders, Backdoor in New Attack Campaign
- Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits
- Multiple Vulnerabilities in Adobe ColdFusion Could Allow for Arbitrary Code Execution (APSB19-47)
- Countdown to National Cybersecurity Awareness Month 2019 Begins
- Mac Malware Masquerades as Trading App to Steal and Upload Users’ Data
- Smominru Botnet Infects 4,700 Victims a Day, Including 90,000 in August
- Weekly Security News Roundup: Millions of Medical Images Viewable on the Web
- Multiple Vulnerabilities in Microsoft Internet Explorer and Microsoft Defender Could Allow for Arbitrary Code Execution
- RSA warns Digital Transformation is supercharging Digital Risk
- Before He Spammed You, this Sly Prince Stalked Your Mailbox
- Patience Zero: Millions of Insecure Medical Images Frustrate Personal Data Protection
- Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec
- Emotet Ends Four-Month Hiatus With Malspam Campaign Targeting Polish-, German-Speaking Users
- Man Who Hired Deadly Swatting Gets 15 Months
- WiryJMPer, Disguised as an ABBC Coin Wallet, Drops Netwire RAT
- Astaroth Trojan Uses Facebook and YouTube Profiles to Support Infection Chain
- InnfiRAT Malware Skitters Onto Systems, Sinks Teeth Into Cryptocurrency Data
- Second Annual State of Alabama Cybersecurity Briefing
- Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy
- NY Payroll Company Vanishes With $35 Million
- Patch Tuesday, September 2019 Edition
- Third Party Cyber Risk is growing. Most Companies aren’t prepared.
- Critical Patches Issued for Microsoft Products, September 10, 2019
- Multiple Vulnerabilities in Adobe Flash Player Could Allow for Arbitrary Code Execution (APSB19-46)
- Secret Service Investigates Breach at U.S. Govt IT Contractor
- Episode 161: 3 Years after Mirai, IoT DDoS Problem may get Worse
- Episode 160 Right to Repair’s Summer of Love – Sort of.
- ‘Satori’ IoT Botnet Operator Pleads Guilty
- Spam In your Calendar? Here’s What to Do.
- Feds Allege Adconion Employees Hijacked IP Addresses for Spamming
- Phishers are Angling for Your Cloud Providers
- Careers in Cybersecurity
- Episode 159: Deep Fakes and Election (in)Security with ZeroFOX
- Ransomware Bites Dental Data Backup Firm
- Cybersecurity Firm Imperva Discloses Breach
- A Vulnerability in Apple iOS Could Allow for Arbitrary Code Execution
- IRS Warns of New Email Scam
- IRS Warns of New Email Scam
- Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards
- Forced Password Reset? Check Your Assumptions
- Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk
- The Rise of “Bulletproof” Residential Networks
- Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence
- Huge Survey of Firmware Finds No Security Gains in 15 Years
- Meet Bluetana, the Scourge of Pump Skimmers
- Patch Tuesday, August 2019 Edition
- Critical Patches Issued for Microsoft Products, August 13, 2019
- Multiple Vulnerabilities in Adobe Photoshop CC Could Allow for Arbitrary Code Execution (APSB19-44)
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB19-41)
- SEC Investigating Data Leak at First American Financial Corp.
- Digital Right to Repair Movement seeks Allies at DEF CON
- iNSYNQ Ransom Attack Began With Phishing Email
- Multiple Vulnerabilities in Cisco Small Business 220 Series Smart Switches Could Allow for Arbitrary Code Execution
- Avoiding Online Selling Scams
- Avoiding Online Selling Scams
- Multiple Vulnerabilities in Cisco WebEx Network Recording Player and Cisco Webex Player Could Allow for Arbitrary Code Execution
- Who Owns Your Wireless Service? Crooks Do.
- Spotlight Podcast: Unpacking Black Hat Hacks with Digicert CTO Dan Timpson
- Episode 156: Looming over Black Hat: doing Security at Massive Scale
- The Risk of Weak Online Banking Passwords
- What We Can Learn from the Capital One Hack
- Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware
- Multiple Vulnerabilities in Wind River VxWorks Could Allow for Remote Code Execution
- Capital One Data Theft Impacts 106M People
- No Jail Time for “WannaCry Hero”
- Critical Flaws in VxWorks affect 200 Million Connected Things
- The Unsexy Threat to Election Security
- Spotlight Podcast: To Fix Remote Access, CyberArk Alero Ditches Passwords and VPNs
- Neo-Nazi SWATters Target Dozens of Journalists
- Episode 154: Richard Clarke on Defending the Fifth Domain
- What You Should Know About the Equifax Data Breach Settlement
- Researcher warns DevOps Security is Back to the Future
- QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
- Robot Account Apocalypse: RPA Risk Exploding with Adoption
- Party Like a Russian, Carder’s Edition
- Meet the World’s Biggest ‘Bulletproof’ Hoster
- Oracle Quarterly Critical Patches Issued July 16, 2019
- Is ‘REvil’ the New GandCrab Ransomware?
- Opinion: We need a way to talk about Cyber Physical Risk
- Episode 153: Hacking Anesthesia Machines and Mayors say No to Ransoms
- FEC: Campaigns Can Use Discounted Cybersecurity Services
- A Vulnerability in Jira Server Could Allow for Server-Side Template Injection
- Breathe Deeply: DHS warns of Flaw in Hospital Anesthesia Machines
- Patch Tuesday Lowdown, July 2019 Edition
- Critical Patches Issued for Microsoft Products, July 09, 2019
- Who’s Behind the GandCrab Ransomware?
- Ahead of Black Hat: Fear and Pessimism in Las Vegas
- Episode 152: What the Silex Malware says about IoT Insecurity and Cloud Security CEO Steve Mullaney on Amazon ReInforce
- Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
- Episode 151: Ransoming the City with Cesar Cerrudo of IOActive
- Podcast Episode 151: Ransoming the City with Cesar Cerrudo of IOActive
- Breach at Cloud Solution Provider PCM Inc.
- Firm Uncovers Major Cyber-Espionage Campaign Against Telcos
- Tracing the Supply Chain Attack on Android
- Attack on Tesla Autopilot highlights Bigger Risk of Insecure Sensors
- Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
- Episode 150: Microsoft’s Tanya Janca on securing Azure and Armor Scientific’s CTO on Life after Passwords
- Podcast Episode 150: Microsoft’s Tanya Janca on securing Azure and Armor Scientific’s CTO on Life after Passwords
- A Vulnerability in Mozilla Firefox Could Allow for Arbitrary Code Execution
- Cognitive Bias is the Threat Actor you may never detect
- A Vulnerability in VLCMedia Player Could Allow for Arbitrary Code Execution
- Securely Disposing Mobile Devices
- Episode 149: How Real is the Huawei Risk?
- Expert: Patch Bluekeep Now or Face WannaCry Scenario
- Microsoft Patch Tuesday, June 2019 Edition
- Critical Patches Issued for Microsoft Products, June 11, 2019
- A Vulnerability in Adobe Flash Could Allow for Arbitrary Code Execution (APSB19-30)
- Multiple Vulnerabilities in Adobe ColdFusion Could Allow for Arbitrary Code Execution (APSB19-27)
- What is ransomware?
- What is ransomware?
- A Vulnerability in Exim Could Allow for Remote Command Execution
- Dark Web Looms Large as Enterprise Threat
- Episode 148: Joseph Menn on Cult of the Dead Cow also Veracode CEO Sam King on InfoSec’s Leaky Talent Pipeline
- LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach
- Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware
- Do Cities deserve Federal Disaster Aid after Cyber Attacks?
- NY Investigates Exposure of 885 Million Mortgage Documents
- Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors
- Episode 147: Forty Year Old GPS Satellites offer a Warning about securing the Internet of Things
- Should Failing Phish Tests Be a Fireable Offense?
- Microsoft ‘Bluekeep’ Flaw threatens Medical Devices, IoT
- First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records
- DHS Warns That Drones Made in China Could Steal U.S. Data
- Legal Threats Make Powerful Phishing Lures
- Episode 146: Elections Loom, Political Parties struggle with Cyber Security and Securing Cloud with Aporeto’s Amir Sharif
- Episode 146: Elections Loom, Political Parties struggle with Cyber Security and Securing Cloud with Aporeto CEO Amir Sharif
- Keeping Passwords Simple
- Account Hijacking Forum OGusers Hacked
- Researchers Hack Aircraft Landing System with $600 Radios
- Spotlight Podcast: Managing the Digital Risk in your Digital Transformation
- Feds Target $100M ‘GozNym’ Cybercrime Network
- Personalized Scams
- A Tough Week for IP Address Scammers
- Israeli Group Exploited WhatsApp to Spy on Users
- Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB19-18)
- A Vulnerability in Adobe Flash Could Allow for Arbitrary Code Execution (APSB19-26)
- Critical Patches Issued for Microsoft Products, May 14, 2019
- Nine Charged in Alleged SIM Swapping Ring
- Chinese APT Group, Used Stolen NSA Hacking Tools Before Shadow Brokers
- Episode 145: Veracode CTO Chris Wysopal and Life After Passwords with Plurilock
- Report: Companies Still Grappling with IoT Security
- What’s Behind the Wolters Kluwer Tax Outage?
- Securing Your Home Wi-Fi Network
- Securing Your Home Wi-Fi Network
- Feds Bust Up Dark Web Hub Wall Street Market
- Credit Union Sues Fintech Giant Fiserv Over Security Claims
- New IoT Security Regulations on Tap in U.S., U.K.
- The National Cyber Security Alliance and ITSPmagazine Announce Partnership in Support of CyberSecure My Business™
- Episode 144: Infosec Supporting Right to Repair with Joe Grand and Kyle Wiens
- Unsecured Database Exposes Data of 80M U.S. Households
- Data: E-Retail Hacks More Lucrative Than Ever
- Introducing Securepairs.org: Fighting Infosec FUD for the Right to Repair
- P2P Weakness Exposes Millions of IoT Devices
- A Vulnerability in Oracle WebLogic Could Allow for Remote Code Execution
- FBI: Cybercrime Accounted for $2.7B in Losses in 2018
- Podcast Episode 143: Tufin’s IPO with CEO Ruvi Kitov and Capsule8 on securing Linux at Scale
- Drive-By Malware Uses Google Sites for Drive by Download Attacks
- Who’s Behind the RevCode WebMonitor RAT?
- Marcus “MalwareTech” Hutchins Pleads Guilty to Writing, Selling Banking Malware
- Wipro Intruders Targeted Other Major IT Firms
- Multiple Vulnerabilities in Drupal Could Allow for Arbitrary Code Execution
- How Not to Acknowledge a Data Breach
- Report: Bad Bots sent One in Five Web Requests in 2018
- Podcast Episode 142: On Supply Chains Diamond-based Identities are forever
- The National Cyber Security Alliance and the Better Business Bureau Recommend Top Online “Take-Action Tips” to Help Keep You Safe and Secure
- Oracle Quarterly Critical Patches Issued April 16, 2019
- Experts: Breach at IT Outsourcing Giant Wipro
- ‘Land Lordz’ Service Powers Airbnb Scams
- The National Cyber Security Alliance Welcomes Three Prominent Industry Leaders to Board of Directors
- Multiple Vulnerabilities in Juniper Junos OS Could Allow for Remote Code Execution (2019-04)
- Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities
- Android 7.0+ Phones Can Now Double as Google Security Keys
- Mysterious Trisis Malware Strikes Again
- Warning: Trump Terrorist Designation May Prompt Iranian Cyber Attacks
- Patch Tuesday Lowdown, April 2019 Edition
- Multiple Vulnerabilities in Adobe Shockwave Player Could Allow for Arbitrary Code Execution (APSB19-20)
- Podcast Episode 141: Massive Data Breaches Just Keep Happening. We Talk about Why.
- Multiple Vulnerabilities in Adobe Flash Player Could Allow for Arbitrary Code Execution (APSB19-19)
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB19-17)
- Critical Patches Issued for Microsoft Products, April 09, 2019
- Interview: securing the University using NIST’s Cyber Framework
- A Year Later, Cybercrime Groups Still Rampant on Facebook
- Alleged Chief of Romanian ATM Skimming Gang Arrested in Mexico
- Hackers Remotely Steer Tesla Model S Using Autopilot System
- Podcast Episode 140: passwords are dying. What will replace them?
- Canadian Police Raid ‘Orcus RAT’ Author
- Multiple Vulnerabilities in WordPress Social Warfare Plugin Could Allow for Remote Code Execution
- Multiple Vulnerabilities in Magento CMS Could Allow for Remote Code Execution
- Annual Protest Raises $250K to Cure Krebs
- Man Behind Fatal ‘Swatting’ Gets 20 Years
- A Month After 2 Million Customer Cards Sold Online, Buca di Beppo Parent Admits Breach
- Asus ShadowHammer suggests Supply Chain Hacks are the New Normal
- Podcast Episode 139: the State(s) of Right to Repair and API Insecurity on GitHub
- Podcast Episode 139: the State of Right to Repair and API Insecurity on GitHub
- A Vulnerability in WordPress Easy WP SMTP Plugin Could Allow for Remote Code Execution
- Alleged Child Porn Lord Faces US Extradition
- Opinion: my Grandfather’s John Deere would support our Right to Repair
- Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years
- Report: with most exploited vuln of 2018, it’s really Really REALLY time to ditch IE!
- Norsk Hydro Hit with ‘Severe’ LockerGoga Ransomware Attack
- Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow
- RSA Recap: CTO Zulfikar Ramzan talks about Trust, Zero Trust and the Debate over Going Dark
- Why Phone Numbers Stink As Identity Proof
- Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams
- Ad Network Sizmek Probes Account Breach
- Spotlight: CTIA’s IoT Cybersecurity Certification is a Big Deal. Here’s why.
- Pro-Brexit Camp Wages Active ‘Fake News’ Twitter Campaign
- Patch Tuesday, March 2019 Edition
- Podcast Episode 137 Sponsored by Code42: GirlScouts to the Rescue and Rethinking Enterprise DLP
- The National Cyber Security Alliance Welcomes New Board Members
- Critical Patches Issued for Microsoft Products, March 12, 2019
- A Vulnerability in Adobe Photoshop CC Could Allow for Arbitrary Code Execution (APSB19-15)
- Insert Skimmer + Camera Cover PIN Stealer
- Mobile Device Security While Traveling
- Mobile Device Security While Traveling
- MyEquifax.com Bypasses Credit Freeze PIN
- Report: China, Like Russia, Uses Social Media to Sway U.S. Public Opinion
- Smart Home Devices
- For Customers, Backstory’s Lure is Data, Economics
- Devices’ UPnP Service Emerges as Key Threat to Home IoT Networks
- Podcast Episode 136: The Geopolitics of Cyber Attacks with LookingGlass and Bruce Schneier on Public Interest Cyber
- Hackers Sell Access to Bait-and-Switch Empire
- At RSA: Focus on Cyber in the Public Interest
- Following Security Ledger at RSA Conference: Monday
- A Vulnerability in Adobe ColdFusion Could Allow for Arbitrary Code Execution (APSB19-14)
- Research: Sextortion Scams more frequent, sophisticated
- Booter Boss Interviewed in 2014 Pleads Guilty
- Crypto Mining Service Coinhive to Call it Quits
- Spotlight: Synopsys on democratizing Secure Software Development
- Former Russian Cybersecurity Chief Sentenced to 22 Years in Prison
- Podcast Episode 135: The Future of Passwords with Google Account Security Chief Guemmy Kim
- Clues You Have Been Hacked
- Payroll Provider Gives Extortionists a Payday
- EU calls for End to Default Passwords on Internet of Things
- A Vulnerability in Drupal Could Allow for Remote Code Execution
- New Breed of Fuel Pump Skimmer Uses SMS and Bluetooth
- Multiple Vulnerabilities in WordPress Could Allow for Remote Code Execution
- Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise
- A Deep Dive on the Recent Widespread DNS Hijacking Attacks
- Search Yourself Online
- Waiting for Federal Data Privacy Reform? Don’t Hold Your Breath.
- Bomb Threat Hoaxer Exposed by Hacked Gaming Site
- Podcast Episode 133: Quantum Computing’s Security Challenge and Life After Passwords
- Patch Tuesday, February 2019 Edition
- Email Provider VFEmail Suffers ‘Catastrophic’ Hack
- Critical Patches Issued for Microsoft Products, February 12, 2019
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB19-07)
- Multiple Vulnerabilities in Adobe ColdFusion Could Allow for Arbitrary Code Execution (APSB19-10)
- In Granite State: Industry Groups Paint Dark Picture of Right to Repair
- Four Signs You’re Ready for a Virtual CISO
- Phishers Target Anti-Money Laundering Officers at U.S. Credit Unions
- Government, Private Sector Unprepared for 21st Century Cyber Warfare
- ExileRAT Malware Targets Tibetan Exile Government
- More Alleged SIM Swappers Face Justice
- Podcast Episode 132: NERC issues a Big Fine – does it matter?
- Testimony: There’s No Internet of Things Risk in Repair
- Crooks Continue to Exploit GoDaddy Hole
- Russian Cyber Criminal Named as Source of Massive Collection 1 Data Dump
- Updated: Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks
- Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks
- 250 Webstresser Users to Face Legal Action
- Four More Collections, 700 Million Stolen Passwords Discovered
- Preparing Your Child to Function in a Digital World
- Preparing Your Child to Function in a Digital World
- Podcast Episode 131: suing Yahoo! Executives…and winning
- DoJ Charges Huawei Execs in Broad Indictment Spanning 10 Years of Criminal Activity
- A Vulnerability in Microsoft Exchange Could Allow for Privilege Escalation
- Tread Lightly with Threat Intel Add-Ons
- Buyer Beware: Not All Threat Intel Add-Ons are Equal
- Facebook opens up on System that ‘protects Billions’
- Three Charged for Working With Serial Swatter
- Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution
- Report: IoT Still Wildly Insecure as New ‘Credential Compromise’ Threat Emerges
- How the U.S. Govt. Shutdown Harms Security
- Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com
- MS-ISAC CYBERSECURITY ADVISORY – Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution – PATCH: NOW – TLP: WHITE
- Podcast Episode 130: Troy Hunt on Collection 1 and Tailit’s Tale of IoT Security Redemption
- LinkedIn Says Glitch, Not FSB, to Blame for Russian Job Postings
- A Vulnerability in Juniper Junos Could Allow for Remote Code Execution
- 773M Password ‘Megabreach’ is Years Old
- Multiple Vulnerabilities in IDenticard PremiSys Access Control System Could Allow for Administrative Access
- Report: Iranian APT Actors Regroup After Main Security Forum Shuts Down
- Data Privacy Day 2019 Reminds Businesses and Consumers About the Value of Personal Data and the Need to Protect It
- Podcast Episode 129: Repair Eye on the CES Guy and Sensor Insecurity
- “Stole $24 Million But Still Can’t Keep a Friend”
- Tax Return Scams
- Tax Return Scams
- Oracle Quarterly Critical Patches Issued January 15, 2019
- Courts Hand Down Hard Jail Time for DDoS
- That Other Moscow: Sketchy LinkedIn Job Posts Mix US, Russian Locales
- Secret Service: Theft Rings Turn to Fuze Cards
- Patch Tuesday, January 2019 Edition
- Dirt-Cheap, Legit, Windows Software: Pick Two
- Podcast Episode 128: Do Security and Privacy have a Booth at CES?
- Podcast Episode 128: CES is cool but is it secure?
- Critical Patches Issued for Microsoft Products, January 8, 2019
- More Questions as Expert Recreates Chinese Super Micro Hardware Hack
- Multiple Vulnerabilities in Microsoft Windows and Windows Server Could Allow for Arbitrary Code Execution
- Sensor-y Overload: Cyber Risk and the Merrimack Valley Gas Explosions
- Apple Phone Phishing Scams Getting Better
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB19-02)
- Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack
- Abine says Blur Password Manager User Information Exposed
- Mobile Apps
- Podcast Episode 127: Donnie, Talk to China and Other Lessons from 2018
- Happy 9th Birthday, KrebsOnSecurity!
- Die Hard is a Movie About Building Automation Insecurity. Discuss.
- Serial Swatter and Stalker Mir Islam Arrested for Allegedly Dumping Body in River
- ‘Alexa, Protect My Data’: Amazon Sends Private Voice Files to Unauthorized Customer
- Feds Charge Three in Mass Seizure of Attack-for-hire Services
- Facebook: We Didn’t Give Anyone Data Without User Permission
- Spotlight: as Attacks Mount, how to secure the Industrial Internet
- Microsoft Issues Emergency Fix for IE Zero Day
- Password Security
- Password Security
- A Vulnerability in Microsoft Internet Explorer Could Allow for Arbitrary Code Execution
- Podcast Episode 125: Long After The Election Kremlin’s Computational Propaganda Campaign Rolls On
- A Chief Security Concern for Executive Teams
- Make a Digital New Year’s Resolution: Keep Your Computer Systems and Software Up to Date
- Destructive Shamoon Malware Attacks Italian Oil Services Firm
- Spammed Bomb Threat Hoax Demands Bitcoin
- Scanning for Flaws, Scoring for Security
- Criminals, Not State Actors, Target Russian Oil Company in 3-Year Cyber Attack
- Episode 124: The Twitter Accounts Pushing French Protests. Also: social engineering the Software Supply Chain
- Patch Tuesday, December 2018 Edition
- Is 2019 Privacy Rights’ Break Out Year?
- MS-ISAC CYBERSECURITY ADVIOSRY – Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution – PATCH: NOW – TLP: WHITE
- Critical Patches Issued for Microsoft Products, December 11, 2018
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-41)
- How Internet Savvy are Your Leaders?
- Bomb Threat Hoaxer, DDos Boss Gets 3 Years
- Days After Massive Breach, Marriott Customers Await Details
- The Next Fraud Domain: Search Results
- Researchers: GDPR Already Having Positive Effect on Cybersecurity in EU
- Safe Cyber Shopping
- Safe Cyber Shopping
- Multiple Vulnerabilities in Adobe Flash Player Could Allow for Arbitrary Code Execution (APSB18-42)
- A Breach, or Just a Forced Password Reset?
- Podcast Episode 123: HaveIBeenPwned’s Troy Hunt on Marriott’s Big Mess and GreatHorn on the Asymmetric Threat of Email
- National Cyber Security Alliance Responds to Marriott Cybersecurity Incident
- The National Cyber Security Alliance Appoints Kelvin Coleman as Executive Director
- Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution
- Jared, Kay Jewelers Parent Fixes Data Leak
- Massive Marriott Breach Underscores Risk of overlooking Data Liability
- What the Marriott Breach Says About Security
- Data Breach Exposes Records of 114 Million U.S. Citizens, Companies
- Marriott: Data on 500 Million Guests Stolen in 4-Year Breach
- Spotlight: Operationalizing Deep Web and Dark Web Intelligence
- Iranians Indicted in SamSam Ransomware Scheme
- Podcast Episode 122: will 5G increase Internet of Things Risk?
- Half of all Phishing Sites Now Have the Padlock
- How to Shop Online Like a Security Pro
- USPS Site Exposed Data on 60 Million Users
- Multiple Vulnerabilities in VMware vSphere Data Protection Could Allow for Remote Code Execution
- A Vulnerability in Adobe Flash Player Could Allow for Arbitrary Code Execution (APSB18-44)
- A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
- Podcast Episode 121: DMCA Exemptions Set Stage for Right to Repair Fight and DHS Cyber Makeover
- Report: Small, Stealthy Groups Behind Worst Cybercrimes
- Survey: Attacks Find Insecure IoT Devices
- Survey Finds Attacks Find Insecure IoT Devices
- Calif. Man Pleads Guilty in Fatal Swatting Case, Faces 20+ Years in Prison
- Patch Tuesday, November 2018 Edition
- Multiple Vulnerabilities in PostgreSQL Could Allow for Arbitrary Code Execution
- A Vulnerability in WordPress WP GDPR Compliance Plugin Could Allow for Arbitrary Code Execution
- Nigerian ISP Hijacks Google Traffic, Sends It Through Russia and China
- That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
- Podcast Episode 120: They Email Ballots, Don’t They?
- Critical Patches Issued for Microsoft Products, November 13, 2018
- Cheers to Safe Cybershopping!
- Bug Bounty Hunter Ran ISP Doxing Service
- Bank Attacks Put Password Insecurity Back in the Spotlight
- U.S. Secret Service Warns ID Thieves are Abusing USPS’s Mail Scanning Service
- Phone Call Attacks
- Busting SIM Swappers and SIM Swap Myths
- A Vulnerability in Cisco Unity Express Could Allow for Arbitrary Code Execution
- Feds, Facebook Join Forces to Prevent Mid-Term Election Fraud
- Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails
- Email and Emotions
- A Vulnerability in Microsoft Edge Could Allow for Arbitrary Code Execution
- Who’s In Your Online Shopping Cart?
- Managed Threat Hunting Bridges the Talent Gap
- SMS Phishing + Cardless ATM = Profit
- Report: China Eyes IoT as Next Front of Cyber War on U.S.
- A Vulnerability in Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software Could Allow for Denial of Service
- Equifax Has Chosen Experian. Wait, What?
- Sextortionist Campaigns Get Personal, Creative to Force Payouts
- Podcast Episode 118: White Hat Eye on the Gaming Guy
- Mirai Co-Author Gets 6 Months Confinement, $8.6M in Fines for Rutgers Attacks
- How Do You Fight a $12B Fraud Problem? One Scammer at a Time
- Research: Russian Disinformation Campaigns Target African Americans
- Report: Obvious Security Flaws Make ICS Networks Easy Targets
- Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats
- Who Is Agent Tesla?
- Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk
- Browse With Encryption
- Multiple Vulnerabilities in Drupal Could Allow for Remote Code Execution
- Oracle Quarterly Critical Patches Issued October 16, 2018
- Podcast Episode 116: Cryptojacking and MikroTik’s Bad-Feeling Feel Good Patch Story
- A Vulnerability in IBM WebSphere Application Server Could Allow for Remote Code Execution
- Supply Chain Security 101: An Expert’s View
- Patch Tuesday, October 2018 Edition
- Multiple Vulnerabilities in Juniper Products Could Allow for Remote Code Execution
- Naming & Shaming Web Polluters: Xiongmai
- Podcast Episode 115: Joe Grand on Unicorn Spotting and Bloomberg’s Supply Chain Story
- Lock Your Mobile Devices
- Critical Patches Issued for Microsoft Products, October 9, 2018
- Patch and Update
- Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?
- Unique Passwords
- Apple, Amazon Throw Shade on Supply Chain Hack Story
- NotPetya Horror Story Highlights Need for Holistic Security
- Two-Step Verification
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Remote Code Execution
- When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference?
- Episode 114: Complexity at Root of Facebook Breach and LoJax is a RAT You Can’t Kill
- How Digital Transformation is forcing GRC to evolve
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-30)
- Voice Phishing Scams Are Getting More Clever
- Massive Facebook Breach Affects 90 Million Accounts
- Facebook Security Bug Affects 90M Users
- Secret Service Warns of Surge in ATM ‘Wiretapping’ Attacks
- Ransomware
- Report: Hacking Risk for Connected Vehicles Shows Significant Decline
- AggregateIQ Faces First GDPR Enforcement Over Data-Privacy Dispute
- Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required!
- Beware of Hurricane Florence Relief Scams
- A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- In Boston Exercise, Election Hackers Bypass Voting Machines
- Credit Freezes are Free: Let the Ice Age Begin
- Credit Freezes are Free: Let the Ice Age Begin
- ISS Daily Summary Report – 9/20/2018
- Mirai Creators Cooperate with Feds to Avoid Prison
- Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
- Mirai Botnet Authors Avoid Jail Time
- Mirai Botnet Authors Avoid Jail Time
- ISS Daily Summary Report – 9/19/2018
- Kaspersky: Attacks on Smart Devices Rise Threefold in 2018
- Report: Financial industry in crosshairs of credential-stuffing botnets
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-34)
- ISS Daily Summary Report – 9/18/2018
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
- GovPayNow.com Leaks 14M+ Records
- GovPayNow.com Leaks 14M+ Records
- Podcast Episode 112: what it takes to be a top bug hunter
- ISS Daily Summary Report – 9/17/2018
- ISS Daily Summary Report – 9/14/2018
- Social Media Privacy Settings
- Social Media Privacy Settings
- ISS Daily Summary Report – 9/13/2018
- Veeam mishandles Own Data, exposes 440M Customer E-mails
- U.S. Mobile Giants Want to be Your Online Identity
- U.S. Mobile Giants Want to be Your Online Identity
- ISS Daily Summary Report – 9/12/2018
- Spotlight Podcast: Flashpoint’s Allison Nixon on SIM Swapping and the Looming Online Identity Crisis
- Patch Tuesday, September 2018 Edition
- Patch Tuesday, September 2018 Edition
- ISS Daily Summary Report – 9/11/2018
- In a Few Days, Credit Freezes Will Be Fee-Free
- In a Few Days, Credit Freezes Will Be Fee-Free
- Critical Patches Issued for Microsoft Products, September 11, 2018
- Multiple Vulnerabilities in Adobe ColdFusion Could Allow for Arbitrary Code Execution (APSB18-33)
- Podcast Episode 111: Click Here to Kill Everybody and CyberSN on Why Security Talent Walks
- ISS Daily Summary Report – 9/10/2018
- ISS Daily Summary Report – 9/07/2018
- Securely Deleting Files
- Securely Deleting Files
- Opinion: The Corporate Lessons of Election Hacks
- ISS Daily Summary Report – 9/06/2018
- Leader of DDoS-for-Hire Gang Pleads Guilty to Bomb Threats
- Leader of DDoS-for-Hire Gang Pleads Guilty to Bomb Threats
- Before Senate Facebook, Twitter Defend Efforts to Stop Fake News
- Browser Extensions: Are They Worth the Risk?
- Browser Extensions: Are They Worth the Risk?
- ISS Daily Summary Report – 9/05/2018
- What is Malware
- What is Malware
- Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
- For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records
- For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records
- ISS Daily Summary Report – 9/04/2018
- Collection Management: a Crash-Course
- Shopping Online
- Shopping Online
- Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted
- Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted
- ISS Daily Summary Report – 8/31/2018
- Never Share Your Passwords
- Never Share Your Passwords
- ISS Daily Summary Report – 8/30/2018
- Video: How Automation and Machine Learning Power Future of SIEM
- Automation, Machine Learning Power Future of SIEM
- Instagram’s New Security Tools are a Welcome Step, But Not Enough
- Instagram’s New Security Tools are a Welcome Step, But Not Enough
- Voting Machine Maker Defends Refusal of White-Hat Hacker Testing at DEF-CON
- ISS Daily Summary Report – 8/29/2018
- When Away
- When Away
- North Korea’s Lazarus Tied to Cryptojacking Campaign Targeting MacOS
- Multiple Vulnerabilities in Joomla! Could Allow for Arbitrary Code Execution
- ISS Daily Summary Report – 8/28/2018
- Fiserv Flaw Exposed Customer Data at Hundreds of Banks
- Fiserv Flaw Exposed Customer Data at Hundreds of Banks
- Three Decades On: RSA Labs Sets Course for Future
- CEO Fraud
- CEO Fraud
- Podcast Episode 110: Why Patching Struts isn’t Enough and Hacking Electricity Demand with IoT?
- ISS Daily Summary Report – 8/27/2018
- Cloud Security
- Cloud Security
- Who’s Behind the Screencam Extortion Scam?
- Who’s Behind the Screencam Extortion Scam?
- ISS Daily Summary Report – 8/24/2018
- Secure Your Home Wi-Fi Router
- Secure Your Home Wi-Fi Router
- McAfee Researchers Exploit Smart Plug to attack Smart TV!
- Cisco Links Remote Access Tool Remcos to Cybercriminal Underground
- Experts Urge Rapid Patching of ‘Struts’ Bug
- Experts Urge Rapid Patching of ‘Struts’ Bug
- ISS Daily Summary Report – 8/23/2018
- Back up Your Files
- Spotlight Podcast: Arctic Wolf on Nurturing Talent for the Evolved SOC
- Alleged SIM Swapper Arrested in California
- Don't Lose That Device
- A Vulnerability in Apache Struts Could Allow for Remote Code Execution
- Never Try to Fix the Problem When Hacked
- Podcast Episode 109: What’s The US Freedom Army? Ask Russia.
- Two Home Computers
- Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution
- Indian Bank Hit in $13.5M Cyberheist After FBI ATM Cashout Warning
- Spotlight Podcast: Synopsys’ Dan Lyon on the Challenge of Securing Connected Medical Devices
- Don't Trust Links Sent in Email Messages
- Hanging Up on Mobile in the Name of Security
- Stand up for Journalism: Our Most Important, Least Glamorous Profession
- You Are a Target
- You Are a Target
- From Mainframes to Connected Cars: How Software drives the Automotive Industry
- ISS Daily Summary Report – 8/15/2018
- Patch Tuesday, August 2018 Edition
- Patch Tuesday, August 2018 Edition
- Forwarding Emails
- Forwarding Emails
- ISS Daily Summary Report – 8/14/2018
- Critical Patches Issued for Microsoft Products, August 14, 2018
- Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-29)
- ISS Daily Summary Report – 8/13/2018
- FBI Warns of ‘Unlimited’ ATM Cashout Blitz
- FBI Warns of ‘Unlimited’ ATM Cashout Blitz
- A Vulnerability in Oracle Database Could Allow for Complete Compromise
- ISS Daily Summary Report – 8/10/2018
- ISS Daily Summary Report – 8/09/2018
- A Vulnerability in the Linux Kernel Could Allow for Denial of Service Conditions
- ISS Daily Summary Report – 8/08/2018
- Florida Man Arrested in SIM Swap Conspiracy
- Florida Man Arrested in SIM Swap Conspiracy
- ISS Daily Summary Report – 8/07/2018
- Multiple Vulnerabilities in HP Printer Products Could Allow for Remote Code Execution
- Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
- Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution
- Credit Card Issuer TCM Bank Leaked Applicant Data for 16 Months
- Credit Card Issuer TCM Bank Leaked Applicant Data for 16 Months
- The Year Targeted Phishing Went Mainstream
- The Year Targeted Phishing Went Mainstream
- Reddit Breach Highlights Limits of SMS-Based Authentication
- Reddit Breach Highlights Limits of SMS-Based Authentication
- State Govts. Warned of Malware-Laden CD Sent Via Snail Mail from China
- State Govts. Warned of Malware-Laden CD Sent Via Snail Mail from China
- LifeLock Bug Exposed Millions of Customer Email Addresses
- LifeLock Bug Exposed Millions of Customer Email Addresses
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution