Html Sitemap

Night Sky Ransomware Distributed via Log4j Exploits
Researchers Identify New Way to Detect IoT Device Malware
Microsoft Patch Tuesday: An 'Unusually Large' Patch Release
Russian APTs: Why Stakes Are So High for Healthcare Sector
Report: DeFi Undermined by Centralization, Code Flaws
Proofpoint Acquires AI-Based Data Protection Startup Dathena
Ukraine Police Bust Ransomware Suspects Tied to 50 Attacks
Maryland Health Department Confirms Attack Was Ransomware
White House Hosts Open-Source Security Summit With Big Tech
North Korean APTs Target Cryptocurrency Startups
Ukrainian Websites Defaced as Tensions With Russia Continue
18 Firefox 96 Security Fixes Include High-Risk Issues
Russia Arrests 14 Suspected REvil Ransomware Group Members
ISMG Editors: Is 2022 the Year of the SBOM?
North Korean Crypto Theft Totals $400 Million in 2021
Clinic Breach Affecting 200,000 Tied to Vendor's 2020 Attack
FCC Proposes Stricter Telecom Breach Notification Measures
OCC Chief Calls for Collaboration in Crypto Regulations
Accellion Agrees to $8.1 Million Breach Settlement
Russia Charges 8 REvil Ransomware Suspects After Raids
Apple Safari Browser Bug Can Leak Browsing Activity
Enom's Data Center Migration Leaves Customers ‘Trapped’
Destructive Malware Discovered Targeting Ukrainian Systems
Doxbin Leak Includes Criminals' Data, Could Boost Hacking
Record Number of Major Health Data Breaches in 2021
GAO: SolarWinds, Exchange Hacks Reveal Info-Sharing Gaps
JPMorgan Chase Invests $12 Billion in Security Updates
Indian Fashion Retailer Data Leaked on Darknet Marketplace
Privacy Fines: GDPR Sanctions in 2021 Exceeded $1 Billion
How the 'Great Resignation' Is Affecting Cybersecurity
HHS Issues Trusted Health Data Exchange Governance Framework
EU's Cyber Rapid Response Team on Standby for Ukraine
New Chinese Threat Group Deals in Espionage and Theft
NSO Group Spyware Reportedly Used by Israeli Police Force
European Authorities Seize VPN Service Tied to Ransomware
Update: OpenSubtitles Data Breach Affects 6.7 Million Users
Profiles in Leadership: Marcel Lehner
Log4Shell Update: VMware Horizon Targeted
2 Key Cybersecurity Lawmakers Will Not Seek Reelection
New FS-ISAC Program Boosts Supply Chain Security Dialogue
Biden Memo Orders Cybersecurity Improvements
Update: 'This Was a Targeted Attack,' Says Red Cross
UK Issues Fresh Proposals to Tackle Cyberthreats
OnDemand Webinar | How YOUR Data Can Drive Cloud Security Success at Scale
Teardown: Fake Ransomware Targeting Ukrainian Government
Israeli Officials Deny Claims of Improper Spyware Use
HHS HC3: Healthcare Sector Remains at Risk for Log4j Attacks
Crypto.com Confirms Breach, Nearly $34 Million in Losses
Wiper Malware in Ukraine Ties to Summer 2021 Intrusions
3 Weeks, 6 Bugs: Experts Analyze, Advise on WordPress Flaws
From the Trenches: Remediating Widespread Apache Log4j Flaw
ISMG Editors: Will Ransomware Kill Cyber Insurance?
EU Plans to Build Its Own DNS Infrastructure
Federal Authorities, Patient Safety Experts Warn of Risks
US Federal Reserve Issues Report on Digital Dollar
Twitter: Head of Security Reportedly Fired; CISO to Leave
Multi-Cloud Environments: Securing Greater Visibility
Suspected REvil Ransomware Spinoff 'Ransom Cartel' Debuts
FBI Warns of Cybercriminals Using QR Codes to Steal Funds
NY Fines Vision Benefits Firm $600,000 for 2020 Breach
Microsoft Finds SolarWinds Vulnerability Amid Log4j Search
Report: DHS Fears Russian Cyberattack If US Acts on Ukraine
Dark Souls 3 Video Game Reportedly Has Exploitable Flaw
How Do You Detect - and Stop - Bank Identity Number Attacks?
Beyond Log4j: Improving Open-Source Software Security
'Email Security Doesn't Get the Attention It Deserves'
Drug Testing Lab Portal Incident Exposed Data for 4 Years
US, NATO Discuss Ukrainian Cyber Aid Amid Tensions
Hacktivists Hit Belarusian Railroad to Stop Russian Troops
Ransomware Trends: Volume of Known Victims Remains Steady
New WordPress Vulnerability Affects AdSanity Plug-in
New Strategy Funds UK Public Services' Cyber Resilience
US OMB Releases Zero Trust Strategy for Federal Agencies
Proposed Settlement Calls for Health Plan to Bolster Security
Kentucky Hospital Still Struggles One Week After Cyberattack
Spotting Cybersecurity Gaps, Becoming More Systems-Focused
SEC Chair Seeks to 'Modernize' Cybersecurity Regulations
Report: Access Broker Exploiting VMware Log4j Vulnerability
ITRC: Identity Crime Predictions for 2022
Microsoft Mitigates 'Largest Known DDoS Attack'
Battling Bugs: UK Government Pitches 'Scanning Made Easy'
Lawsuit: 'Negligence' Led to Memorial Health System Attack
CISA, EPA Issue 100-Day Cyber Plan for Water Utilities
Crypto Advocates Decry Bill That Could Ban Transactions
How Refund Fraud Changed the Cybercrime Landscape
Cyberattack Spillover From Ukraine: Be Prepared, UK Warns
Flaw in Polkit's pkexec Puts Linux Users at Risk
ISMG Editors: Tough Lessons Learned From Log4j, Ransomware
New macOS Malware Planted via Pro-Democracy Hong Kong Radio
Darknet Market Search Engine Operator Gets 8-Year Sentence
FCC Votes to Ban China Unicom From Operating in US
New Ransomware Deadbolt Targets QNAP Devices
Log4j Exploitations Have Slowed, But Attack Vectors Remain
DeFi Platform Qubit Finance Hacked for $80 Million
FBI Reportedly Considered Buying NSO Spyware
Dark Overlord Collaborator Sentenced to Three Years
Trellix CEO Details Extended Detection and Response Moves
Lazarus Using Windows Update, GitHub to Deploy Malware
HHS HC3: BlackMatter Threat to Health Sector 'Reduced'
Report Details Russian Cyberespionage Efforts in Ukraine
Rust-Coded Malware Key Factor in BlackCat's Meteoric Rise
ITRC Data Breach Report Shows Surge in Data Compromises
EU Proposes a Joint Cyber Incident Coordination Framework
US Sends Top Cyber Official to Europe Amid Ukraine Crisis
Congressman Moves to Amend Controversial Crypto Measure
Russia's Escalation in Ukraine Sounds Cyber Defense Alarms
New EU Laws: An Opportunity for Threat Actors?
Log4j Puts Vulnerable Ubiquiti Network Applications at Risk
Greek DPA Imposes Fines on Telcos for GDPR Violations
The Business Value and Benefits of Vulnerability and Asset Management, featuring Forrester
House Committee Advances FISMA Modernization Act
DOJ: Healthcare at Center of Biggest US Fraud Cases in 2021
How to Maximize Security Through Simplicity
State of the Internet/Security Report: API: The Attack Surface That Connects Us All
DDoS Defense in a Hybrid Cloud World
The Evolution of Bots
Perfis em Liderança: Allan Müller Buscarino
Wormhole Blockchain Bridge Exploited for Over $300 Million
India’s Annual Budget Calls for 30% Tax on Cryptocurrency
Buying Bot-Stolen Logs: Marketplaces Make It '2easy'
US DHS Establishes Cyber Safety Review Board
Politically Themed Lures Target Palestinians
Pfizer: 2 Ex-Executives Stole Drug IP to Help Their Startups
UK-Based KP Snacks Hit by Ransomware in 'Snack Attack'
Enhancing the Cyber Resilience of Critical Infrastructure
M&A Roundup: Delinea Debuts, Forescout & Check Point Expand
Profiles in Leadership: Bradley Schaufenbuel
Profiles in Leadership: Cara Coleman
Profiles in Leadership: Jerich Beason
Eset Fixes Privilege Escalation Bug Affecting Windows Users
Cybercrime: Darknet Markets Live on, Even as Players Change
ISMG Editors: How Russian Cyber War Could Have Ripple Effect
Increasing Adoption of Phishing Kits Puts MFA at Risk
News Corp Targeted in 'Persistent Nation-State Attack'
Court Recommends Dismissal of Practicefirst Breach Lawsuit
US Lawmakers Introduce Algorithmic Accountability Act
Cyberattack Cripples European Oil Port Terminals
US Indicts 6 India Call Centers for Scams Targeting Seniors
$4.4 Million Stolen From Crypto Firm: Multi-Bridge Exploited
Threat Actors Target Indian Army Personnel Via Fake Apps
Ransomware Attack on Swissport Is Contained, Company Says
Meet the 'Four Horsemen of the Data Loss Apocalypse'
Update: Washington Licensing Agency Investigates Suspected Breach
House Passes COMPETES Act With Substantial Tech Funding
Hospital, Health Department Still Recovering From Attacks
Israeli Officials Investigate Police's Alleged Spyware Use
School District CISO Quits Over Handling of Data Breach
Privacy and Security - The Journey From Policy to Controls
SecurityScorecard and LIFARS CEOs Discuss New Merger
Update: Amid IRS' Pullback, ID.me Offers Alternative Solution
Chinese APT Targeting German Enterprises
Security Experts Discuss Log4j Mitigation Before US Senate
Feds Seize $3.6 Billion in Allegedly Stolen Cryptocurrency
Vodafone Portugal: Restoration in Progress Post-Cyberattack
Equifax Agrees to $425 Million Breach Settlement
Patch Tuesday: 51 MS Flaws Fixed - Important, Not Critical
HHS Warns Health Sector About LockBit 2.0 Threats - Again
Report: European Central Bank Warns Against Russian Hacking
Profiles in Leadership: Marene Allison
Sri Lanka to Use India-Developed Digital Identity Framework
CERTs Urge Patching of Google Chrome, Android Flaws
Fake Windows 11 Upgrade Installers Add RedLine Malware
Massive Breach Hits 500 E-Commerce Sites
US SEC Proposes 48-Hour Incident Reporting Requirement
US Lawmakers Continue Push for Stablecoin Regulations
Improving Cybersecurity Defenses for Schools
Cyber Agencies Warn: Ransomware Attacks Are Worse Than Ever
Spanish Police Arrest 8 Over SIM Swapping Fraud
Sound Off: What Does the OMB Zero Trust Strategy Get Right?
ISMG Editors: Has Ransomware Group BlackMatter Rebooted?
How to Translate Business Challenges Into Tech Solutions
Data of 7 Million People Exposed Via US Marketing Platform
Bill Proposes Panel to Study Health Data Privacy Law Gaps
Senators: CIA Surveillance Program Involved Citizens' Data
Data Breach Exposes Booking Details of 19 Million Customers
Russia Shutters 3 Carding Markets, Including Trump's Dumps
Why Ransomware Groups Such as BlackCat Are Turning to Rust
BlackByte Ransomware Hits San Francisco 49ers' IT Systems
Cyberattack Affects Operations at Slovenian TV Channel
The Security Implications of Coinbase's Super Bowl Ad
CISA Warns Orgs to Prep for Potential Russian Cyberattacks
CaptureRx, Inmediata Breaches: Proposed Settlements Reached
BlockFi to Pay SEC, State Regulators $100M in Penalties
Data Leak at Hong Kong's Harbour Plaza Hotel Affects 1.2M
Crypto Exchange KLAYswap Loses $1.9M After BGP Hijack
9 Ransomware Trends: More Leaks, Higher Ransom Payments
Report: Cyberattack Hits Ukrainian Defense Ministry, Banks
How the World's Largest Law Firm Reimagined Data Protection
Reports: GiveSendGo Breach Involves Freedom Convoy Donors
Unpatched Zoho Bug Exploited in Red Cross Attack
Threat Actor Adds New Marlin Backdoor to Its Arsenal
The Emerging Risks of 'Shadow Data'
The Curious Case of the Fake Ukrainian Ransomware Attack
Cloud Data Security - Why Now?
Inside Look at an Ugly Alleged Insider Data Breach Dispute
Agencies Say Russian Hackers Targeting Defense Contractors
CyberEd Board Profiles in Leadership: Elrich Engel
EU Privacy Watchdog Calls for Ban of NSO Group's Spyware
Analyzing the Popularity of Malware-Free Cyberattacks
Aviation Attacks Tied To Single APT - TA2541
Experts Outline Chinese Cyberwarfare Tactics, Motivations
2 Vendor Hacking Incidents Affect Over 600,000 Individuals
Business Email Compromise: Trends and Predictions
Massive Bot Attack Generates 400 Million Requests in 4 Days
ISMG Editors: Ransomware Trends - The Bad and the Ugly
Cisco's Email Security Appliances at Risk of DoS Attacks
Data Breach Trends: Global Count of Known Victims Increases
HHS Warns of Threats to Electronic Health Records
First National Cryptocurrency Enforcement Team Director Named
Intel Fixes High-Severity Vulnerabilities
AML: Staying the Course to Operational Resilience
How Chinese, Russian Threat Actors Changed Tactics in 2021
Cybersecurity Readiness Advised as Russian Threats Loom
Patched Adobe Commerce, Magento Last Week? Patch Again
Lawsuit Filed in Health Center Data Exfiltration Breach
The New Road Map to Cybersecurity Maturity
Cybercrime Moves: Conti Ransomware Absorbs TrickBot Malware
Proof of Concept: Is the New Age of Cyber War Here?
As Russia Invades Ukraine, Cyber Escalation Threat Looms
Sound Off: A Post-Mortem on the Colonial Pipeline Attack
Russia Finalizes Draft of Digital Currency Laws
'Market-Nuking' Coinbase API Bug Halted New Trading Orders
Mac Coinminer Uses New Technique to Hide Its Traffic
EU Activates Cyber Rapid Response Team Amid Ukraine Crisis
Hacks Causing Most Big Health Data Breaches So Far in 2022
Cryptocurrency Wallets Targeted by Alien Malware Variant
Cyber Maturity and the Board: Delivering the Right Message
5 Held in Ukraine Over Phishing Scam With 70,000 Victims
Police Seize $22 Million From Online Safe and USB Sticks
Report: Ukrainian Government Prepared to Wipe Servers
Cyberattack Hits Ukrainian Government, Banking Websites
Why You Need Digital Trust to Enable Zero Trust
Cyber Maturity: New Look at Prioritizing, Quantifying Risk
Cybersecurity: Think Critically and See the Whole System
New Malware in Russia-Linked Sandworm's Portfolio
Update: Asustor - How to Eliminate Deadbolt From NAS Devices
Ransomware Attack: Ireland's Cleanup Costs Hit $48 Million
White House Denies Mulling Cyber Strikes on Russia
Russia-Ukraine War: Threats Facing the Healthcare Sector
Russia-Ukraine Updates: Cybersecurity News Amid Conflict
Wiper Malware Attacks Have Not Escaped Ukrainian Networks
Sound Off: How Can Banks Prepare for Russia-Ukraine Crisis?
MuddyWater Targets Critical Infrastructure in Asia, Europe
ISMG Editors: Government Special
Healthcare Entity Reports Another Big Hacking Incident
Ukraine Reportedly Calls for Volunteer Cyberwarriors
Ukraine Invasion: What If US Strikes Back Against Russia?
SockDetour Backup Backdoor Targets US Defense Contractors
Belarusian Spear-Phishing Campaign Targets Ukraine Military
Chipmaker Nvidia Investigating Potential Cyberattack
Feds Advise 'Shields Up' as Russian Cyberattack Defense
Ukrainian Researcher Leaks Conti Ransomware Gang Data
How to Better Secure IoT Devices and Tech
Update: Toyota to Resume Ops After Cyberattack Scare
Ukraine Assembles IT Army to Perform DDoS on Russia
Update: Cyber Hacktivists Target Belarus for Supporting Russia
Tougher Indian Data Protection Rules Expected This Year
Anonymous Extends Its Russian Cyberwar to State-Run Media
How Lapsus$ Data Leak May Affect Nvidia and Its Customers
China-Linked APT Actors Deploying Stealthy Daxin Malware
US Officials Tracking Russian Cyberattack Escalation Risk
HHS OCR Outlines Top HIPAA Enforcement, Rule-Making Plans
Feds Warn Health Sector of Russia-Ukraine Conflict Threats
Business Email Compromise: Why It Works - and How to Prevent It
Ransomware & Cryptojacking: Predictions for Year Ahead
Personal Data of 120,000 Russian Soldiers Published Online
Insurance Broker Aon Discloses Cyberattack
US Senate Passes Incident Reporting, FISMA Update Bill
Mon Health Reports Breach Soon After Phishing Incident
Russia-Ukraine Cryptocurrency Scams Detected by Researchers
Conti Gang Members Fretted Over Putin's Ukraine Invasion
Security Gaps in Smart Infusion Pumps Risk Patient Data
Phishers Target European Nations Aiding Ukrainians
9 Essentials for Global CISOs During Russia's Ukraine War
How the Senate's Cyber Bill Could Affect Health Sector
US Senators Express Concern Over Russian Use of Crypto
Nvidia Breach Exposes 71,000 Employee Credentials
Russia Lists 17,576 IPs Used in DDoS Attacks
US Officials Push Collaboration, AML Controls for Crypto
Template Aims to Help Add Cyber in Medical Device Contracts
ISMG Editors: Are Hacktivists the New Resistance Fighters?
Update: Samsung Confirms Source Code Stolen in Breach
Dayslong DDoS Attack With Embedded Ransom Note Mitigated
Ukraine Fighting First-Ever 'Hybrid War' - Cyber Official
White House Requests Billions in Tech Aid for Ukraine
Federal Report Offers Healthcare Cyberattack Trend Insights
'Dirty Pipe' Permission Flaw Patched in Linux Kernel
Advanced Threats Require Advanced Defenses
Perfis em Liderança: Claudio Benavente
How a Global Pandemic Changed the Fraud Landscape
Ransomware Groups Target Global Critical Infrastructure
Feds Warn of 7 Flaws Affecting Medical Devices, IoT Gear
Reports: White House Set to Issue Executive Order on Crypto
Google Plans to Buy Mandiant for $5.4 Billion
How Lapsus$ Uses Stolen Source Code to Disguise Malware
President Joe Biden Signs Executive Order on Cryptocurrency
2 Healthcare Hacking Incidents Affect 310,000 Patients
Former US Cyber Official Warns of Russian War Repercussions
Cryptocurrency Executive Order: 'It's a Clarion Call'
Profiles in Leadership: Ts. Saiful Bakhtiar Osman
Proof of Concept: What's the Reality of Passwordless?
Internet Experts Propose Blocking Culpable Russian Sites
ISMG Editors: Cryptocurrency Special
US Nabs Alleged Ransomware Operators - One Tied to Kaseya
Sound Off: What's in OMB's Latest Cybersecurity Guidance?
Cybersecurity Picture Inside Russia Grows More Complicated
What's in the $1.5 Trillion Spending Bill for HHS Agencies?
Building Threat Intelligence Capabilities in Wartime
Profiles in Leadership: Sunder Krishnan
Why Identity and Access Management Is Weak in Healthcare
US Congress Passes Cyber Incident Reporting Mandate
Anonymous Reportedly Hacks Russian Censorship Agency
Iranian APT: New Methods to Target Turkey, Arabian Peninsula
Supply Chain Targeting: Trends and Predictions
Take Remote Access Enablement to the Next Level
Russia's War Further Complicates Cybercrime Ransom Payments
Ubisoft Reports 'Cyber Security Incident'
CHS Pays False Claims Act Settlement Involving EMR Security
Why a Zero Trust Approach in Healthcare Is Becoming Critical
Toyota Parts Supplier Denso Confirms Ransomware Attack
LockBit Ransomware Gang Reportedly to Leak Bridgestone Data
Top Cyber Officials Say Russians May Yet Escalate Cyberwar
DDoS Attack Downs Several Israeli Government Websites
Class Action Filed in Logan Health Breach Affecting 214,000
Threat of Russia-Ukraine 'Spillover' Attacks on Healthcare
Anonymous Reportedly Hacked Russian Energy Firm Rosneft
Senators Request Briefing on Infrastructure Cybersecurity
Sanctions Halt Rewards for Bug Hunters in Belarus, Russia
Upcoming Executive Order on ID Theft: Key Points to Consider
Russian Actors Exploit Known MFA Bug to Attack Organization
Impose Fine, Get Sued: A Day at the Irish DPC
Tennessee Pediatric Hospital Responding to Cyber Incident
Ukrainian Cyber Official Offers Update on 'IT Army'
Critical Steps: Applying Threat Modeling to Medical Devices
Cloud Workload Security: It's About Technology and Talent
UK Regulator Raises Concerns Over NortonLifeLock-Avast Deal
2 Critical Bugs, 1 High-Severity Bug Affect Veeam Products
How the Data Security-Privacy Nexus Affects Enterprises
COVID-19: Battling Changing Healthcare Cyberthreats
CafePress Data Breach: Owner Agrees to Feds' Settlement
Banking Committee Chair: Crypto Can 'Endanger Security'
Cyber Insurance: How to Be a More Attractive Client
2022 Proofpoint State of the Phish
Zero Trust Network Access: Key to Securing Hybrid Workforce
Inside SentinelOne's Bid for Defense Firm Attivo Networks
Russia May Have Caused Widespread Satellite Network Outage
ISMG Editors: Russia's War Changes Ransomware Landscape
Bank on Seeing More Targeted Attacks on Financial Services
HHS: Health Sector Should Prepare for Russia-Ukraine Threats
Russia Says It's Seen 'Unprecedented' Level of Cyberattacks
Google Exposes Initial Access Broker Ties to Ransomware
Securing Industry 4.0: Insights From New Research
How Has COVID-19 Changed CISO Approach to Data Security?
Ransomware Alert: AvosLocker Hits Critical Infrastructure
Sound Off: What Gaps Must ID Theft Executive Order Address?
NRA Finally Confirms Ransomware Attack From 2021
HubSpot Allegedly Hacked to Target Cryptocurrency Firms
What Is Log4j's Hidden Toll on Cybersecurity Readiness?
'Official Dentist' of NBA Team Says Hack Affected 1 Million
Illicit Crypto Activity Detected By US Treasury Department
Okta, Microsoft Confirm Breaches Connected to Lapsus$ Hack
RansomEXX Disrupts Scottish Association for Mental Health
European Union Officials Call for Stricter Cyber Rules
Ransomware Attack Disrupts Greek Postal Services
2 Latest Health Data Hacks Affect Over 200,000 Individuals
Reports: Russian IPs Scanning US Energy Firms, Others
Okta Says It 'Should Have Moved More Swiftly' Over Breach
Ukrainian IT Official: Russian Cyberattacks Have Continued
HHS OCR Tally Analysis: Breaches, Affected Individuals Surge
US Indicts Russian Behind Popular Carding Marketplace
UK Police Arrest 7 Allegedly Tied to Lapsus$ Hacking Group
Feds Charge 4 Russians With Long-Term Energy Sector Attacks
Preempting the Attacker's Next Move
Increased Enterprise Use of iOS, Mac Means More Malware
ISMG Editors: Russia-Ukraine War Cyber Escalation Fallout?
US, EU Agree to a New Data-Sharing Framework
20-Year-Olds Charged in NFT 'Rug Pull' Scam Case
Malicious Crypto Apps Target Mobile Users, Mainly in China
Google Observes North Korean Attackers Exploiting Chrome
Estonian Ransomware Operator Gets 66-Month Sentence
FCC Adds Kaspersky, Chinese Telecoms to High-Risk Companies
Bill Touts CISA, HHS Teamwork to Aid Health Sector Security
President's Proposed Budget Prioritizes Cybersecurity
Okta Breach Timeline, Attack Method Analyzed
Leading Teams to Understand Creative and Critical Thinking
Using Russian Security Software? UK Says Risks Have Changed
Multinational Police Force Arrests 108 Suspected Scammers
Ukraine Experiences Internet Outage - and Russia May, Too
HHS OCR Issues 4 HIPAA Enforcement Actions
Update: Crypto Hackers Exploit Ronin Network for $615 Million
Cybercrime-as-a-Service: The High Cost of Digital Transformation on Fraud
Update: Globant Says System Accessed by Unauthorized Actor
A Look Inside Biden's Spending Proposals for HHS Agencies
Viasat Traces Outage to Exploit of VPN Misconfiguration
Sophos Patches Critical RCE Bug Exploited in the Wild
Partnership HealthPlan of California IT Systems Still Down
Understanding Human Behavior to Tackle ATO & Fraud
Hackers Target Russian Federal Air Transport Agency
Survey: State of Security Automation in Financial Services
State-Sponsored Actors Using Russia-Ukraine War for Phishing
SpringShell, Spring Cloud Function Bugs Need Urgent Patching
Breach Reports Show Diversity of Healthcare Cyber Targets
Viasat Confirms 'AcidRain' Malware Could Have Wiped Modems
ISMG Editors: Lessons to Learn From Okta's Breach Response
Profiles in Leadership: CIO Davanathan 'Devan' Naidoo
Profiles in Leadership: Karin Höne
PCI SSC Releases Data Security Standard Version 4.0
Lazarus Using Trojanized DeFi App to Deliver Malware
Cyberespionage Actor Deploying Malware Using Excel
Report: Health Insurance Exchange Suffered Dozens of Breaches
Exploring Kinetic Cyberwars, New TTPs Among Threat Actors
Hackers Target Wind Turbine Manufacturer Nordex
Lapsus$ Teens Out on Bail, Due Back in Court April 29
Targeted Mailchimp Breach Affects Trezor Crypto Customers
Germany Shutters Russian Darknet Marketplace Hydra
Bill Requires Medical Device Makers to Enhance Cybersecurity
New Mirai-Based Campaign Targets Unpatched TOTOLINK Routers
OT-IT Integration Raises Risk for Water Providers, Experts Say
Behind the Scenes of One of the Largest US Forfeiture Actions
Chinese APT Targets Global Firms in Monthslong Attack
How Identity Fraud Affects Financial Institutions
US Sanctions Darknet Market Hydra, Crypto Exchange Garantex
Tufin to Be Bought by PE Firm Turn/River Capital for $570M
$960K NFT Scam Affects Nearly 1,200 Victims
Identity Vendor BeyondTrust Promotes Janine Seebeck to CEO
DOJ Disrupts Russia-Linked APT's Malware, 'Cyclops Blink'
Proof of Concept: Dealing With the Regulation 'Tsunami'
Cash App Warns 8.2 Million Customers of Insider Breach
FDA Document Details Cyber Expectations for Device Makers
CrowdStrike, Microsoft, Trend Micro Top EDR Forrester Wave
Hamas-Linked APT Group Targets Israeli Officials
No Log4j, But Spring4Shell Exploitation Attempts Increase
Microsoft Seizes Russian Domains Targeting Ukraine
ISMG Editors: Building Cybersecurity Defenses in Wartime
Big Hacks: 5 Health Data Breaches Affect 1.2 Million
Top 10 Security Threats
SEC Breach Disclosure Rule Makes CISOs Assess Damage Sooner
How to Maximize Application Intelligence
A Proactive Approach to Cybersecurity
YouTube Scammers Made $1.6 Million in Fake Crypto Giveaway
Road Map to Cybersecurity Sophistication
Identity Firm SailPoint to Be Bought by Thoma Bravo: $6.9B
Patch Tuesday to End; Microsoft Announces Windows Autopatch
Update: What's BlackCat Ransomware Been Up to Recently?
HHS HC3: Beware of Lapsus$, Email Marketing-Related Threats
US Bank Regulator Weighs Stablecoin Risks and Benefits
Panasonic Breached Again; Conti Takes Responsibility
Russia-Linked Sandworm Attacks Ukrainian Energy Facility
Joint Law Enforcement Operation Dismantles RaidForums
Illinois Clinic Says Nearly 503,000 Affected in Email Breach
KKR Buys Barracuda from Thoma Bravo to Fuel XDR, SASE Growth
Ex-DHS Official Convicted in Software, Data Theft Scheme
Dutch Government Agencies Fined; 'Serious' GDPR Violations
Trends in ISACA's Global State of Cybersecurity 2022 Report
Strategies to Modernize Ransomware Response
Patch Tues: Microsoft Releases Fixes for 145 Vulnerabilities
Report: Zero-Day Flaws Pose Attack Risks to Hospital Robots
New Cobalt CEO Chris Manton-Jones Pursues Enterprise Clients
African Bank Malware Campaign Shows Actor's Persistence
APTs Using New Tools to Target ICS/SCADA
Microsoft Disrupts ZLoader Botnet in Global Operation
Lawsuit Filed Against SuperCare in Breach Affecting 318,000
Obsidian Security Raises $90M to Safeguard More SaaS Apps
Feds Disrupt Cyberattack Aimed at Pacific Communications
Premium Hikes Spur Improved US Cyber Insurance Loss Ratios
Identity Experts Call for Mobile Driver's License Push in US
The State of Email Security
Feds Offer $5 Million to Help Disrupt North Korean Hackers
Conti Claims Responsibility for Nordex Breach
Observability Vendor Gigamon Promotes Shane Buckley to CEO
Profiles in Leadership: Octavia Howell
UK Government Reportedly Infected With NSO Group Spyware
Okta: Hackers Accessed Just 2 Customer Tenants in Breach
Stablecoin Protocol Beanstalk Loses Millions in Attack
Fake Windows Upgrade Site Delivering Info-Stealer Malware
HHS HC3 Warns Healthcare Sector of Hive Threats
Crypto Firm Currency.com Mitigates DDoS Attack
Modern Bank Heists 5.0: 'The Escalation'
Lenovo Fixes 3 Bugs That Target Employees Working From Home
Pair of 2021 Health Data Hacks Affect 670,000 Individuals
AWS Log4Shell Patch Has 'Severe Security Issues': Unit 42
Tracking Ransomware: Understanding Your Exposure and Taking Action
Killer Robots in the Air: Slouching Toward Full Autonomy
A Path to Smarter Security Operations: Strategies for Success with SOAR
Become Cyber Resilient by Modernizing your SOC
Enhance your Security Detections with Machine Learning
The Current OT/ICS Threat Landscape - Dragos' Annual Report
Who's Behind Attempt to Reboot REvil Ransomware Operation?
Leaks Fail to Dent Conti's Successful Ransomware Operation
Conti Ransomware Targets Costa Rican Government Entities
Five Eyes Warns of Russian Hacks on Critical Infrastructure
ISMG Editors: The Complications of Regulating Spyware
LemonDuck Malware Evolves Into Major Cryptomining Botnet
Unpatched RainLoop Webmail Enables Theft of Emails
Pro-Russian Killnet Group in DDoS Attacks on Czech Entities
$5 Million Settlement Calls for Vendor to Improve Security
Sophos Buys Startup SOC.OS to Spot Attacker Activity Sooner
T-Mobile Breached Again; Lapsus$ Behind the Attack
Atlassian Patches Critical Jira Authentication Bypass Bug
FBI Alert: Have You Been Bitten by BlackCat Ransomware?
Synopsys, Checkmarx Top Gartner MQ for App Security Testing
Profiles in Leadership: Charles Sello Kungwane
SonarSource Raises $412M on $4.7B Valuation to Grow in Asia
Panel Discussion: Mapping the Zero Trust Journey
Shifting Left for DevSecOps Success
Ransom Payments: Monero Promises Privacy; Bitcoin Dominates
Emotet Returns With New Tricks Up Its Sleeve
Mandiant: Attackers' Median Dwell Time Drops to 3 Weeks
Mitigating Insider Security Threats in Healthcare
Tenable to Buy Bit Discovery to Find More Vulnerable Assets
Why Are Fraud Executives Most Concerned About Synthetic ID Fraud?
Coca-Cola Investigating Data Breach Claim
Profiles in Leadership: Bruce Phillips
Feds Offer $10 Million Reward for Russia's Sandworm Hackers
American Dental Association Hit by Disruptive Cyber Incident
Check Point Pursues More Business Outside Network Security
Understanding and Improving the SOC Analyst Experience
HICP Transforms Healthcare Cybersecurity Risk Management
Synopsys to Buy WhiteHat Security for $330M to Protect Apps
Cybercrime: Ransomware Attacks Surging Once Again
The Top 15 Most Routinely Exploited Vulnerabilities of 2021
China Spies on Russians; Microsoft Details Ukraine Attacks
More Major Hacking Incidents Added to HHS Breach Tally
DeFi Platform Deus Suffers Second Exploit in 2 Months
PE Firms 'on Prowl' for Take-Private Cybersecurity Deals
Battling Ransomware in Healthcare
MITRE ATT&CK Evals Explained
Hunter Attack Simulation
Minimizing Damage From Ransomware Attacks Requires Planning
ISMG Editors: Bitcoin or Monero - What Do Criminals Prefer?
India to Set 6-Hour Breach Reporting Requirement
Latest Attacks Target Entities Handling Sensitive Data
New US Breach Reporting Rules for Banks Take Effect May 1
Ukraine and Romania Suffer Large-Scale DDoS Attacks
Case Study: Where to Begin Your Zero Trust Journey
Update: KCC Resumes Operations Post-Ransomware Attack
OIG: HHS' Info Security Program Still Rated 'Not Effective'
Phisher Jailed After Tricking Pentagon Out of $24 Million
A $10 Million 'Bounty' for an $80 Million DeFi Attack
How Russia-Ukraine Is Intensifying Healthcare Cyber Worries
Is the Breach You Expect the Breach You're Going to Get?
Spain Says Top Government Officials Hit by Pegasus Spyware
NortonLifeLock Told to Pay Columbia $185M for Patent Theft
Mosyle Raises $196M to Strengthen Apple Security Platform
Ransomware Landscape: Interactions with a Threat Actor
Tailscale Raises $100M to Give Devices Zero Trust Protection
Ukrainian City's Internet Rerouted Through Russian Telcos
Ukraine Combating Cyberattacks on CNI With Security Keys
SEC Doubles Cyber Unit Staff to Protect Crypto Users
Fortinet CEO Ken Xie: OT Business Will Be Bigger Than SD-WAN
How Splunk uses Splunk Observability to Monitor Cloud Apps
How to Get Started with OpenTelemetry: Observability Best Practices
Become Cyber Resilient by Modernizing your SOC
A Path to Smarter Security Operations: Strategies for Success with SOAR
Tackling 2022's Emerging Social Engineering & Fraud Scams Plaguing Financial Services
Connecticut Becomes 5th US State to Get Data Privacy Law
Report: Unsecured AWS Bucket Leaked Cancer Website User Data
Chinese APT Group Winnti Is Stealing Intellectual Property
Stock Sell-Off: Cloudflare, Rapid7, SentinelOne Hardest-Hit
US Passes Law Requiring Better Cybercrime Data Collection
NIST Updates Guidance for Supply Chain Risk Management
ISMG Editors: Zero Trust Special
EU Grants Europol Supervised Data Processing Powers
Illuminate Education Mega-Breach Affects K-12 Students
Pro-Ukraine Groups Exploit Containers to Launch DoS Attacks
Profiles in Leadership: Milind Mungale
The Evolving Ransomware Trends in the Healthcare Sector
Microsoft Unveils Services to Simplify Threat Hunting, XDR
First US Sanction of a Virtual Currency Mixer: Blender.io
Apple, Google, Microsoft Unite to Make Passwordless Easier
Feds Post $10 Million Reward for Conti Ransomware Actors
CERT-In's 6-Hour Mandate: How Practical Is It?
Mass Distribution of Self-Destructing Malware in Ukraine
Exploits Created for Critical Flaw in F5 Networks' BIG-IP
Beg, Borrow, Steal: Conti Leaks Reveal Ransomware Crossover
Abnormal Security Raises $210M to Push Beyond Email Defense
The 2022 State of API Security
UK Intelligence Chief Details Cybercrime Disruption Efforts
Colonial Pipeline May Have to Pay Fine of Nearly $1 Million
College Shuts Down Due to Cost of Ransomware Attack
Congress Mulls Another Medical Device Cybersecurity Bill
New LookingGlass CEO Bryan Ware to Diversify Customer Base
Okta's Data Breach Debacle After Lapsus$ Attack: Postmortem
Hybrid War: 'It's Going to Get a Lot Worse'
Russia-Ukraine War: 7 Cybersecurity Lessons Learned
Viasat Cyberattack Attributed to Russia by EU, UK and US
Microsoft Patch Tuesday: PetitPotam Cornered Again
Vendor's Ransomware Attack Is Latest Supply Chain Warning
UK Proposes Regulations to Curb Illicit Use of Crypto
Key Steps of a Ransomware Incident Response Plan
Material Security Raises $100M to Protect Sensitive Content
Five Eyes Alliance Warns MSPs About Targeted Cyberattacks
Cloud-Based EHR Vendor Hack Affects Eye Care Practices
Proof of Concept: Crypto - A New National Security Threat
CyberArk Debuts $30M Venture Fund to Back Talented Startups
ISMG Editors: What Have We Learned From the Conti Leaks?
Post-Exploitation Framework Targets Microsoft Servers
A $150 Million Plan to Secure Open-Source Software
COVID Delays Patching of Vulnerable Konica Minolta Printers
Application Security: Maturing Your Program
Late-Stage Startups Feel the Squeeze on Funding, Valuations
Proof of Concept: Apple/Microsoft/Google Back Passwordless
EU Parliament, Council Agree on Cybersecurity Risk Framework
Closing the Gaps in Ransomware Prevention Strategies
The Connection: Risk, Identity Management and Zero Trust
Italian Police Repel Online Attempt to Disrupt Eurovision
AvosLocker Claims Data Theft From Another Healthcare Entity
Google Unveils Service to Secure Open-Source Dependencies
Feds Say 'Multi-Tasking Doctor' Built Thanos Ransomware
ZTNA: First Step Towards SASE
3 Key Pillars to Securing Your Microsoft 365 Journey
Conti Claims It Has 'Insiders' in Costa Rican Government
CISA Removes Windows Flaw From Exploited Catalog List
Profiles in Leadership: Richard Rushing
CISA: Majority of US Government Will Get EDR Later in 2022
Cryptocurrency-Stealing 'Cryware' Malware Attacks Surge
Five Eyes Alliance Advises on Top 10 Initial Attack Vectors
The State and Future of CIAM
North Korean IT Workers Using US Salaries to Fund Nukes
Victim List in EHR Vendor Hack Grows as New Details Emerge
MDR: 'Resolve All Alerts'
CISA Advises Federal Agencies to Patch VMware Flaws
Ransomware Attack Vectors: RDP and Phishing Still Dominate
2 Health Plans Report Major Breaches Following Attacks
Palo Alto CEO: Vendor Consolidation Is Fueling Our Growth
What Is Behind the Increase in Crypto Fraud?
Ransomware: What's Changed Since Colonial Pipeline Got Hit?
ISMG Editors: The Case of the 'Dr. Evil' of Ransomware
Pathlock-Appsian Deal Combines App Governance, ERP Security
Canada Bans Huawei, ZTE to Secure Telecom Systems
DOJ Revises Policy for Good-Faith Security Researchers
Feds Warn Health Sector of Top Russia-Backed APT Groups
Massive Surge in Use of Linux XorDdos Malware Reported
Tackling the Identity Verification Challenge
Proof of Concept: How Can We Improve Industry Collaboration?
Cyberattack Affects Greenland's Healthcare Services
US Sets Up Multiagency Initiatives to Curb Ransomware
Hospital Cyberattack Compromises Data From Decades Ago
UK Privacy Watchdog Imposes 7.5M-Pound Fine on Clearview AI
Zuckerberg Sued Over Cambridge Analytica Scandal
Semperis Raises $200M to Extend AI, ML to Identity Security
3 Health Data Hacks Affect 1.4 Million Individuals
WhiteSource, Renamed Mend, Takes on Remediating Code Issues
Attempted Ransomware Attack Grounds SpiceJet Flights
13% Spike in Ransomware Is Biggest in 5 Years
Cribl Raises $150M to Incubate New Observability Features
2022 Enterprise Search Trend: Machine Learning-Powered Relevance
Introduction to Elastic Enterprise Search: Search Everything, Everywhere
Getting Started with Search
Introduction to Elastic Cloud: Fast, Simple, Secure Cloud for Your Mission-Critical Apps
Optimizing Costs in Elastic Cloud
Lacework Announces Layoffs 6 Months After Raising $1.3B
Broadcom Beefs Up Security Business With $61B VMware Buy
Twitter Fined $150M for Misusing Private Data to Sell Ads
Black Basta Claims Responsibility for AGCO Attack
Feds Allege Former IT Consultant Hacked Healthcare Company
IoT Security Regulation and How it Drives Innovation
Enforced Regulations Will Demand a Security Warranty on IoT Devices
Know Your Devices: Why Penetration Testing is an Essential Security Process
Applying Security to Verify Deployed Products are Authentic
Security in Remote Patient Monitoring Devices
Smart Home Security and the User Experience
Suspected Business Email Compromise Ringleader Busted
Threat Actors Exploiting Free Browser Automation Framework
Ransomware Costs City of Quincy, Illinois, $650,000
ISMG Editors: London Summit Highlights
FBI: Russian Forums Sell Higher Education Credentials
Observability trends in 2022: A look into the future
Unlock your SOC: Stop threats with Limitless XDR
Top security trends in 2022 you need to know and how to get ahead of them
Introduction to Elastic Security: Modernizing security operations
Microsoft Office: Attackers Injecting Code Via Zero-Day Bug
CISA Adds 75 Flaws to Known Vulnerability Catalog in 3 Days
Ransomware Gang Demands $5M From Austrian State Carinthia
Breach at Turkey's Pegasus Airlines Exposes 6.5TB of Data
Ukraine Observed Nearly 14M Cyber Incidents in Q1 2022
Microsoft CIEM, Decentralized Identity Tools Secure Access
Held to Ransom: 1,200 Unsecured Elasticsearch Databases
Russian Forces Disable South Ukraine Communications - Again
What Defenders Can Learn From History - and Martial Arts
Making Metrics More Meaningful for the Board
Scammers Send Fake Ukraine Aid Requests to Phish Victims
Carinthia, Austria Approves Ransomware Recovery Plans
Costa Rican Health Agency Hit by Apparent Hive Attack
ReliaQuest Buys Threat Intel Firm Digital Shadows for $160M
Cybereason Lays Off 10% of Staff Months After Raising $325M
2022 Verizon Breach Report: Alarming Rise in Ransomware
FBI: Hospital Averted 'Despicable' Iranian Cyberattack
US Confirms It Has Provided Cybersecurity Support to Ukraine
Lookout Buys SaferPass to Help Carriers Manage Passwords
Okta CEO: Hack Didn't Have Quantifiable Impact on Business
ISMG Editors: What's Hot at RSA Conference This Year?
FluBot Malware Strain Taken Down in Multi-Agency Effort
Unpatched Atlassian Confluence 0-Day Exploited in the Wild
US Government Warns Against Paying Ransom to Karakurt Group
Feds Issue Alerts for Several Medical Device Security Flaws
Devo Raises $100M on $2B Valuation to Pursue Additional M&A
Atlassian Issues Patch for Critical Confluence Zero-Day
Government Agencies Seize Domains Used to Sell Credentials
Forescout to Buy Threat Detection and Response Vendor Cysiv
Russian Ministry of Construction Website Hacked
Attackers Use Clipminer Cryptominer to Rake in $1.7M
Hackers Claim Drug Data Theft as Reports Warn Health Sector
Cyber Threat Alliance at 5: Information Sharing Expands
Cybersecurity: Why It's Not Just an 'IT Problem'
Art Coviello on Market Trends, Emerging Tech
Difficulties in Sharing Risks with the Board
Demystifying Managed Detection and Response Services
Zero Trust: 'What Are You Trying to Protect?'
Cyberwarfare Strategy and How It Applies to Businesses
An 'Epochal Change' in Cybersecurity
Why Adversaries Like Going After APIs - and How to Stop Them
COVID-19: The Latest Good and Bad News
Defending Against Major Nation-State Cyberattacks
Why OT Cybersecurity Is Daunting and How to Address It
Assessing Crypto and Third-Party Risks
The Path to a More Inclusive, Diverse Cyber Workforce
Profiles in Leadership: Caleb Sima
Insights on Financial Supply Chain Compromise
Airbus Sets Up Cybersecurity-Focused Organization
Palermo Municipality Cyberattack Still Affecting Citizens
Hack of Medical Imaging Provider Affects Data of 2 Million
Russian Cyberattack Hits Wales-Ukraine Football Broadcast
Zero Trust Strategy or Swiss Cheese Model?
The Ever-Increasing Pressure to Develop Secure Code
Nikesh Arora on the Palo Alto Networks Growth Strategy
Profiles in Leadership: Rich Lindberg
Why CISO Is the Most Challenging Role in Cybersecurity
Profiles in Leadership: Chris Holden
What Cybersecurity Leaders Wish They Knew Before a Breach
Profiles in Leadership: Jeff Farinich
Overcoming Digital Challenges of OT Security
How to Mitigate and Manage Supply Chain Risks
Attracting and Training OT Professionals
Addressing the Talent Shortage
Maximizing Opportunities to Stop Ransomware Attacks
Alberto Yepez of Forgepoint Capital Shares 2022 Market View
Cybersecurity Education: The Imperative to Rethink Delivery
Next-Gen SecOps Demands Advanced Detection and Response
Why Improved Recovery From Cyber Incidents Is Critical
The Top 5 Security Practices With the Best Outcomes
Profiles in Leadership: Sean Mack
Assessing Threats Outside the Perimeter
Darknet Market Selling Social Security Numbers Is Shut Down
CISA Says Chinese Cyberattackers Are Targeting US Telcos
Security and User Experience: Critical Considerations
Expanding Beyond Cybersecurity to Take on Digital Trust
The Speed of Vulnerability Remediation
The Switzerland of Security: Why Being Independent Matters
Ransomware, Devices and the Impact in Healthcare
How to Proactively Build Privacy Into Products
Enterprise-Grade Cybersecurity for Midmarket Businesses
How MDR Helps to Simplify Complex IT Environments
Watch Out for Cyber Insurance Caveats
Boosting Security Resilience and Defending the IT Ecosystem
Russia, Ukraine and the Future Cybercrime Landscape
Profiles in Leadership: Rob Hornbuckle
How Zero Trust Keeps Users, Applications and Data Protected
How Cloud Security Has Changed in the Age of COVID-19
Extending Encryption and Key Management Into the Cloud
The Biggest Security Threat to Company Data: Your Employees
The Growing Need for Digital Executive Protection
Legal and Litigation Trends in 2022
The Power of a 'True' Third-Party Risk Exchange
How Can We Simplify Cyber Defense?
Challenges of Building a Global Security Program
Essential Steps for Building a Risk Management Program
Cuba Ransomware Is Back - With New Infection Techniques
Getting Ready for Software Bills of Material
Attack Paths: Just 4 Steps Can Compromise 94% of Assets
The Critical Role of Private-Public Cyber Collaboration
Profiles in Leadership: Ankit Patel
Visibility Into Distributed Cloud Environments
The Importance of Automated Cyberthreat Response
Accelerating Cyberthreat Response Times
What Should Security Leaders Be Preparing for Now?
Looking Beyond Silicon Valley for Cybersecurity Talent
How Can We Fill the Cybersecurity Education Gap?
Are We on the Verge of Getting to Passwordless?
Despite Fervor for the Cloud, Here's Why Hybrid Is Forever
Envisioning a New Model for Information Sharing
OnDemand | Add an Early Warning System to Your Security Environment
Revealed: The State of Automotive Software Development In 2022
Using Cyberthreat Intelligence to Keep Ahead of Adversaries
The Security Testing Imperative
4 Emerging Attack Techniques Cyber Adversaries Are Using
How CISOs Are Dealing With a Growing Digital Attack Surface
The Most Concerning Developments in P2P Payments Fraud
The Cybersecurity Dilemma for SMEs
Security in the Cloud Requires a New Mindset
How the Healthcare Sector Is Battling Top Threats
The Makings of a Million-Dollar Facebook Phishing Campaign
Hard-to-Detect 'Parasite' Targets Linux Operating Systems
No Patch Yet For Follina And DogWalk Windows 0-Days
Why User Awareness Training Misses the Mark
Partnering to Secure Industrial Infrastructure
Where Collaboration Works - and Where It Doesn't
OneTrust Lays Off 950 Due To 'Capital Markets Sentiment'
Rapid Cybersecurity Changes Demand Agile Education
How to Keep Business Flowing During a Ransomware Attack
RSA CEO Rohit Ghai: 'Disruptions Catalyze Transformation'
Nigerian Police Bust Gang Planning Cyberattacks on 10 Banks
Cybercrime Deep Dive: Hydra Marketplace Takeaways
Chinese-Linked APT Spying on Organizations for 10 Years
Russia Warns of Military Action If US Attacks Infrastructure
Malaysian Hacktivists Target Indian Websites as Payback
Feds Signal New Guidance on 'Recognized Security Practices'
Increasing Your Security Posture in a Hybrid Multi-Cloud World
'When, Not If': Crafting Cyber Resilience Plans That Work
How to Ditch the Silo and Safeguard Medical Devices
How to Defend Critical Infrastructure Against New Threats
How Companies Can Defend a Rapidly Expanding SaaS Footprint
Medical Center Ransomware Attack Affects 700,000
BlackCat Attacks University of Pisa, Demands $4.5M Ransom
Chinese APT Actor Gallium Adds PingPull RAT to Its Arsenal
Social Media and the Threat to Cybersecurity
Why Blockchain Is a Double-Edged Sword for Criminals
Ransomware Response Essential: Fixing Initial Access Vector
Tracking the Convergence of IT and OT in the Energy Sector
Cybercrime Chatter: US Critical Infrastructure Off-Limits?
Cybersecurity Retention: Don't Forget the Fun Factor
How to Distinguish True Zero Trust From Imposters
Harnessing the Power of Open Source to Protect Networks
Move From a Reactive to a Proactive State With Intelligence
Responding to Federal Directives on Critical Infrastructure
Latest Email Breaches Compromised PHI of Nearly 300,000
BlackCat Extortion Technique: Public Access to Breached Data
Late Fix for Follina on Microsoft Patch Tuesday
Why Implementing Security Technology Is Such a Challenge
The Importance of Business-Critical Application Security
Cybersecurity Ethics: Artificial Intelligence Imperatives
What's Needed for Firms to Bring SASE and Zero Trust to Life
Russia's Cyber Offensive Against Ukraine Continues Nonstop
Conti Ransomware Group Explores Post-Encryption Future
Total Business Email Compromise Losses Trump Ransomware
Cyber Risk Quantification: The Quest for Transparency
Ransomware Defenses: Cyber Insurer Details Best Practices
Battling Ransomware: 'We're Targeting the Entire Ecosystem'
Threat Watch: Russia-Ukraine War Remains Top CISO Risk
Calling Cyber-Experienced Attorneys: Uncle Sam Needs You
Critical Infrastructure: How to Counter Rising Threats
Profiles in Leadership: John McClure
Hydra Darknet Market: Threat Intelligence Lessons Learned
Russia's Lie: It's Hardly Hitting Ukraine With Cyberattacks
Why Supply Chain Attackers Love Managed Service Providers
Unexpected Pairings: Wine Tasting and Threat Intelligence
Cloudflare Mitigates Record HTTPS DDoS Attack
Safeguarding the Enterprise Across Multiple Public Clouds
Ransomware Groups Pursue Fresh Monetization Strategies
Rising Fraud in the Digital Age: Detect, Prevent and Respond
2 Vendors at Center of Breaches Affecting 3 Million
Hackers Clone Crypto Wallets to Steal Users' Funds
Why the Physical Russia-Ukraine War Might Become a Cyberwar
ISMG Editors: Are We Closing in on a Federal Privacy Law?
Why Zero-Day Attacks on Open-Source Libraries Are Surging
How Modern Tech Is Changing Vulnerabilities and Responses
How XDR Is Fulfilling the Promise That SIEM Never Did
US Bipartisan Privacy Proposal Has Cybersecurity Mandates
Healthcare Cybersecurity: Some Progress, Still Problems
The Evolution of Phishing From Email to SMS and Voice Hacks
The Push on Capitol Hill for Passwordless Authentication
Proposed SEC Rules Will Force Boards to Double Down on Cyber
Does Zero Trust Feel Too Overwhelming? Here's How to Start
New Android Trojan Targets Financial Institutions, Customers
US Government and Allies Disrupt Massive Russian Botnet
Canada Introduces Infrastructure and Data Privacy Bills
Canada's Desjardins Settles Data Breach Lawsuit for $155M
The Future of Authentication Is Biometrics and Passwordless
Cyberattack Blamed for Setting Off Rocket Sirens in Israel
Why Diversity Is the Defender's Greatest Weapon
Securing Digital Payments in the Future
The Criticality of Reporting Cybercrimes
Bill Would Ban Brokers From Selling Health, Location Data
Cloudflare One Brings Email Security, DLP, CASB Together
Draws & Drawbacks: Revisiting the Common Password Manager
Siemens Patches Vulnerabilities in Network Management System
IoT Security Regulation and How it Drives Innovation
Enforced Regulations Will Demand a Security Warranty on IoT Devices
From Disconnected Sites to Disparate Technologies
Know Your Devices: Why Penetration Testing is an Essential Security Process
Applying Security to Verify Deployed Products are Authentic
Security in Remote Patient Monitoring Devices
Smart Home Security and the User Experience
India-Based Grab Denies Cyberattack Claim by Malaysia's DragonForce
Zscaler Posture Control Correlates, Prioritizes Cloud Risks
Lawsuit: Facebook Is Collecting Patient Data of 'Millions'
Paying Ransomware Actors: 'It's a Business Decision'
Industrial Cybersecurity Alert: 56 Insecure-by-Design Flaws
Proof of Concept: The Corporate Risk of Using Social Media
Techniques to Improve Supply Chain Confidence
Cloudflare Outage Whacks 19 Data Centers for Global Traffic
The State of Phishing and Email Security
Flagstar Bank Breach Affects 1.5 Million Customers
Alphabet Soup: Making Sense of EDR, MEDR, MDR, XDR
Police Dismantle Dutch Phishing Gang
Bill Calls for Frequent FDA Device Cyber Guidance Updates
How to Mitigate Emerging Security Threats Against the Cloud
How Security Risks Might Halt the Use of AI in Applications
How Ransomware Has Changed the Nature of Risk
Preparing for Retaliatory Attacks From Russia
Federal Authorities Warn of Cardio Product Security Flaws
Ping Identity Debuts $50M Venture Fund to Back IAM Startups
Russian Cyberattacks on Ukraine Underscored By Microsoft
ISMG Editors: When an Insider Threat Costs Millions
After Conti Ransomware Brand Retires, Spinoffs Carry On
Aura Lays Off 70 Staff After Raising $350M Over Past Year
Attackers Use Log4Shell to Hack Unpatched VMware Products
Lawsuits in Wake of MCG Health Data Breach Start Piling Up
Ransomware Gang Uses Log4Shell
Lithuanian Government Issues DDoS Attack Alerts
How to Implement PAM Across Multiple Companies
Horizon Offers $1M Bounty to Hackers Who Stole $100M
Security Trends of 2022: Research Report Analysis Interview
Latest Blow Falls on the 'Scourge of Passwords'
The Future of Corporate Network Security on the Internet
IronNet Lays Off 17% of Staff 10 Months After Going Public
Bridging the Divide Between Digitization and Cybersecurity
Strategies for Reskilling and Filling Cybersecurity Jobs
Mitigating the Impact of Ransomware With Data Science
Iranian Steelmaker Halts Production Following Cyberattack
Malware Breach Affects 1.2 Million Medical Center Patients
Ransomware-as-a-Service Gang LockBit Has Bug Bounty Program
XM Cyber Buys Cyber Observer to Better Spot Cyber Exposures
GAO: HHS Needs Breach Reporting Feedback Mechanism
Italian Watchdog Says Google Analytics a Privacy Violation
Bank of the West Customers Hit by ATM Skimmer Attack
How UK Cyber Security Council Is Addressing Cyber Skills Gap
FBI: Deepfake Fraudsters Applying for Remote Employment
CyGlass Separates From Nominet, Pursues XDR Partnerships
Russian Cyberattack on Ukrainian TV Channels Blocked
The Right Way to Change Your Identity Service Providers
Ukrainian Cops Arrest Phishing Gang That Stole $3.4 Million
Token Snags Ex-OneSpan Revenue Leader John Gunn as New CEO
HHS Tackles Data Privacy Concerns Linked to Abortion Ruling
North Korea Behind $100M Harmony Theft, Say Researchers
OpenSea Customer Emails Exposed in Third-Party Breach
Constant Vigilance Demanded - Cyber 'Not Just Another Risk'
Malware Disrupts Multiple US State Unemployment Websites
Okta to Spend $1M Helping Nonprofits Improve Their Security
ISMG Editors: Russia's War Has Changed the Cyber Landscape
Indian Stock Exchanges Have 6 Hours to Report Cyber Incident
Your Guide to Accelerate Secure Cloud Adoption
US DOJ Targets Baller Ape Rug Pull and Other Crypto Fraud
Evilnum Hacking Group Updates TTPs Targeting Fintech
British Army's Twitter and YouTube Accounts Hijacked
Russian Hackers Target Private Ukrainian Energy Firm
Unknown Hacker Steals Data of 1 Billion Chinese Citizens
US, Israel Initiate Cybersecurity Collaboration Program
The Human Factor 2022
Profiles in Leadership: Deborah Haworth
Django Software Foundation Patches High-Severity Bug
Vendor's Ransomware Attack Hits Over 600 Healthcare Clients
US Government Picks Quantum-Resistant Encryption Algorithms
RSA Conference 2022 Compendium: 150+ Interviews and More
Swimlane Raises $70M to Grow Security Automation Outside US
Marriott Confirms Data Breach, Says Core Network Unaffected
Feds Warn Healthcare Sector of 'Maui' Ransomware Threats
IBM Buys Startup Databand.ai to Address Data Quality Issues
Pentagon Looking for a Few Good Hackers
Profiles in Leadership: Don Gibson
How the Threat Landscape Is Evolving
Security Awareness and Behavioral Change: What's Realistic?
Going Green: Energy Firms Mustn't Repeat Security Mistakes
FBI and MI5 Chiefs Issue Warning on China IP Theft
Russia's Cyberattack Strategy: Precision, Not Spillover
Apple Lockdown Mode Aims to Prevent State-Sponsored Spyware
SHI Malware Attack Knocks Website, Email Offline for Days
Taking Actions to Enhance Sensitive Health Data Privacy
How McDonald’s Keeps Security Awareness Fresh and Relevant
How to Stop Data from Leaving with Employees
ISMG Editors: What's the Status of the SBOM?
Customer.io Email Data Breach Larger Than Just OpenSea
Ransomware Locks Indian Flood Monitors During Monsoon Season
Coalition Raises $250M on $5B Valuation to Fuel UK Expansion
Biden Order Seeks to Protect Reproductive Data Privacy
CEO Charged for Selling Fake Cisco Networking Equipment
Crema Finance Issues Recovery Plans After $8.8M Crypto Hack
Aerojet Rocketdyne Pays $9M to Settle Cybersecurity Lawsuit
Recorded Future Buys Hatching for More Malware Visibility
Puerto Rico Commits $7.6M to Boost Cybersecurity
Predatory Sparrow's Hacks: There's Smoke, There's Fire
India Calls for Stricter Actions Against Cybercriminals
Privitar Acquires Regulatory Intelligence Provider Kormoon
Fake Google Update Delivering HavanaCrypt Ransomware
Lithuanian Energy Firm Experiences DDoS
$8M of Crypto Stolen by Phishing From Uniswap Liquidity Pool
Search Here: Ransomware Groups Refine High-Pressure Tactics
July Patch Tuesday Fixes 1 Zero-Day, 84 Flaws
Deakin Uni Students Suffer Smishing Attack, Data Breach
Ex-CIA Employee Convicted in Theft of Covert Hacking Info
Microsoft Says Phishing Campaign Skirted MFA to Access Email
CyberArk Execs: 9 Bets on What's Next in Identity Security
At Half-Year Mark, Ransomware, Vendor Breaches Dominate
Synthetic ID Fraud: Continuous Monitoring Is the Key
ISMG Editors: Analyzing the Predatory Sparrow Attack
Navigating the Great Zero Trust Debate
Log4j Flaw Is 'Endemic,' Says Cyber Safety Review Board
Bishop Fox Raises $75M to Fortify Offensive Security Muscle
H0lyGh0st Ransomware Linked to North Korean Hackers
BlackCat Adds Brute Ratel Pentest Tool to Attack Arsenal