Html Sitemap

Profiles in Leadership: Nicki Doble, Cover-More Group
Where's the Beef? Ransomware Hit Highlights Cyber Problems
HHS OCR Issues 19th 'Right of Access' Settlement
Google Finds New Exploit That Alters Chip Memory
Is STG Building a New Cybersecurity Powerhouse?
MSPs: Tools, Transformation and Consolidation
Cox Media Group Affiliates Go Offline
UK Cyber Security Council to Tackle Education, Standards
EU Adopts New Privacy-Focused Data-Sharing Tools
Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'
Cobalt Gang Members Sentenced by Kazakhstan District Court
US Prosecutors Charge Latvian Woman in Trickbot Gang Case
Colonial Attackers Used Compromised VPN Credentials
Siloscape Malware Reportedly Targeting Windows Containers
Identity Theft: Impact on Victims Is Getting Worse
Hospital Pays Ransom in Exchange for Promised Data Destruction
$2.3 Million of Colonial Pipeline Ransom Payment Recovered
Verizon Breach Report: Ransomware, Phishing and Top Trends
Encrypted Communications Network 'Anom' Was Sting Operation
Profiles in Leadership: Stephenie Southard, CISO, BCU
Widespread Internet Outages: Fastly Reports Problem Fixed
Profiles in Leadership: Mex Martinot, Siemens Energy
NCSC Warns of Surge in Ransomware Attacks Against Schools
CISA Expanding Mandatory Vulnerability Disclosure Program
Surge of Attacks on VMware Hosts, Threat Intel Firm Says
APT Group Kimsuky Has New Attack Technique, Researchers Say
Colonial CEO at Senate Hearing Details Ransomware Attack
Private Equity Firms Acquire ExtraHop in $900 Million Deal
Joomla Content System Vulnerable to Multiple Flaws
Chinese APT Group Reportedly Develops Custom Backdoor
Biden Rescinds Executive Orders Banning TikTok, WeChat
Not So Fastly: Global Outage Highlights Cloud Challenges
Microsoft Patches 6 Vulnerabilities Currently Under Attack
Analysis: How Biden Executive Order Mirrors FDA's Cyber Plans
House Probes Specifics of Colonial Ransomware Attack
RSA Spins Off Fraud and Risk Business
Upgrade Your Native Microsoft 365 Email Protection
TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud
Biden's Nominees Face Questions Over Cybersecurity Concerns
Italy Proposes Cybersecurity Agency to Boost Data Security
Groups Urge Biden, Congress to Bolster Health Sector Cyber
Fake Lazarus DDoS Gang Launches New 'Attacks'
EA Acknowledges Breach; Says Game Source Code Stolen
ISMG Editors' Panel: The FBI's Global Cryptophone Sting
DOJ Shut Down Slilpp Marketplace for Stolen Credentials
How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?
House Oversight Committee Probing JBS Ransomware Payment
Al-Jazeera News Service Says It Foiled Hacking Attempts
Security Firm COO Charged in Attack on Medical Center
McDonald's Breach Exposes Korean, Taiwanese Customer Data
UK Plans for Enhanced Cybersecurity Role
Using PAM in an OT Environment
Fujifilm Reportedly Refused to Pay Ransom
Report: China-Connected APT41 Likely Behind Attacks on Airlines
Putin Raises Issue of Extradition Agreement
Volkswagen, Audi Notify 3.3 Million of Data Breach
The Best of Virtual RSA Conference 2021
NATO Endorses Cybersecurity Defense Policy
Emergence of Hybrid Cloud Security
How 'SEO Poisoning' Is Used to Deploy Malware
Ukraine Arrests 6 Clop Ransomware Operation Suspects
Behind the Scenes of a Business Email Compromise Attack
Apple Patches 3 Flaws Affecting Certain Devices
Biden Promises Retaliation Unless Putin Stops Cyberattacks
Cyberium Domain Targets Tenda Routers in Botnet Campaign
India Moves Toward Limiting What Telecom Tech Can Be Used
Analysis: The Cyber Impact of Biden/Putin Summit Meeting
Using Automation to Update a SOC
ISMG Editors’ Panel: NATO's Cybersecurity Policy and More
Ransomware Operations 'Based on a Culture of Mistrust'
Ransomware: Strategies for Faster Detection and Response
Why Criminals Love Ransomware: In Their Own Words
Peak DDoS Traffic Up 100%, Researchers Report
SASE Comes of Age for Governments, Schools
Fake DarkSide Ransomware Gang Targets Energy, Food Sectors
CISA: Firewall Rules Could Have Blunted SolarWinds Malware
The Changing Nature of the Insider Threat
Business Benefits of a SASE Approach
Iranian Police Reportedly Crack Down on Illegal Cryptomining
Best Practices for Fighting Authorized Push Payment Fraud
US Seizes Domains of Websites Linked to Iran, Iraq
Australia Considers Mandating Ransom Payment Reporting
EU Proposes Joint Cybersecurity Unit
Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity
John McAfee Found Dead in Spanish Prison Cell
Irish Ransomware Attack Recovery Cost Estimate: $600 Million
Repurposed REvil Ransomware Used in Attacks
Binance Says It Helped With Clop Money Laundering Bust
Profiles in Leadership: Selim Aissi, IMT (Ellie Mae)
ISMG Editors’ Panel: Examining Open-Source Software Security
DarkSide Created a Linux Version of Its Ransomware
Sizing Up the Security Features Slated for Windows 11
Researchers Identify New Malware Loader Variant
Group Behind SolarWinds Attack Targeted Microsoft Customers
Cajee Brothers Deny $3.6 Billion Bitcoin Fraud
4 Dell Bugs Could Affect 30 Million Users
NIST Releases 'Critical Software' Definition for US Agencies
Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack
Mercedes-Benz USA Says 1.6 Million Records Exposed
IoT: The New Industrial Revolution
Hackers Disguise Rootkit as Microsoft Drivers
Report Urges NASA to Improve Cybersecurity Risk Management
Attackers Increasingly Using Cobalt Strike
Microsoft Edge Vulnerabilities Let Hackers Steal Data
Malware Opens the Door to XMRig Cryptominer
Enhancing Email Security for Microsoft 365
Zyxel Warns of Attacks on Its Firewall, VPN Products
Capital One Breach Suspect Faces New Criminal Charges
Multinational Police Raid Seizes DoubleVPN Servers
ISMG Editors’ Panel: FBI Assessment of Cybersecurity Trends
700 Million 'Scraped' LinkedIn User Records Offered for Sale
US Tracking Brute-Force Attacks Linked to Russia
Google Investigates Ad Injected Into 2FA SMS Messages
REvil's Ransomware Success Formula: Constant Innovation
Hades Ransomware Has Targeted 7 Large Companies
Fraud and the Rise of Brand Abuse
Profiles in Leadership: Alex Cunningham, CISO, Advisor360°
Biden Orders Investigation of Kaseya Ransomware Attack
Kaseya Was Working on Patches Before Ransomware Attack
Kaseya Attack: REvil Offers $70 Million 'Universal Decryptor'
Update: Microsoft Issues 'PrintNightmare' Security Update
Kaseya: Up to 1,500 Organizations Hit in Ransomware Attack
Kaseya Sees Service Restoration Delay After Ransomware Hit
Kroger, British Airways Agree to Settle Data Breach Lawsuits
Kaseya Ransomware Attack: 'It Could Have Been Much Worse'
Kaseya Ransomware Attack: 'This Is a Dramatic Escalation'
Republican National Committee Says Systems Weren't Breached
Gartner Offers Insights on Migrating to SASE
Zero Trust: Two Models for Implementation
OnDemand Webinar| Improving Maritime Cybersecurity & Operational Resiliency
Healthcare Workers Allege Amazon Alexa Violates Privacy
FIDO Alliance Update: New Guidelines, Standards Enhancements
Profiles in Leadership: Gary Hayslip, CISO, SoftBank
Kaseya Raced to Patch Before Ransomware Disaster
Biden Faces Russian Ransomware Curtailment Challenge
Kaseya Announces New Service Restoration Date
Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete
List of Victims of Kaseya Ransomware Attack Grows
Fighting Insider Fraud: Using the Right Technologies
ISMG Editors’ Panel: Analysis of Kaseya Attack
Malspam Campaign Targets Kaseya Victims
Biden's New Executive Order Looks to Address Data Privacy
Interpol Calls for New Ransomware Mitigation Strategy
Add Morgan Stanley to List of Accellion FTA Hack Victims
Yearlong Phishing Campaign Targets Energy Firms
Kaseya Says Software Fully Patched After Ransomware Attack
Ransomware Landscape: REvil Is One of Many Operators
Microsoft to Acquire RiskIQ
Prosecutors: Insider Trading Tips Sold on Darknet Sites
New 'Ransomwhere' Site Tracks Ransom Payments
US Senate Approves Jen Easterly as CISA Director
SolarWinds Issues Patches in Wake of Zero-Day Attacks
Guess Confirms Ransomware Attack and Data Breach
REvil's Infrastructure Goes Offline
Microsoft Releases Patches for 4 Exploited Zero-Day Flaws
Is China's 'Cyber Capacity' Really 10 Years Behind the US?
Constant Ransomware Business Refinements Boosting Profits
Using XDR to Detect Ransomware, Supply Chain Attacks
SonicWall Urges Patching of Devices to Ward Off Ransomware
NortonLifeLock in Talks to Buy Antivirus Rival Avast
US Offering $10 Million Reward for Cyberthreat Information
Facebook Disrupts Iranian APT Campaign
ISMG Editors’ Panel: Challenges for New CISA Leader
How Mespinoza Ransomware Group Hits Targets
Israeli Firm Candiru's Spyware Used to Target Dissidents
Google to Patch 8 Chrome Flaws, Including a Zero-Day
What's Next Step for REvil Ransomware Victims?
DOD and DHS Need More Collaboration on Cybersecurity Issues
US Blacklists 6 Russian Organizations Over Security Concerns
Spyware Exposé Highlights Suspected Apple Zero-Day Flaws
Leak of 50,000 Contact Details Tied to Spyware Targeting
US: Chinese Government Waged Microsoft Exchange Attacks
US Indicts 4 Chinese Nationals for Lengthy Hacking Campaign
Advisory Describes Chinese Attackers' Tactics
China's Cyberattacks: Sizing Up International Response
Data Analytics: 3 Critical Questions
Profiles in Leadership: Lisa Tuttle, CISO, SPX Corp.
Leak of Alleged Pegasus Target List Restokes Spyware Debate
Case Study: A REvil Ransom Negotiation
Law Firm Serving Fortune 500 Firms Hit by Ransomware
Researchers Found Flaws in Telegram's Cryptographic Protocol
Can the US Curb China's Cyber Ambitions?
Spyware Zero-Day Hits Show Apple Ecosystem's Imperfections
Microsoft Disrupts Business Email Compromise Domains
Cybereason, Rapid7 and Microsoft Announce Acquisitions
Report Identifies Vulnerabilities Popular on Criminal Forums
Automation to Scale Security in the Cloud
Chinese APT Group Attacks French Organizations
Patch Roundup: Windows, Linux, Oracle, Juniper
Dutch Police Arrest 2 Tied to Phishing Operation
Kaseya Obtains Decryption Tool After REvil Ransomware Hit
Saudi Aramco Traces Data Leak to Attack on Supplier
ISMG Editors’ Panel: Examining the Pegasus Project
South African Port Operations Disrupted by Cyberattack
Resiliency Is Key to Surviving a CDN Outage
IoT Security Dangers Loom as Office Workers Return
Mercenary Hacking Group Deploys Android Malware
Hackers Target Kubernetes Using Misconfigured Argo Workflows
Australia Says Uber 'Interfered' With Users' Privacy
Attackers Rely on 'Exotic' Languages for Malware Creation
Kaseya Says It Paid No Ransom to Obtain Universal Decryptor
18 Companies to Participate in NIST 'Zero Trust' Project
AvosLocker Ransomware Gang Recruiting Affiliates, Partners
M&A Update: Deloitte and Sophos Make Acquisitions
Pegasus Spyware: World Leaders Demand Israeli Probe
New Hacking Group Exploits Vulnerabilities in Web Apps
Researchers Describe Windows 11 Preview Scam
BlackMatter Ransomware Claims to Be Best of REvil, DarkSide
Tips on Recruiting, Retaining Cybersecurity Staff
Kaseya's Unitrends Technology Has Zero-Day Flaws
Measuring Success of 'No More Ransom' Project
Israeli Government Visits NSO Group Amid Spyware Claims
9 Ransomware Enablers - And Tactics for Combating Them
Insurer: Size of Claims Paid for Ransomware Attacks Declines
Wiper Malware Used in Attack Against Iran's Train System
ISMG Editors’ Panel: Ransomware Update
Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
Flaw Found in Moodle Online Learning Platform
Patching Woes: Most Frequently Exploited CVEs Listed
Researchers Find More Servers Tied to Russian-Linked Attacks
Amazon Hit With $885 Million GDPR Fine
NIST Works to Create AI Risk Management Framework
Researchers Uncover New Android Banking Malware
SolarWinds Attackers Accessed US Attorneys' Office Emails
Ransomware Attackers Eying 'Pure Data-Leakage Model'
FatalRAT Exploits Telegram to Deliver Malicious Links
Zoom Agrees to Settle Security Lawsuit for $85 Million
Ransomware Actors Set Up a Call Center to Lure Victims
Words With Friends Breach: Zynga's Case Set for Arbitration
Global Incident Response: The Rise of Integrity Attacks
Phishing Campaign Uses Live Chat, Leverages PayPal Brand
COVID 19: What Delta Variant Means to Business Recovery
Chinese APT Groups Targeted Asian Telecoms
Food Delivery Services Face GDPR Fines Over AI Algorithms
Microsoft Database Engine Vulnerabilities Patched
PayPal to Hire Dozens of Cryptocurrency Security Experts
Unsecured Database Exposed Data on Millions
Cybersecurity M&A Update: Five Firms Make Moves
Die neue Rolle des Zero-Trust-Datenschutzes
The New Role of Zero Trust Data Protection (Interview in deutscher Sprache)
Researchers Disclose 14 Flaws in NicheStack
CISA's Easterly Unveils Joint Cyber Defense Collaborative
ENISA Warns Supply Chain Attacks Will Persist
Cybersecurity Leadership: Risk in OT and IIoT
Is Darknet Forum Ransomware Chatter Ban Having an Impact?
ISMG Editors’ Panel: Government Cybersecurity Challenges
Hackers Target Critical Infrastructure in Southeast Asia
Flaws in John Deere Systems Show Agriculture's Cyber Risk
BlackMatter Group Debuts Linux-Targeting Ransomware
How Chinese Hacking Groups Target Russia
10 Initial Access Broker Trends: Cybercrime Service Evolves
NIST Guidance Focuses on Creating 'Cyber Resiliency'
Conti Group Takes Advantage of Vulnerable Exchange Servers
Poly Network Says $600 Million in Cryptocurrency Stolen
Microsoft Patches 3 Zero-Day Vulnerabilities
REvil Decryption Key Posted on Cybercrime Forum
Establishing ‘Privacy by Design’
Synology NAS Devices Targeted by StealthWorker Botnet
What Can Be Done to Overcome Cybersecurity Staff Shortage?
NortonLifeLock to Buy Avast for Over $8 Billion
Accenture Hit by Apparent Ransomware Attack
Back to the Future: Notorious AlphaBay Market Reboots
How Does New UK 'Police CyberAlarm' Project Work?
23 Charged in European Email Fraud Scheme
ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response
Assessing AI Security Solutions: Questions to Ask
Malicious Docker Images Used to Mine Monero
Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
Ukrainian Police Shutter Allegedly Illegal Crypto Exchanges
Scripps Health Reports Financial Toll of Ransomware Attack
Poly Network Hacker Reportedly Returns Most of Stolen Funds
Cybercriminals Reportedly Created Blockchain Analytics Tool
Microsoft Details Yearlong Office 365 Phishing Campaign
T-Mobile USA Investigates Possible Data Breach
Profiles in Leadership: Rob Hornbuckle, CISO, Allegiant
UK Introduces Tool for Reporting Phishing
Binance Ordered to Freeze Attackers' Accounts
Colonial Pipeline: Attack Exposed Personal Data
Memorial Health System in Ohio Latest to Be Hit With Attack
T-Mobile Probes Attack, Confirms Systems Were Breached
Respect in Security: A Pledge to Eliminate Harassment
Researchers Describe New DoS Attack Method
Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?
FireEye, CISA Warn of Critical IoT Device Vulnerability
T-Mobile: Attackers Stole 8.6 Million Customers' Details
Ransomware Hits Brazilian National Treasury
Job Listing Reportedly Reveals Secret UK Hacking Unit
Nigerian Gang Asks for Insider Help to Plant Ransomware
Hacker Steals $97 Million From Crypto Exchange 'Liquid'
Ransomware: LockBit 2.0 Borrows Ryuk and Egregor's Tricks
Profiles in Leadership: Darrell Bateman of City Bank Texas
ISMG Editors’ Panel: Fraud Trends
Insurer Tokio Marine Hit by Ransomware
Iranian Group Targets Israeli Firms
World Bank Launches Global Cybersecurity Fund
Houdini Malware Used in New Way
SNI Vulnerability Affects Some Security Products
Record-Setting DDoS Attack Hits Financial Service Firm
US, Singapore Sign Cybersecurity Agreements
Mozi Botnet Targeting Netgear, Huawei, ZTE Gateways
Misconfigured Microsoft Power Apps Spill Sensitive Data
Google Removes Fake Crypto-Mining Apps
Identity and the New Role of Privilege
Profiles in Leadership: Nandhini Duraisamy
White House Tech Meeting: Focus on Critical Infrastructure
Researchers Demonstrate AI Can Be Fooled
Updated PRISM Backdoor Discovered
Threat Modeling: Making the Right Moves
Profile in Leadership: Laura-Lea Berna, BC Transit
Citizen Lab: Bahrain Used Pegasus to Spy on Activists
White House Unveils Supply Chain, New Security Initiatives
The Role of XDR in Mitigating Ransomware Risks
How to Protect Your Office 365 Data Against Ransomware
Board Members: Mitigating Their Security Risks
FortiGuard Labs: A 10-Fold Increase in Ransomware
Financial Execs Say Security a Top Cryptocurrency Barrier
The Evolution - and Revolution - of Access
Fin8 Using an Updated Backdoor
Modernization of Security Operations
Flaws Found in Open Source elFinder File Manager
7 Emerging Ransomware Groups Practicing Double Extortion
Microsoft Issues Security Advisory on ProxyShell Flaws
How to Make a Smooth Transition to DevSecOps
Data Breach Culprits: Phishing and Ransomware Dominate
ISMG Editors’ Panel: Crypto Exchange Hacks
Azure Database Service Flaw Could Affect Thousands of Firms
Exam-Cheating Scandal: CREST Finds NCC Group Broke Rules
T-Mobile CEO Apologizes for Mega-Breach, Offers Update
FBI Issues Alert on Hive Ransomware
The New Cybercrime Landscape in Canada
Phishing Attack Used Spoofed COVID-19 Vaccination Forms
Senator Seeks Input on Securing Crypto, Blockchain
Ransomware Attack on Swiss City Exposed Citizens' Data
Bangkok Airways Execs Apologize for Data Breach
Microsoft: Beware Phishing Attacks with Open Redirect Links
Cybersecurity Investment: Trends and Misconceptions
IG: DoD Did Not Properly Secure Access to VIP Records
UK Looks to Revamp Data Privacy Policies Post-Brexit
Cloud Migration and Secure Identities
SEC to Monitor Illicit Activity on DeFi Platforms
Scammers Impersonate OpenSea Customer Support
Profiles in Leadership: Conrad Bell, VP & CISO, C Spire
Uncovering the Dark Web: A Solution For Conducting Effective External Threat Protection
IronNet Goes Public by Merging With LGL Systems
OnDemand | Overcome IT/OT Convergence Challenges with Managed Services
OnDemand | What Every Water Utility Needs to Know About Cybersecurity
SEC Sanctions 8 Firms for 'Deficient Cybersecurity Procedures'
Open XDR-as-a-Service: A Fresh Look at Detection and Response
'ProxyToken' Bug Put Microsoft Exchange Email at Risk
Attackers Keep Refining Business Email Compromise Schemes
Vendors Issue Security Advisories for OpenSSL Flaws
ISMG Editors’ Panel: New and Rebranded Ransomware Groups
125,000 Coinbase Users Get False Security Alerts
LockFile Ransomware Using New Techniques to Evade Detection
FTC Bans SpyFone Company, CEO From Surveillance Business
Facebook's WhatsApp Hit With $266 Million GDPR Fine
White House Warns Of Cyberthreats Over Labor Day Weekend
Could Lessons From Plane Hijackings Help Fight Ransomware?
Conti Ransomware Threat Rising as Group Gains Affiliates
Preventing Identity Fraud: The Road Ahead For Financial Services
OnDemand | Postmortem of a Ransomware Attack
SEC Charges BitConnect on $2 Billion Fraud Scheme
Autodesk Says Company Was Targeted by SolarWinds Attackers
Attackers Are Selling Their Victims’ Internet Bandwidth
Moxa Devices Prone to Vulnerabilities Affecting Railways
Atlassian Vulnerability Being Exploited in the Wild
2 UK Telecom Firms Under DDoS Attacks
Cisco Patches Critical Authentication Bypass Bug
Irish Police 'Significantly Disrupt' Attackers' Operations
Aussie Researcher Fakes Digital COVID-19 Vaccination Proof
The Difference Between Espionage and Financial Breaches
Profiles in Leadership: Bobbet Castillo, Petnet
ISACA 2021 Report: Top Trends, Improving Cyber Maturity
Alleged Trickbot Developer Arrested in South Korea
Netgear Fixes Critical Flaws Affecting Smart Switches
20 Years Later: A Cyber 9/11 Is Unlikely
2 Data Leaks Reported in Indonesia's COVID-19 Tracking Apps
SEC Warns of Fraudulent Cryptocurrency Schemes
Howard University Hit With Ransomware Attack
Orchestration and Automation: The New 'Must-Haves'
Zero-Day Attacks Exploit MSHTML Flaw in Microsoft Windows
Modernizing IAM: 'Same Problem, New World'
Resilience CEO on White House Meeting, Cyber Insurance
Anatomy of a Ransomware Attack: 3 Stages
DDoS Attack Disrupts New Zealand Banks, Post Office
8,000+ Confluence Servers Still Vulnerable to Atlassian Flaw
Lawsuit: Fertility App Maker Sent Data to Google, Facebook
White House Pushing Federal Agencies Toward 'Zero Trust'
Pro-China Operatives Push Protests, Pandemic Conspiracies
Case Study: Team Approach for Medical Device Cybersecurity
Groove Promises Maximum Profits for Ransomware Affiliates
20 Years After 9/11: How US Cybersecurity Landscape Evolved
How China’s Information Protection Law Affects Businesses
National Cyber Director Sees Ransomware As Continuing Threat
Bitcoin Scam Run by Fake Exchange, Report Says
Cybercrime Money Launderer Handed 11-Year Sentence
China-Linked Grayfly Gang Spotted Using Sidewalk Backdoor
United Nations Says Attackers Breached Its Systems
The Cost of Cloud Compromise and Shadow IT
Microsoft Alert: Serious Flaw in Azure Container Instances
ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs
Transforming an Organization's Security Culture
Ukrainian Extradited to US Faces Credential Theft Charges
SolarWinds Attack Spurring Additional Federal Investigations
HHS on Information Blocking Rule Enforcement: Stay Tuned
Department of Commerce Establishes AI Advisory Committee
Pysa Ransomware Gang Targets Linux
The 'Basics We Need to Get Right'
Olympus: 'Potential Cyber Incident' Disrupted EMEA System
Indonesian Intelligence Agency Reportedly Breached
House Bill Seeks to Insulate CISA Director From Politics
BitSight, Mastercard and Tenable Make Acquisitions
HHS Warns Health Sector of BlackMatter Attacks
New York Vaccine Passport App Stored Forged Credentials
Apple Patched iMessage. But Can It Be Made Safer Overall?
Profiles in Leadership: Tim Nedyalkov, Commonwealth Bank
Top Initial Attack Vectors: Passwords, Bugs, Trickery
Massachusetts Attorney General Probing T-Mobile Breach
Clinic: EHR Data Too Damaged to Recover Post-Attack
SEC Chair Pushes for Additional Cryptocurrency Regulations
Researchers: 61M Health IoT Device User Records Exposed
OnDemand | Cyber Threats Facing Oil, Gas & Chemical Businesses
Microsoft Patches MSHTML Vulnerability
Travis CI Flaw Exposed Secrets From Public Repositories
Profiles in Leadership: Tammy Klotz, CISO, Covanta
Russia Has Taken No Action to Combat Ransomware, FBI Says
Former US Intelligence Officers Spied on US for UAE
Microsoft Fully Ditches the Password
Lawsuit: Health System Failed to Heed Ransomware Warnings
House Committees Seek to Spend Millions on Cybersecurity
New York Court Shuts Down Crypto Platform 'Coinseed'
Profiles in Leadership: Amit Basu, International Seaways
Super Charge Splunk With Observability Cloud
Republican Governors Association Targeted in Exchange Attacks
FTC: Health App, Device Makers Must Report Breaches
Is Grief's Threat to Wipe Decryption Key Believable?
OCC's Hsu Addresses Need for Cryptocurrency Oversight
Good News: REvil Ransomware Victims Get Free Decryptor
US Warns Nation-State Groups May Exploit Flaw in Zoho Tool
HHS OCR's Latest HIPAA Enforcement Action
Nigerian Hacker Connected to Aviation Industry Attacks
Fraudster Gets 12-Year Sentence for AT&T 'Unlocking' Scheme
Mirai Botnet Actively Exploiting OMIGOD Flaw
US to Unveil Sanctions on Use of Cryptocurrency for Ransoms
Illinois Man Convicted of Running DDoS Facilitation Websites
ISMG Editors’ Panel: Cyber Insurers and Ransomware Response
No Bounty for Bug Hunters in India
Web Hoster Epik's Breach Exposes 15 Million Email Addresses
Mēris: How to Stop the Most Powerful Botnet on Record
CISA Must Update Critical Infrastructure Protection Plans
Spanish and Italian Police Break Up Phishing Gang
A Single Vulnerability Affects All AMD Ryzen Processors
Post-Attack, Health Agency Notifying 'All Alaskans'
Shipping Giant CMA CGM Hit With Second Attack
Hacker Makes Off With $12 Million in Latest DeFi Breach
Chinese APT Data-Harvesting Campaign Analyzed
Ransomware Reportedly Hits Iowa Farm Services Cooperative
FBI Director Questioned Over Kaseya Decryption Key
How to Keep Cybercrime's Foot off the Pedal with the Auto Industry and ISO/SAE 21434
Coinbase Contracts With DHS for Blockchain Analytics
Hacking Incidents Lead to 2 Big Eye Care Provider Breaches
BlackMatter Knocks Marketron Off the Air
Zero-Day Vulnerability Found in UK Virgin Media Routers
US Treasury Blacklists Russia-Based Crypto Exchange
Researcher Finds Exposed Data of 106 Million Thai Visitors
Russian-Linked Group Using Secondary Backdoor Against Targets
Microsoft Analyzes Phishing-as-a-Service Operation
Russians Prevent Mēris Botnet From Hijacking 45,000 Devices
US DHS, FBI Face Ransomware Questions from Congress
Conti Ransomware Attacks Surging, US Government Warns
Establishing Cybersecurity in the Era of Resilience
Work from Everywhere, Securely
Business Resilience Through ‘Zero Trust’
Fed Chair Says Central Bank Evaluating Digital Currency
Senators Debate Cyber Rules for US Critical Infrastructure
Ransomware: A Problem of Excesses
Lawmakers Share Huawei Concerns with US State Department
The Changing Face of Ransomware
New Malware Targets India's Defense Personnel
Tamil Nadu Ransomware Attack Raises Resiliency Questions
ISMG Editors’ Panel: The Rise of Quadruple Extortion Attacks
CISA Director: Attackers Targeted Port of Houston
Profiles in Leadership: Hadas Cassorla of M1 Finance
Researcher Finds Malware Targeting Mac Users via Baidu Ad
Australia Warns of Critical Vulnerability in Zoho Service
Lawsuits: Negligence Led to UC San Diego Health Incident
Ransomware Attack Reportedly Cripples European Call Center
Automation for the Modern SOC: Strategies for Smarter Security Operations
Automation for the Modern SOC: Automating Phishing Response and Threat Intel Enrichment with Splunk SOAR and TruSTAR
Automation for the Modern SOC: Protecting your Cloud Accounts in GCP, Azure, and AWS with Automation
Automation for the Modern SOC: Automating Vulnerability Management at Splunk
Critical Flaw May Affect Millions of Hikvision Devices
US Commerce Officials Seek Comment on IaaS Executive Order
Former DHS Official to Lead HHS' HIPAA Enforcement Agency
Crypto Exchange Bug Reveals North Korean Monero Laundering
New Malware 'BloodyStealer' Targets Gaming Accounts
Russia-Linked Nobelium Deploying New 'FoggyWeb' Malware
Ransomware, Vendor Breaches Spike on Federal Tally
Experts Slam Social Media Platforms' Data Policies
Bipartisan US Senate Bill Eyes Cryptomining Oversight
NSA, CISA Release VPN Security Guidance
Mental Health Clinic Notifies Patients 6 Months After Hack
Profiles in Leadership: Peter Gregory, GCI Communications
Top Russian Cybersecurity CEO Charged with Treason
VMware Discloses and Releases Fixes for 19 Bugs in Products
Microsoft Will Mitigate Brute-Force Bug in Azure AD
Apple Pay-Visa Vulnerability May Enable Payment Fraud
Securing Digital Transformation for Legacy Systems
New Legislation Eyes Both Ransom, Incident Reporting
2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise
Anonymous Leaks Epik Data - Again
California Extends Telehealth Privacy, Security Waivers
CISA Launches Insider Threat Self-Assessment Tool
Neiman Marcus Says 4.6 Million Affected by Data Breach
Fraud Transformation: Balancing Business and Customer Needs
ISMG Editors’ Panel: Protecting Active Directory from Ransomware Attacks
Singapore's 2021 Strategy: Secure Critical Infrastructure
Lawsuit: Hospital's Ransomware Attack Led to Baby's Death
US Agencies Awarded $311 Million in Cybersecurity, IT Funds
President Biden Touts Cybersecurity Efforts
Hackers Impersonate Amnesty International to Spread Malware
Ukraine Busts 2 Suspects Tied to Major Ransomware Group
Profiles in Leadership: Peter Van Lierde, CISO, Sibelga
Facebook, Instagram, WhatsApp Suffer Widespread Outage
Ex-Army Contractor Sentenced to 12 Years for Fraud
Cyberattacks Disable IT Networks at 2 Indiana Hospitals
New File-Locking Malware With No Known Decryptor Found
How Ransomware Attackers Hit Virtual Machine Hypervisors
Apache Airflow Leak Exposes 'Thousands' of Credentials
FDA: How to Inform Patients About Medical Device Cyber Flaws
Top US Cyber Officials Say Ransomware Is Here to Stay
Anonymous Leaks Data from Texas GOP
Medtronic Insulin Pump Devices Recalled Due to Serious Risks
Text Messaging Routing Firm Syniverse Reveals 5-Year Breach
Understanding the Real Threat of Ransomware
Apache Fixes Zero-Day Flaw Exploited in the Wild
Video Game Streamer 'Twitch' Confirms Massive Data Breach
Patient Safety Concerns Grow Over Medical Gear Security
LANtenna Attacks Exploit Air-Gapped Networks Via Ethernet
New Bill Would Require Ransom Disclosure Within 48 Hours
Profiles in Leadership: John O'Driscoll, State of Victoria
Breach of Syniverse Reveals Yet Another Supply Chain Attack
The Anatomy of the Codecov Breach: A CyberArk Labs Webinar
HHS Warns Healthcare Sector About LockBit 2.0 Threats
US DOJ to Fine Contractors for Failure to Report Incidents
Silicon Valley VC Firm Leaked 'Deal Flow' Data
Apache Issues Another Emergency Patch for Exploited Flaws
ISMG Editors’ Panel: First Fatality Linked to Ransomware?
Analyzing the Results of the 2021 Cybersecurity Complexity Study, EU & UK
Data Breach Reports Rise as Supply Chain Attacks Surge
Ransomware Exposed: Key Learnings from Examining 3.5 Million Samples
Netherlands Says Armed Forces May Combat Ransomware Attacks
Efforts to Incentivize Healthcare Sector Cyber Investments
Nobelium Makes Russia Leader in Cyberattacks
Implementing an Identity Security Program
How to Mitigate Socially Engineered Attacks
Google Says Russian APT Targeting Journalists, Politicians
Profiles in Leadership: Mustapha Kebbeh, CISO, Brinks
Ransomware Attack Hits Engineering Giant Weir Group
Profiles in Leadership: Dr. Frances Undelikwo, Fidelity Bank
Trend Micro: Linux Malware Targets Huawei Cloud
Democratic Lawmakers Urge Agencies to Act on Ransomware
FIN12 Ransomware Attacks Aggressively Targeting Healthcare
Ransomware: No Decline in Victims Posted to Data Leak Sites
UK Cybersecurity Agency Releases New BYOD Guidance
CISA to Access Agencies' Endpoints, Help Enhance Security
Former Executive Accessed PHI of Nearly 38,000 Individuals
Microsoft Says It Mitigated Largest-Ever DDoS Attack
3 Men Charged by US DOJ With Laundering BEC Proceeds
Dutch Cyber Cops Tell Stresser/Booter Customers: Cut It Out
Fertility Testing Lab Says Ransomware Breach Affects 350,000
Thingiverse Data Leak Affects 228,000 Subscribers
US Convenes Global Ransomware Summit Without Russia
Australia Plans Ransomware Attack Reporting Requirement
Flaws In GitHub Actions Bypass Code Review Mechanism
MITRE Launches Centers to Protect Infrastructure and Health
Osteopathic Professional Group Reports Year-Old Breach
House Lawmakers Announce Bill Targeting Tech Algorithms
Missouri Refers Coordinated Bug Disclosure to Prosecutors
BlackByte: Free Decryptor Released for Ransomware Strain
ISMG Editors' Panel: Are Our Systems Too Complex to Secure?
Ransomware Attack on Israeli Medical Center Raises Alarm
US Agencies to Water Facilities: You May Be Next Target
5 Reasons to Ditch Passwords & Make Your Employees (and IT) Happier
Analyzing the 2021 Faces of Fraud Survey
Treasury Dept. to Crypto Companies: Comply with Sanctions
MirrorBlast Campaign Targets Finance Sector Using Macros
Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk
Twitter Suspends North Korean Threat Actor Accounts
Accenture: Ransomware Attack Breached Proprietary Data
Sinclair TV Stations Targeted in Weekend Ransomware Attack
Acer Taiwan and India Hit in 2nd and 3rd Attacks of 2021
Analysis: Top Ransomware Gangs Targeting Healthcare Sector
Evaluating and Reducing Supply Chain Risk
Profiles in Leadership: Wouter Veugelen of Oil Search Ltd
Positive Security: Inspiring Behavioral Change at Workplace
Preparing for Ransomware Attacks in the Education Sector
New Business Model: White Labeling of Ransomware
More Attempted Cyberattacks on Israeli Healthcare Entities
Bugs in Malware Serve as Backdoor to Undo Damage
New York Tells 2 Cryptocurrency Firms to Cease and Desist
Why Reporting Security Bugs Can Be Fraught With Tension
TeamTNT Deploys Malicious Docker Image on Docker Hub
CISA Leader Backs 24-Hour Timeline for Incident Reporting
Hacker Claims Details of 45 Million Argentinians Stolen
Hacker in UPMC Data Theft, Fraud Case Gets Maximum Sentences
Diversity, Equity and Inclusion Challenges in Cybersecurity
4 Bulletproof Hosting Provider Admins Getting Sentenced
Ransomware: Average Ransom Payment Stays Steady at $140,000
Lyceum Group Targets Two Tunisia-Based Entities
Dental Alliance Reports Vendor Breach Affecting 170,000
US Cracks Down on Sale of Offensive Cybersecurity Tools
House Passes Bills on Both Supply Chain, Telecom Security
REvil Revelations: Law Enforcement Behind Disruptions
ISMG Editors’ Panel: Regulators Get Tough on Crypto Firms?
Forrester Report: Key Questions to Ask XDR Vendors
Malicious Packages Disguised as JavaScript Libraries Found
FIN7 Sets Up Fake Pentesting Company Site to Recruit Talent
New Bill Would Secure Government Contractors' Use of AI
DarkSide Transfers $7 Million Worth of Bitcoin
CoinMarketCap: No Breach Despite 3.1M Email Address Leak
Groove Operators Reportedly Ask Peers to Attack US
UK's Tesco Supermarket App and Website Disrupted
Report: SolarWinds Hackers Targeting IT Supply Chain
Defending Against Open-Source Supply Chain Attacks
The Need for Systems Thinking in Cybersecurity
US DOJ: Global Darknet Sting Nabs 150 Suspects
REvil's Cybercrime Reputation in Tatters - Will It Reboot?
Cyberattack Reportedly Cripples Iran Gas Stations
Voipfone DDoS Attacks Raise Specter of Protection Racket
Vendor Partner Responsible for Fullerton Health Data Breach
US State Department to Create Dedicated Cyber Office
Cybercriminals Target Newbie Bad Actors With Phishing Sites
Lazarus Adds Supply Chain Attack to List of Capabilities
Washington Secretary of State to Head Election Security
PHI 'May Have Been Removed' in Vendor's Ransomware Attack
Hackers Claim 400GB of Data Stolen From Thai Hotel Chain
NRA Reportedly Hit By Russia-Linked Ransomware Attack
Microsoft Launches Cybersecurity Recruitment Campaign
ISMG Editors' Panel: Solving the Ransomware Problem Together
N-Day Vulnerabilities: The Critical Importance of Patching
WordPress Plug-In Bugs Put 1 Million-Plus Sites At Risk
Countries Team Up to Issue Video Teleconference Guidance
Healthcare System Phishing Breach Affects 209,000
The State of the Phish: A Look at User Awareness, Vulnerability and Resilience
Federal CISO DeRusha Named Deputy National Cyber Director
Multinational Police Force Arrests 12 Suspected Hackers
India’s National Cybersecurity Strategy Awaiting Approval
Celebrities' Data Dumped on Darknet Site After Hack
Ransomware Evolves: Affiliates Set to Wield Greater Power
Trojan Source: Invisible Vulnerabilities in Most Code
Reduce Security Risk of Healthcare Legacy Systems, Devices
CISA Begins Program to Identify Critical Infrastructure
New Cybersecurity Norms for Wireless Device Makers in EU
California Clinic Network Cyber Incident Affects 656,000
US Treasury Department Says Stablecoins Must Be Regulated
7 Trends: How Ransomware Operations Continue to Evolve
Facebook Shuts Down Facial Recognition Feature
CISA Directs Federal Agencies to Patch Known Vulnerabilities
Ransomware Incidents Among Largest Breaches on Federal Tally
FBI Warns of Ransomware Actors Leveraging M&A Data
BlackMatter Claims to Shut Ops; Experts Suspect Rebranding
US Commerce Department Blacklists Israeli Spyware Firms
Feds Post $10 Million Reward for DarkSide Ransomware Actors
EDR to XDR: What It Means
ISMG Editors: CISA to Protect Critical Infrastructure
EHR Vendors' Disclosures Are Latest Security Risk Reminders
US DOJ: Continue to Expect Arrests, Ransom Payment Seizures
Digitizing and Securing Norway's Railway Network
Law Enforcement Operation Targets Clop Ransomware
NSA Reports: Espionage Group Breaches Critical Systems
Profiles in Leadership: Leon Ravenna, CISO, KAR Global
Secure the Changing Risk Landscape from BEC, Other Threats
REvil Ransomware Suspects Snared in Global Police Crackdown
Ransomware Actors May Have a New Broker on the Block
Black Shadow Group Leaks Israeli Patient Records, Data
Infrastructure Bill Features $1.9 Billion in Cyber Funding
Robinhood Reveals Data Breach and Extortion Shakedown
Hive Threat Group Attacks MediaMarktSaturn, Demands Ransom
Lab Owner Charged in $100 Million Healthcare Fraud Case
US Treasury Blacklists Cryptocurrency Exchange Chatex
How to Stop a Potential Ransomware Attack Before it Happens
The Evolution of Privileged User Monitoring for Mainframes
The ROI of Shift-Left Automated Testing
Dridex Banking Malware Turns Up in Mexico
Hackers Disrupt Canadian Healthcare and Steal Medical Data
Pegasus-Like Spyware Targets South Korean Citizens
Lyceum APT Group Adds ISPs to Its Target List
Breach Reporting Timelines: Tale of Two Hacking Incidents
SEC's Crenshaw: Transparency, Pseudonymity Top DeFi Issues
55 Patches, 6 Zero Days - Is There a Backlog at Microsoft?
Flaw Exposing Data of 44 Million Indian Investors Patched
Cybersecurity Leadership: Cut Through the Zero Trust Hype
UK Supreme Court Blocks $4.3B Class Action Against Google
NJ AG Smacks 2 Printing Firms with Hefty Fine in PHI Breach
Flaws Allow Unlimited Purchases on Apple, Samsung, Google
VP Kamala Harris: US Will Join 80-Nation Cybersecurity Pact
Firm Held Onto Palo Alto VPN Zero-Day for 11 Months
ISMG Editors: How Sustainable Is 'Work From Anywhere'?
NSO's Troubles Extend Beyond CEO-Designate Quitting
Pace of Cybercrime Evolution Is Accelerating, Europol Warns
Using Psychology to Increase Organizational Resiliency
CISA Warns About Siemens, Philips Medical Device Flaws
US Department of Defense to Launch Zero Trust Office
Zoom Patches Multiple Vulnerabilities
Misconfigured FBI Email System Abused to Run Hoax Campaign
Mac Zero-Day Alert: Watering Hole Attacks in the Wild
Russian National Charged With Laundering Ryuk Ransoms
US, Israel Expand Cyber Partnership, Announce Task Force
Researchers Spot Comeback of the Emotet Botnet
India Announces Project to Address Mobile Privacy Concerns
Money Laundering Cryptomixer Services Market to Criminals
Exploring Top Use Cases for Network Detection and Response
Data of 5.9M RedDoorz Customers Leaked in Breach
EU Report Calls for More Health-Specific Incident Response
US DHS Launches New System for Hiring, Retaining Cyber Talent
MosesStaff Attacks Israeli Government, Other Organizations
Profiles in Leadership: TJ Hart, State Street
Episode 1: Detect and Defeat Modern Cyber Attacks
Episode 3: Detect and Defeat Modern Cyber Attacks
Intel Fixes 2 High-Severity Vulnerabilities
Exfiltration Breach, Ransomware Attack Affect 800,000
CISA Leader: 'We've Not Seen a Change' in Ransomware Attacks
How Behavioral Biometrics Can Tackle AML Fraud
Ransomware, Response Dominate Irish Cybercrime Conference
SharkBot Trojan Targets Bank and Cryptocurrency Credentials
US, UK, Australia Issue Alert on Iranian APT Groups
Ohio Hospital Still Struggling One Week After Cyberattack
CISA Issues Incident and Vulnerability Response Playbooks
Ransomware Attackers: 'No Days Off!'
ISMG Editors: Cyberspace Solarium Commission Updates
2 Iranians Charged With 2020 US Election Interference
'The Shared Responsibility That Cyberspace Is'
Malicious Cyberattacks in New Zealand Double in a Year
North Korean APT Group Steps Up Espionage Ops in 2021
Philips, CISA Warn of Medical Device Product Security Flaws
Regulators: Banks Have 36 Hours to Report Cyber Incidents
Youth in $37 Million Crypto Heist; BitConnect Ponzi Payout
Cloud Security: The Need for AWS Backup
Cyber Attacks: The 2022 Predictions
Modern Data Security for a Zero Trust World
Hackers Abusing Glitch Platform to Steal Credentials
Utah Imaging Associates Notify Nearly 584,000 of PHI Hack
More Than Half of Indian Loan Apps Illegal, RBI Panel Finds
NHS Denies Data Was Exposed in Stor-a-File Hack
Report: DeFi Fraud, Theft Exceeds $10 Billion in 2021
Update: GoDaddy Breach Hits Managed WordPress Customers
Cisco Firewall Vulnerabilities Enable Denial of Service
US Cybersecurity Alert: Hackers Won't Respect Thanksgiving
COVID and the Holidays: What You Need to Know
Report: China to Target Encrypted Data as Quantum Advances
Alphabet Soup: Making Sense of XDR, EDR, NDR and SIEM
CERT-In Warns of 4 High-Risk Flaws in Moodle
Apple Sues NSO for Product and Service Abuse
Cryptocrimes Proliferate: Ransomware, New Threat Campaigns
Ransomware: How to Win the Battle
Financial Agencies Eye Existing Laws for Crypto Regulation
Ransomware: Best Practices for Negotiating a Ransom Payment
UK Legislation Seeks Mandatory Security Standards for IoT
Ukraine's Secret Service Busts 5 Alleged 'Phoenix' Hackers
Analytics Based Investigation and Automated Response with AWS + Splunk Security Solutions
The State of Security 2021
Medical Data Exposed in Breach at True Health New Mexico
Hackers Exploit MS Browser Engine Flaw Where Unpatched
The Best Gift for the Holidays? An Incident Response Plan
Denmark CFCS Issues Advisory on Incident Logging
Report: Israel Cuts Cyber Export List to 37 Countries
Making the Case for Centralized IAM Management Control
Pakistan's National Database Biometric Data Compromised
Darknet Markets Advertise Fake COVID-19 Vaccine Passports
Sneaky New Magecart Malware Hides in Cron Jobs
Senate Considering Several Cyber Measures in Annual NDAA
Pfizer Alleges Worker Took COVID Vaccine, Trade Secrets
Forrester Predictions: Rethinking Supply Chain Management
Report: No Patch for Microsoft Privilege Escalation Zero-Day
Why Today's Security Rhetoric is Harmful and Must Change
Japanese Electronics Giant Panasonic Discloses Data Breach
FDA Playbook Aims to Bolster Medical Device Threat Modeling
DNA Test Firm: 2.1 Million Affected by Legacy Database Hack
FBI Seizes Bitcoins From Alleged REvil Ransomware Affiliate
Hackers Abuse Remote Access Tools to Steal Crypto Data
Report: Aberebot-2.0 Hits Banking Apps and Crypto Wallets
Recently Discovered 'EwDoor' Botnet Targets US AT&T Devices
HHS Slaps 5 More Entities in HIPAA 'Right of Access' Disputes
Containing (and Securing) the SaaS App Explosion
Report: APTs Adopting New Phishing Methods to Drop Payload
ISMG Editors: Are We Close to Cracking Cybercrime Ecosystem?
Planned Parenthood LA Data Exfiltrated, 400,000 Affected
Cyber Officials Outline Critical Infrastructure Protections
Incident Response: Best Practices in the Age of Ransomware
Ransomware Operations Double Down on Data Leak Sites
Arrest Points to Ubiquiti Breach Being an Inside Job
Going Inside the Mind of an Ethical Hacker
Deepfakes, Voice Impersonators Used in Vishing-as-a-Service
BIO-ISAC: Beware of Tardigrade Attacks on Biomanufacturers
Microsoft Teams’ New Feature Sparks Security Concerns
TSA Issues New Cybersecurity Requirements for Rail Sector
Researcher: Healthcare Staffing Database Exposed Worker PII
Report: NSO Group Spyware Found on State Department Phones
Alert: 'Cuba' Ransomware Slams Critical Sector Organizations
Missouri Governor's Hack Accusation Loses Steam
Mandiant: SolarWinds Attackers Continue to Innovate
Medical Workers Plead Guilty to PHI Access-Related Crimes
Kafdrop Flaw Puts Data of 'Major Global Players' at Risk
Nearly $200 Million Stolen in BitMart Crypto Exchange Hack
Microsoft Gets Court Order to Disrupt Chinese Cyber Ops
Attack Wipes 25 Years' Worth of Data From Local Electric Co.
Maryland Health Dept. Systems Still Affected by Incident
Hacking the US Government -- Legally