A banking Trojan is on a rampage thanks to its ability to mimic the appearance of more than 400 applications, including leading financial and crypto exchange applications, in 16 countries. Godfather is an upgraded version of the Anubis banking Trojan, reports cybersecurity firm Group-IB.
Chris Inglis intends to step down as head of the Office of the National Cyber Director inside the White House after President Joe Biden approves a new national cybersecurity strategy for critical infrastructure. The strategy will recommend a regulatory approach, a former congressional staffer says.
"Disruptive" is the operative word, and Atefeh "Atti" Riazi uses it to describe the impact digital transformation has had on how we live, work, learn and conduct commerce. Newly hired as CIO of Hearst, she opens up on AI and the power of disruptive technologies to drive new business outcomes.
Thirteen bot farms transmitting pro-Kremlin messages across more than 1.5 million fake accounts are no longer operating after Ukrainian police raided their locations. Russia's attempted conquest of Ukraine is accompanied by heavy doses of online propaganda aimed at splitting support for Kyiv.
Acronis plans to use $250 million raised in July to build out a global network of data centers so service providers can host data locally, CEO Patrick Pulvermueller says. Service providers looking to protect client data have to adhere to an ever-increasing set of compliance and governance rules.
Europe took a key step in formalizing a framework to underpin the trans-Atlantic flow of commercial data but privacy activists say the EU-U.S. agreement won't stand up to a legal challenge. The Commission on Dec. 13 issued a draft adequacy decision on the EU-U.S. Data Privacy Framework.
Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig's Falco open-source threat detection engine to secure their environments. Sysdig CEO Suresh Vasudevan says Falco has become the standard for threat detection in the industry.
Security researchers at Palo Alto Networks say they identified an attempted hack on a large petroleum refining company based inside a NATO member that came from a threat actor known as Gamaredon and Trident Ursa. The Ukrainian government traces the group to a Russian FSB.
Getting acquired by Thoma Bravo for $2.8 billion will help Ping Identity accelerate its transition from on-premises to SaaS-based delivery of identity protection, CEO Andre Durand says. SaaS now accounts for 30% of Ping's business and is growing nearly 70% annually, he says.
An Oklahoma-based provider of administrative and technology services to healthcare organizations is notifying more than 271,000 individuals that their personal information may have been compromised in a hacking incident involving a third-party data storage vendor.
Microsoft upgraded a vulnerability first discovered in September to "critical" after IBM Security researchers discovered attackers could exploit the flaw to remotely execute code. The latest code execution bug has a broader scope and could affect a wider range of Windows systems than EternalBlue.
A phishing campaign against users of a Ukrainian battlefield awareness tool masqueraded as an email from a Ministry of Defense employee telling the users to update their digital certificates, says the Ukrainian Computer Emergency Response Team. The tool, dubbed Delta, is a digital map.
Chinese hackers are exploiting known vulnerabilities in a Citrix networking appliance and virtual private network. The products, Citrix ADC and Gateway, are popular in the healthcare sector. Left unpatched, attackers may execute ransomware attacks or steal intellectual property.
To avoid having to even consider paying a ransom, experts have long urged all organizations to put in place appropriate defenses. Two defensive strategies for healthcare firms are moving backup and recovery to the cloud and practicing incident response scenarios.
Malware analysis and sandboxing solutions traditionally have been bound to operating systems and file types, but file types in the critical infrastructure world are different. Critical infrastructure cannot rely on standard malware analysis tools given the unique operating systems used in the space.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.