Html Sitemap
CISA Launches New Efforts to Secure Open-Source EcosystemIn SOTU, Biden Calls for Ban on AI Voice Impersonations
Russian State Hackers Penetrated Microsoft Code Repositories
UK Lawmakers Reject Privacy Limits for Bulk Data Collection
Microsoft to Make Copilot for Security Generally Available
So, Identity is the New Perimeter. Why is it so Hard to Defend?
Explainer Video: Software Firewalls
White House Advisory Team Backs Cybersecurity Tax Incentives
Some Change Healthcare IT Services Will Be Back by Mid-March
Demo: Microsoft Copilot for Security
ISMG Editors: Our Pledge to You in a New Era of Journalism
Gen AI: Navigating Insider Risks to Data
Transforming Cyber With AI: Insights From Microsoft Experts
Hackers Compromised Ivanti Devices Used by CISA
Sam Altman Reinstated to OpenAI Board
Critical Considerations for AI Developments in Healthcare
UK Conservatives Say 'No' to Cyber Insurance Backstop
Italian Data Regulator Launches Probe Into OpenAI's Sora
After Microsoft Suffers Mega-Breach, What Can Customers Do?
Broadcom Axes Carbon Black Sale, to Merge Unit With Symantec
US Federal Budget Proposes $27.5B for Cybersecurity
Dropbox Used in Latest Exploit for Phishing Attacks
CISA Lacks Staff With Skills Needed to Safeguard OT
Getting Down to the Roots of First-Party Fraud
DARPA Picks 7 Small Businesses for AI Cyber Challenge
Ransomware Talent Surges to Akira After LockBit's Demise
Advanced Tech Fuels Authoritarian Threats, US Intel Warns
Spanish High Court Upholds Temporary Worldcoin Ban
Chinese Cybercrime: Discretion Is the Better Part of Valor
Canada Sentences LockBit Hacker Mikhail Vasiliev to 4 Years
Schneider Electric and Mitsubishi Give Nozomi Networks $100M
Experts Say CISA's Software Attestation Form Lacks Key Parts
EU Parliament Approves the Artificial Intelligence Act
Cloud Network Security With Agility and Scale on a Platform
Hackers Hiding Keylogger, RAT Malware in SVG Image Files
Feds Launch Investigation Into Change Healthcare Attack
Ready to Do Business With Machine Customers?
Cryptohack Roundup: Crypto Losses Mount as Phishing Rages
Beyond DLP: Embracing the New Necessities of Data Security
As Attackers Refine Tactics, 'Speed Matters,' Experts Warn
Breach Roundup: US FCC Authorizes IoT Cybersecurity Label
UK Council's Vision: Set High Standards in Cybersecurity
Experts Say Chinese Safes Pose Risks to US National Security
Researchers Uncover Vulnerabilities in ChatGPT Plug-Ins
Zscaler Expands AI Security Capabilities by Acquiring Avalor
QNAP Systems Patches Critical Vulnerability
ISMG Editors: Inside the Politics of US Cybersecurity
Memory Safety by Design: How Emerging Hardware Blocks Bugs
Pressure Mounts on Meta to Scrap 'Pay or OK' Model in EU
AI-Led Edge Computing Spends to Reach $350B Soon
Pentagon Appoints New Chief Artificial Intelligence Officer
Illicit Credentials Marketplace Admin Gets 42-Month Sentence
TMChecker Tool Lowers Barrier for Malicious Hacking
Know Your Business Context Before Trying Microsegmentation
AWS Snags Skyhigh's Gee Rittenhouse to Run Security Business
UK NCSC Publishes Guidance on Migrating SCADA to the Cloud
Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack
IMF Investigating Cyber Incident Affecting Email Accounts
BigID Raises $60M, Eyes M&A Around Data Security, Compliance
Ransomware Hackers May Be Exploiting Aiohttp Library Bug
Erosion of Trust Most Concerning Threat to UK Elections
DHS Will Use AI to Investigate Sex Traffickers, Drug Dealers
Cosmos Full Show
After 70M Individuals' Data Leaks, AT&T Denies Being Source
Airbus Backtracks From Planned Atos Cybersecurity Takeover
Fake Firms Flourish as Fraudsters Focus on B2C Scams
Tracker Backtrack? Feds Revise HIPAA Guidance on Web Tools
US Expands Global Coalition on Commercial Spyware Misuse
Trend Micro Spots Possible iSoon Campaign
US SEC Charges Two Investment Advisers With AI Washing
Quantum Computing: A New Dawn for Encryption Vulnerabilities
Navigating the Nuances of Cloud Concentration Risks
Cybersecurity in the UK: Government Sees Improvements Slow
Tactics for Battling Attacks by Russia's Midnight Blizzard
US CISA Urges Preventative Actions Against Volt Typhoon
OnDemand | A Hacker's Guide to Ransomware Mitigation and Recovery
OnDemand | Lighting the Way to Readiness and Mitigation
OnDemand | CTOs on Security
Email Bomb Attacks: Filling Up Inboxes and Servers Near You
US Sanctions 'Key Actors' in Russian Disinformation Campaign
US House Passes Bill Curbing Data Sales to Foreign Foes
Experts Warn of Cyber Risk Due to Rapid AI Tool Evolution
Water Sector Lacks Support to Meet White House Cyber Demands
Breach Roundup: Flipper Pushes Back on Proposed Canada Ban
Proof of Concept: Opening Up the AI 'Black Box'
Synopsys Greenlights Sale of $525M Application Security Unit
Revenue Cycle Firm Settles GitHub PHI Breach Lawsuit for $7M
Denial-of-Service Attack Could Put Servers in Perpetual Loop
Skyhigh Brings on Cloudera, Splunk Vet Vishal Rao as New CEO
Cryptohack Roundup: Ray Eviscerates Bankman-Fried
UN Adopts US-Led International AI Safety Resolution
AI Is Making Payment Fraud Better, Faster and Easier
UK Official: AI in Defense Sector Is Not About Killer Robots
Apple Sued for Prioritizing Market Dominance Over Security
Identity Security Clinic
ISMG Editors: How Will the Quantum Era Reshape Cybersecurity?
Biden's Economic Team Warns of AI Risks and Job Displacement
Likely Chinese Hacking Contractor Is Quick to Exploit N-Days
Nursing Home Declares Bankruptcy, Blames Recent Cyberattacks
GitLab Acquires Oxeye to Bolster SAST in DevSecOps Workflow
Russian Nation-State Hacker Targets German Political Parties
Iranian TA450 Group Tries Out New Tactics on Israelis
Cloud Network Security: The Role of Software Firewalls
Why Endpoint Security Tools Are Still Such a Challenge
US Indicts Accused APT31 Chinese Hackers for Hire
Data Protection Fines: UK Privacy Watchdog Updates Guidance
UK Discloses Chinese Espionage Activities
Report Urges Congress to Form an Armed Cyber Military Branch
Hospitals Lobby Feds to Clarify Breach Duties in UHG Attack
European Commission to Investigate Meta Subscription Model
Alert: Hackers Hit High-Risk Individuals' Personal Accounts
Feds Wave Sticks & Carrots at Health Sector to Bolster Cyber
Anand Oswal on How Talon's Browser Tech Boosts Cyber Defense
iSoon Leak Shows Links to Chinese APT Groups
AI Opens Fraud Detection Gap, Says US Treasury
NTIA Pushes for Independent Audits of AI Systems
On the Increase: Zero-Days Being Exploited in the Wild
CISA Seeks Public Input on Cyber Incident Reporting Rules
Change Healthcare Wake-Up Call: Is Sector Too Codependent?
Tycoon 2FA - The Criminals' Favorite Platform for MFA Theft
Securing SMBs Globally: Coro Raises $100M to Go Into Europe
OMB Issues First Governmentwide AI Risk Mitigation Rules
Hackers Developing Malicious LLMs After WormGPT Falls Flat
UnitedHealth Admits Patient Data Was 'Taken' in Mega Attack
Cryptohack Roundup: Sam Bankman-Fried Gets 25-Year Sentence
OnDemand | 1 in 3 Breaches Go Undetected: Strengthen Your Defense Against Identity Attacks
Breach Roundup: Russian Organizations Losing Microsoft Cloud
Federal Elections Commission Considers Regulating AI
From Despair to Disruption: Zafran Takes on Cyber Mitigation
Using AI to Stop Email Misdelivery and Prevent Data Loss
Alphabet's Plans to Fight Election Misinformation With Jigsaw
UK Nuclear Cleanup Site Faces Criminal Cybersecurity Charges
ISMG Editors: Apple's Antitrust Showdown With the Feds
Feds Warn of Credential Harvesting Threats in Healthcare
Malware Flood Causes PyPI to Temporarily Halt New Accounts
ShadowRay Attack Strikes AI Workloads
DHS Calls Political Campaigns 'Ripe Target' for Cyberattacks
Leaked Dataset Belongs to AT&T Current and Former Customers
The Rising Threat of Fake Business Accounts
Backdoor Found and Defused in Widely Used Linux Utility XZ
DinodasRAT Backdoor Targeting Linux Machines Worldwide
Feds Tackling Information Security in Government Procurement
Netskope CEO on What Platformization Means for Cybersecurity
Biden, Xi Discuss Key Security Concerns in Bilateral Call
How AI Helps Assess Credit Risk, Navigate Complex Processes
Feds Ask Telcos: How Are You Combating Location Tracking?
Judge Certifies 'Contract Class' in CareFirst Breach Lawsuit
Google to Delete Incognito Search Data to Seal Lawsuit Deal
Poor Cloud Controls at HHS Put Families, Children at Risk
Rubrik IPO Filing Reveals Sales Acceleration, Growing Losses
Hackers Update Vultur Banking Malware With Remote Controls
Sam Altman Out as OpenAI Startup Fund Owner
Report Slams Microsoft for Security Blunders in Chinese Hack
After Ransomware Hits, County Declares State of Emergency
Feds Hit 2 Nursing Home Firms With 'Right of Access' Fines
Veracode Promotes Brian Roche to CEO, Buys Longbow Security
US and UK Partner to Align on AI Safety and Share Resources
US State Department Investigating Hacking Claims
Google Proposes Method for Stopping Multifactor Runaround
GDPR: Business Constraint or Opportunity?
DevSecOps: The New Imperative for Software Security
Mitigating the Risk Chain in the Decentralized Web
'Many-Shot Jailbreaking' Defeats Gen AI Security Guardrails
Cryptohack Roundup: Thieves Steal Money, Seek Praise
Health Data Thefts Keep Coming; Millions Affected in 2024
New Rules for Shipbuilding Focus on IT/OT Cybersecurity
DOE Looks to Universities to Fix Energy Sector Cybersecurity
Breach Roundup: Omni Hotels Acknowledges Cyber Incident
Microsoft, Okta, CyberArk Lead Workforce Identity Rankings
Phishing Attacks Targeting Political Parties, Germany Warns
Google Fixes Two Pixel Zero-Days Exploited by Forensic Firms
China Is Using AI to Influence Elections, Microsoft Warns
ISMG Editors: Breaking Down OT Cybersecurity Challenges
Application Security: 'Meet Developers Where They Are'
Filipino Hacktivists Destroy Technology Agency Servers
Fortinet and the Power of Convergence on a Single OS
Change Healthcare Attack: Recovery Woes; Lawsuits Pile Up
Hackers Can Use AI Hallucinations to Spread Malware
Sophisticated Latrodectus Malware Linked to 2017 Strain
Cloudflare Enters Observability Space With Baselime Purchase
Vietnamese Threat Actor Targeting Financial Data Across Asia
Police Probe Honeytrap Sexting Scam Targeting British MPs
Israel's 8200 Alumni Association: A Cybersecurity Incubator
RSA Conference 2024 Preview: 'The Art of Possible'
A Second Gang Shakes Down UnitedHealth Group for Ransom
Open-Source Foundations Join Forces on Digital Supply Chain
What Cisco's Purchase of Splunk Means for Cybersecurity, AI
US EPA Investigates Alleged Data Breach by Government Hacker
Hugging Face Vulnerabilities Highlight AI-as-a-Service Risks
Meta Will Label AI-Generated Content Starting in May
Aged D-Link NAS Devices Are Being Exploited by Hackers
Firm Says Medicare Info Obtained From DOJ Breached in Attack
Cyera Gets $300M at $1.4B Valuation to Fuel Safe AI Adoption
US Bipartisan Privacy Bill Contains Cybersecurity Mandates
Russia Tops Global Cybercrime Index, New Study Reveals
Should We Just Accept the Lies We Get From AI Chatbots?
Silent Surge: The Sudden Rise in Synthetic Business Fraud
Nearly 534,000 Affected in Data Theft at Managed Care Org
US CISA Aims to Expand Automated Malware Analysis Support
Cybercrime Group Uses Likely AI Script to Load Info Stealer
Wiz Buys Startup Gem Security for $350M to Spot Cloud Issues
Half of UK Firms, Charities Failed to Report Cyber Incidents
Cryptohack Roundup: Google Sues Alleged Crypto App Crooks
CISA Warns Russian Microsoft Hackers Targeted Federal Emails
Breach Roundup: Sisense Supply Chain Attack
Change Healthcare Attack 'Devastating' to Doc Practices
Zscaler Buys Airgap Networks to Fuel Segmentation in IoT, OT
Raspberry Robin Morphs, Now Spreads via Windows Script Files
FBI Calls for Increased Funding to Counter Cyberthreats
ISMG Editors: Unpacking the Change Healthcare Attack Saga
American Privacy Rights Bill: Implications for Health Sector
Cloned Voice Tech Is Coming for Bank Accounts
US Cyber Command Expanded 'Hunt Forward' Operations in 2023
PE Firm Accuses Synopsys of Breaching Exclusivity Agreement
UK Markets Authority Warns of AI Market Capture by Big Tech
Iran Launches Wave of Retaliatory Strikes at Israel
Zero Trust Adoption: Where Are Enterprises Today?
Kimsuky Uses Permissive DMARC Policies to Spoof Emails
Commvault Buys Appranix to Make Ransomware Recovery Quicker
New Foundation Sees Mental Health Tied to Cyber Resilience
Sam Bankman-Fried, Fraud and the Future of Crypto
Law Firm to Pay $8M to Settle Health Data Hack Lawsuit
Sisense Breach Highlights Rise in Major Supply Chain Attacks
FTC Bans Online Mental Health Firm From Sharing Certain Data
Likely State Hackers Exploiting Palo Alto Firewall Zero-Day
After XZ Utils, More Open-Source Maintainers Under Attack
College Students Help Boost Cybersecurity With Free Clinics
New Tool Aims to Simplify and Streamline SBOM Adoption
Steganography Campaign Targets Global Enterprises
The Global Menace of the Russian Sandworm Hacking Team
Congress Asks What Went Wrong in Change Healthcare Attack
Windows 11 Adoption Is Slow Despite Windows 10 Security Risk
Likely Sandworm Hackers Using Novel Backdoor Kapeka
As NSA Pushes for Microsegmentation, Will Others Follow?
Free Ransomware: LockBit Knockoffs and Imposters Proliferate
Exploited TP-Link Vulnerability Spawns Botnet Threats
Key Lawmaker Heralds 'Landmark' Draft Federal Privacy Bill
Hack on Clinic Serving Homeless Is Latest Hit to Underserved
Armis Buys Cyber Remediation Startup Silk Security for $150M
Possible Chinese Hackers Use OpenMetadata to Cryptomine
EU Data Regulator Threatens Meta's 'Pay or Okay' Model
Company Says Change Healthcare Hackers Stole Sensitive Data
Cryptohack Roundup: First Conviction in Smart Contract Hack
Jury Dishes Out Guilty Verdict in Mango Markets Fraud Case
Dark Web Sales Driving Major Rise in Credential Attacks
Hacking the Floodgates: US Dams Face Growing Cyber Threats
Breach Roundup: LabHost Phishing-as-a-Service Site Goes Down
Novel Android Malware Targets South Korean Banking Users
Rising Ransomware Issue: English-Speaking Western Affiliates
ISMG Editors: Global Fallout From Leaked LockBit Ransomware
Suspected Attack Shuts Down US Blood Plasma Donation Centers
FIN7 Targeted US Automotive Giant In Failed Attack
Mitre Says Hackers Breached Unclassified R&D Network
CEO Andre Durand on Why Ping, ForgeRock Are Better Together
Hacker Threatens to Expose Sensitive World-Check Database
UK ICO Weighs Role of 'Accuracy' in Generative AI
Can Generative AI Help With Quicker Threat Detection?
7 Tips for Complying With Healthcare Fraud Regulations
Multifactor Authentication Bypass Attacks: Top Defenses
Olympians Tout AI in Sports
Feds Issue Guide for Change Health Breach Reporting Duties
Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities
HHS Beefs Up Privacy Protection for Reproductive Health Info
Report: Russian Hackers Targeting Ukrainian Soldiers on Apps
State Hackers' New Frontier: Network Edge Devices
UnitedHealth Group Previews Massive Change Healthcare Breach
Change Health Attack: Details Emerge; Breach Will Top Record
US Pressures Iran Over Phishing Campaign Against Feds
KnowBe4 Buys Egress to Aid Awareness Training, Email Defense
Russian Hackers Exploiting Windows Print Spooler Vuln
Ukrainian Energy Sector Under Cyber Siege by Russian Hackers
Tines Raises $50M to Boost Enterprise-Focused AI Technology
AI Voice Cloning Pushes 91% of Banks to Rethink Verification
AI Is Sexist, Racist and Homophobic
Cisco Fixes Firewall 0-Days After Likely Nation-State Hack
Login.gov to Test Facial Recognition Under New Leadership
ThreatLocker Gets $115M to Fuel Zero Trust Defense, Eyes IPO
Researcher Strips ROM for Binary Code
The Peril of Badly Secured Network Edge Devices
Nagomi Exits Stealth With $30M to Help Manage Security Risks
Breach Roundup: Cloud Error Reveals DPRK Sanctions Busting
Cryptohack Roundup: Samourai Mixer Takedown
Judge Advises Dismissal of CommonSpirit Breach Lawsuit
Kaiser Permanente Notifying 13.4 Million of Tracker Breach
Microsoft Questioned by German Lawmakers About Russian Hack
AI Summit: Fortifying Cyber Defense Amid Privacy Challenges
Health Analytics Firm Reports Breach Affecting 1.1 Million
Thoma Bravo to Buy Cybersecurity AI Firm Darktrace for $5.3B
2024 Technical Trends: How Search and Generative AI Technologies Are Evolving
Best Practices for Log Management and Improving Problem Resolution
Observability Trends: Key Considerations for Modern Observability
5 Ways to Maximize Logging Data
Tech Titans, AI Leaders Join New Federal AI Security Board
State AGs, Industry Groups Urge Action in Change Health Saga
CyberEdBoard Profiles in Leadership: Tom Remberg
Rubrik Execs on How Going Public Will Drive More Innovation
FTC Finalizes Health Breach Notification Rule Update
How the Enterprise Browser Has Reshaped the Modern Workplace
Microsoft Releases New-Open Source Tool for OT Security
Are Enterprises Overconfident About Cybersecurity Readiness?
Secure by Design: UK Enforces IoT Device Cybersecurity Rules
French Government Bids on Atos' Cyber and Computing Assets
Pyongyang Hackers Deploy Backdoors Via Fake Job Interviews
Forescout CEO on Navigating OT, IoT Threats in Cybersecurity
FCC Fines US Cell Carriers $200M for Selling Location Data
The Good, The Bad, and The Ugly of AI/ML Tools at Work
Former Binance CEO Changpeng Zhao Sentenced to Four Months
Finnish Hacker Kivimaki Found Guilty in Vastaamo Hack
New Payment Rails to Rely on RFP for More Security
UnitedHealth CEO: Paying Ransom Was 'Hardest Decision' Ever
Tracking Data Breaches: Targeting of Vulnerabilities Surges
Verizon Breach Report: Vulnerability Hacks Tripled in 2023
Patched Deserialization Flaw in Siemens Product Allows RCE
DHS: AI-Enhanced Nuclear and Chemical Threats Are Risk to US
Island Gets $175M Series D Funding, Doubles Valuation to $3B
ChatGPT: Fortifying Data Security in the AI App-ocalypse
Qantas Airways Says App Showed Customers Each Other's Data
Lawmakers Grill UnitedHealth CEO on Change Healthcare Attack
Verizon DBIR: Cyber Defenders Are Facing Exploit Fatigue
GitLab Hackers Use 'Forgot Your Password' to Hijack Accounts
Corelight Gets $150M to Expand Detection, Improve Workflows
US and Allies Issue Cyber Alert on Threats to OT Systems
Dropbox Sees Breach of Legally Binding E-Signature Service
Managed Service Provider Denies Being Source of Breach
Cryptohack Roundup: Geosyn Fraud Lawsuit
Veracode CEO on Mastering Application Security in the AI Era
Experts Say White House Memo Overlooks Space Cyber Risks
Breach Roundup: REvil Hacker Gets Nearly 14-Year Sentence
Permira Takes Majority Stake in BioCatch at $1.3B Valuation
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits
Critical Flaw in R Language Poses Supply Chain Risk
Russian GRU Hackers Compromised German, Czech Targets
New Botnet 'Goldoon' Targets D-Link Devices
ISMG Editors: RSA Conference 2024 Preview
New Report Exposes Iranian Hacking Group's Media Masquerade
How Intel 471's Buy of Cyborg Is Reshaping Threat Hunting
How Modern Businesses Are Cutting Costs and Boosting Efficiency With the Enterprise Browser
Achieving Simplicity, Scale, and Security With Google Cloud NGFW Enterprise - Powered by Palo Alto Networks
NIST CSF 2.0 and the State of Cybersecurity
Outrunning the Bear: Cybersecurity in the AI Era
Why Cyberthreats in Ad Tech Mirror Traditional Enterprises
Critical Infrastructure Under Cyber Siege: How to Respond
The Uphill Battle for Cybersecurity Accountability
Platform or Point Solutions? AI May Be Tipping the Scales
Next-Generation Identity Platforms to See Sizeable Adoption
The World’s Most Secure Commercial PC and Holistic Security Services From Dell
Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools
Securing the Enterprise Browser
AI, Disinformation and Vendor Consolidation
Embracing a Unified Identity-Centered Zero Trust Approach
Scripting Winning AI Strategies
The Crossroads of AI and Application Security
Don't Silo Cyber Risk to CISOs, Says Former Financial CISO
AI-Driven Cyberthreats and Remote Work Challenges
The Cost of Cybersecurity in Digital Payments Space
The Shift to Continuous AI Model Security and Pen Testing
The Growing Threat of Advanced Ransomware Attacks
Combating Pig-Butchering Scams With a Unified Approach
Integrating AI Into Cybersecurity Systems
How SASE Is Evolving as the Workforce Remains Remote
State of Security: Are We Moving Forward or Standing Still?
Preparing the Cyber Workforce of the Future
Organizations Hard-Pressed to Run Multiple Security Tools
CyberEdBoard Profiles in Leadership: Vaughn Hazen
Rethinking Browser Security: From Risk to Asset
Advanced Tech Drives Dutch Police's Cybercrime Crackdown
The Dual Role of AI in Cybersecurity
Adapting Data Security for the Modern Cloud Era
Nonhuman Identity Management Revolution
Assess the Security of Code in All Supply Chain Components
Double-Click on Risk-Based Cybersecurity
CyberEdBoard Talks: Implementing Federal Cyber Mandates
The Blurring Personal-Professional Executive Risks of a CISO
Building Your OT Security Business Case
Applying Human Risk Management for Better Security Awareness
AI and Cybersecurity: Transforming Digital Defense
Why the Future of Security Is Identity
Supercharge Security With AI
CyberEdBoard Talks: Balancing Security and Compliance
CyberEdBoard Profiles in Leadership: Joe Sullivan
Revamping Cybersecurity: Innovative Approaches by Startups
Thales' Strategic Move to Enhance Data Security
82% Leaders Find It Essential to Secure AI; Only 24% Do It
Facing the Complexity of Unified Identity, Third-Party Risk
Make Way for the Intelligent SOC
How Elastic Is Changing the SIEM Game With AI Solutions
The Role of Identity in Network Security
Insider Risk in the Generative AI Era
Why AI Is the Best Defense Against AI-Enabled Fraud Attacks
Lessons From Change Healthcare and System Interoperability
Safeguarding the Internet With 'Common Good Cyber' Initiative
How Investors Boost Cybersecurity Across Portfolio Companies
Inside KnowBe4's Acquisition of Egress
How the Enterprise Browser Marries IT and Security
At-Bay: InsurSec Can Bridge SMB Cybersecurity Gap
Overcoming Frustration With Network Security
Is Cyberstorage the New Paradigm for Data Security?
How to Increase Cyber Resilience With Continuous Testing, AI
Addressing CISOs' Concerns About Generative AI Security
Women in Cybersecurity: Light at the End of the Tunnel?
Fighting Back Against Double Extortion and Data Exfiltration
Challenges in Adopting Post-Quantum Cryptography
Going All-In With AI at Zscaler to Raise the Bar in Cyber
Make Zero Trust Happen
Securing Attack Surfaces With Cyber-Aware Machine Learning
The Challenges in Protecting Healthcare Data, Resiliency
Cybersecurity Integration a Must, Post-M&A Imperative
Transform Traditional Security Models With AI-Integrated SOC
Offensive Security: Lose That Loser's Mindset
From CNAPP to CDR: The Cybersecurity Road Ahead
Effective Operational Technology Security? Embrace Response
Securing AI's Role in Modern Business
Ransomware Defense Strategies: Never Trust a Criminal
Top CISO Gen AI Challenges: Employee Use, Red Team Testing
Cybersecurity Startup Ecosystem: A VC's Perspective
CISA Wants Everyday Americans to Help 'Secure Our World'
Post-Quantum Cryptography Key to Ensuring Digital Trust
How Automation Can Help Address Growing Network Demands
Managed Security Service Provider Needs in the SMB Market
What Are the Barriers to Fraud and Cyber Team Integration?
Rising Cybersecurity Threats: Focus on Identity Protection
Can Browser-Native Security Stop Web Attacks?
Maximizing ROI Through Strategic Cybersecurity Investments
Rethinking Cybersecurity Investment Amid Rising Threats
LevelBlue Leverages AI for Threat Intel Following AT&T Split
The Evolution of GRC: Then and Now
Cyber and Financial Crime, Through the FBI Lens
AI Bias: The Emerging Threat to Sound Business Decisions
The Need to Embed AI in Cybersecurity Frameworks
The Operationalization of Threat Intelligence Programs
Over 80% Digital Trust Professionals Want AI Training by 2026
Future-Proofing Cybersecurity With Data-Centric Approaches
The AI Standoff: Attackers Versus Defenders
The Role of AI in Cloud Application Security
The Convergence of Policy and Technology in Cybersecurity
The OT Security Revolution and the Need for Robust Defenses
AI and Passwordless Systems: The New Era in Cybersecurity
SMBs Now See Privileged Access Management Working for Them
AI in Cybersecurity Investing: Opportunities and Risks
Operation Cronos Again Threatens to Reveal LockBitSupp
Strengthening Cyber Resilience: Tackling Threats and Gaps
The Cyber Risks for Businesses in an Election Year
Microsoft Overhauls Security Practices After Major Breaches
ISMG Editors: Opening Day Overview of RSA Conference 2024
LockBitSupp's Identity Revealed: Dmitry Yuryevich Khoroshev
Boosting US Tech Leadership: Antony Blinken's Agenda at RSAC
How HHS OCR Is Boosting HIPAA Enforcement; Here Come Audits
CyberEdBoard Profiles in Leadership: Nicole Darden Ford
Suspected Chinese Hackers Hacked UK Defense Contractor
Earning Customer Trust Through Experience: Shielding Against Threats
Demystifying Data Sovereignty: Navigating Privacy Compliance in a Global Context
Ransomware Attack Shuts Down Kansas City Systems
ISMG Editors: Day 1 Highlights at RSA Conference 2024
Report: US Cybersecurity Makes Major Gains Amid New Threats
A New Paradigm for the Modern SOC
Hacking of DocGo Ambulance Service Exposes Patient Data
CISA Directors Talk Geopolitical Threats, Election Security
Report: Undetectable Threats Found in F5's Central Manager
Keyfactor & Devo RSAC CISO Panel Discussion
UK Regulator Tells Platforms to 'Tame Toxic Algorithms'
ISMG Editors: Day 2 Highlights at RSA Conference 2024
Synthetic ID Fraud Rises 98% in Auto Lending Industry
Breach Roundup: LockBit Claims Wichita Attack
Technology Giants Join CISA's Secure by Design Pledge
Ascension Responding to Cyberattack Affecting Clinical Care
Cryptohack Roundup: BTC-e's Alex Vinnik Pleads Guilty
Tech Giants Cater to Government With AI Tools
ISMG Editors: Day 3 Highlights at RSA Conference 2024
Cloud Computing Is Evolving - With a Little Help From AI
State of Software Security: Has It Moved Past Unacceptable?
Solving the Fractured Data Problem in Exposure Management
Ascension Diverts Emergency Patients, Postpones Care
Hackers Steal Credit Card Data of Deal-Seeking Shoppers
Focusing on Cyber Resilience, Not Just Security
ISMG Editors: RSA Conference 2024 Wrap-Up
US and China to Hold Discussions on AI Risks and Security
Cinterion IoT Cellular Modules Vulnerable to SMS Compromise
Human Risk Crisis: 8% of Employees Cause 80% of Incidents
Cyber Insurers Embrace Cloud Metrics, Prepare for AI Impact
Defenders' Dilemma: Can AI Bolster Cyber Resilience?
Not Just MOVEit: 2023 Was a Banner Year for Zero-Days
Palo Alto Networks, Google Partner on New AI Initiative
Feds, Groups Warn Health Sector of Black Basta Threats
FortiGuard Labs Global Threat Landscape Report: The Latest
Experts Warn the NVD Backlog Is Reaching a Breaking Point
How 'Radical Transparency' Can Bolster Cybersecurity
Cyber Insurers Pledge to Help Reduce Ransom Payments
SMBs Face Growing Threat of Triangulation Fraud
How Generative AI Is Transforming Readers' Experiences
Securing APIs: Akamai's Acquisition Strategy
AI Is an Expert Liar
How AI Is Reshaping the Startup Landscape in Cybersecurity
Elevating Application Security With AI Insights
Tornado Cash Developer Sentenced to 5 Years in Prison
How AI Is Transforming Cybersecurity Models and Practices
UK, US Officials Warn About Chinese Cyberthreat
AI, AI, AI: Opportunities, Implementations and an AISIRT
Governance, Privacy and Ethics in the Age of AI
Impact of Ascension's Cyberattack IT Outage Varies by Region
Growing Influence of Hyperscalers in Cybersecurity Markets
Microsoft Patches Zero-Day Exploited by Qakbot
Using AI at Scale Makes Data an Even More Critical Asset
Enterprises’ Biggest Obstacles to Maintaining Cyber Resiliency in 2024
Building Better Security Operations Centers With AI/ML
Human-Powered Security in the Era of Rapid Automation
Transforming Your Cyber Defense Strategies With AI
AI and IoT Synergy for Enhancing Cybersecurity
How Integrated Security Platforms Are Redefining Defense
A Human-Centric Security Approach, Supported by AI
Enhancing Code Security With the Developer Trust Score
The Role of Automation, Mini Platforms and Cyber Investments
Threat Versus Risk: Rethinking Cybersecurity Fundamentals
CyberEdBoard Profiles in Leadership: Tiauna Ross
FBI Seizes Criminal Site BreachForums
RSAC Cryptographers' Panel Tackles AI, Post-Quantum, Privacy
UK NCSC Launches New Hacking Alert System for Politicians
Report: 11 Vulnerabilities Found in GE Ultrasound Devices
EU and US Advance Bilateral Talks on AI, Cybersecurity
SIEM Stalwart LogRhythm to Merge With Exabeam
Bipartisan Senators Endorse $32M Annually for AI Research
Companies Adopting Automation See 95% Boost in Some Metrics
Outsmarting Adversaries: Using AI for Security
AI on the Agenda for CIOs
How to Prevent Attacks that Bypass MFA
Identity Systems: Attackers' Keys to the Kingdom
CyberEdBoard Profiles in Leadership: Alexander Antukh
SEC Regulations Demand Greater Transparency in OT Security
Network Security in the Era of Cloud and AI
The Rise of Memory-Safe Languages in Secure Development
Breach Roundup: Kimsuky Serves Linux Trojan
White House Unveils AI Safety Framework for US Workers
Judge Denies Class Certification in Blackbaud Hack Lawsuit
US FBI Busts North Korean IT Worker Employment Scams
Cryptohack Roundup: Thieves Steal $45M; Hacker Returns $71M
Australia Investigating Large-Scale Medical Billing Hack
Palo Alto to Acquire IBM QRadar SIEM Business
UK Government Publishes AI Cybersecurity Guidance
Using AI in City Services: The Privacy Conundrum
AI Will Give You an Answer, But It May Be Completely Wrong
Key Considerations for Adopting Large Language Models
The Nexus of Privacy, AI Governance and Data Management
SEC Cyber Risk Disclosures: What Companies Need to Know
Attack Surface Management Automation: Missteps and Solutions
Top US Cyber Defense Official Eric Goldstein to Step Down
Hackers Target US AI Experts With Customized RAT
Health Plan Services Firm Notifying 2.4 Million of PHI Theft
US SEC Approves Wall Street Data Breach Reporting Regs
The Future of Zero Trust and SASE is Now
ISMG Editors: Why Synthetic ID Fraud Is on the Rise
CyberArk to Secure Machine Identities with $1.54B Venafi Buy
Grandoreiro Banking Trojan Reappears After January Takedown
Cybersecurity workforce development: A Public/Private Partnership that enhances cybersecurity while giving hands-on SOC experience to students
Intel's Max Severity Flaw Affects AI Model Compressor Users
APT Hacks and AI-Altered Leaks Pose Biggest Election Threats
Feds Say $100M Dark Web Drug Kingpin Arrested at JFK Airport
HHS Funds $50M to Spot, Patch Hospital Vulnerabilities
HHS Warns Health Sector of Business Email Compromise Scams
FCC Targets BGP Vulnerabilities with New Security Mandates
Nikesh Arora on Why Palo Alto Networks Is Buying IBM QRadar
Fortifying Cyber Resilience in Manufacturing
Kevin Mandia Exits Mandiant CEO Role After Google Purchase
Building Security from Within: Empowering Software Teams for Resilience
100 Groups Urge Feds to Put UHG on Hook for Breach Notices
Google Urges Feds to Ditch Microsoft Over Security Concerns
CISA: NextGen Healthcare Flaw Still Exploited After 7 Months
Snapchat Revises AI Privacy Policy Following UK ICO Probe
Unfading Sea Haze APT Targeting South China Sea Governments
Chinese Cyberespionage Groups Tied to ORB Network Attacks
Generative AI: A Game Changer for Blue Teams
Proof of Concept: Ensuring AI Compliance, Security Controls
EPA Cracks Down on US Water System Cybersecurity Violations
Pakistani-Aligned APT36 Targets Indian Defense Organizations
LockBit Demands $25M Ransom From Canadian Drug Store Chain
Rockwell Automation Says to Disconnect ICS From the Internet
Microsoft's Recall Stokes Security and Privacy Concerns
OpenText Boosts MDR Offering for MSPs With Pillr Acquisition
Anyone Can Trick AI Bots Into Spilling Passwords
Proactive Defense Dominates Discussions at ISMG Fraud Summit
Active Chinese Cyberespionage Campaign Rifling Email Servers
Fighting Fraud and Financial Crime: Survey Results, Analysis
OnDemand: 2024 Google Cloud Partner of the Year - Application and Infrastructure Security
Breach Roundup: Fluent Bit Flaw Is Risky for Cloud Providers
Top 10 Biggest Security Threats to Your Products
Air-Ground Ambulance Firm Tells 858,000 of Hack 1 Year Ago
Cryptohack Roundup: $206M Gala Games Exploit
Bugcrowd Buys Informer to Enhance Attack Surface Management
The Aspen Institute's Jeff Greene Is Headed to CISA
Cyber Risk in 2024: Combating Third-Party Risk
How Major Acquisitions Are Transforming Security Operations
Courtroom Recording Software Hit by Supply Chain Attack
Australian Telecom Watchdog Sues Optus Over 2022 Data Breach
ShrinkLocker Ransomware Exploits Microsoft's BitLocker
LockBit Publishes Data Stolen in London Drugs Attack
AI-as-a-Service Platform Patches Critical RCE Vulnerability
ISMG Editors: UnitedHealth Group's HIPAA Breach Fallout
Bitsight, SecurityScorecard, Panorays Lead Risk Ratings Tech
EU Commission and Microsoft Appeal EDPS Office 365 Decision
M-Trends 2024: By the Numbers of Today's Top Cyber Threats & Attacker Operations
Surveillance Risk: Apple's Wi-Fi-Based Positioning System
Court Orders Optus to Release Data Breach Report to Lawyers
Don't Expect Cybersecurity 'Magic' From GPT-4o, Experts Warn
Check Point Issues Emergency Patch for Security Gateways
How Secure and Reliable Are Your Data Backups?
Industrial Integrity: Manufacturing and OT Security Practices for Cross-Industry Applications
OpenAI Sets Up New Security Oversight Team
US Sanctions Chinese National for Running 911 S5 Botnet
Are You Prepared to Mitigate Risk Associated with Distributed Hybrid and Multi-Cloud Enviornments?
Union Demands Patient Safety Fixes in Ascension Cyber Outage
Microsoft Warns of North Korea's 'Moonstone Sleet'
Transcend Gets $40M to Advance Privacy Tech for Enterprises
UK Government Urged to Publish Guidance for Electoral AI
Financial Sector Embraces Identity-Centric Authentication
FBI Says It Dismantled 'Likely the World's Largest Botnet'
Cyber Psychological Warfare: Hacking Operational Technology
AI vs AI: Fighting Deepfakes With Biometric Authentication
Flaw in TP-Link Gaming Router Allows Remote Attacks
Rx Benefits Firm Notifying 2.8 Million of Data Theft Hack
US Army Unveils $1B Modern Software Development Initiative
Australian Industries Need OT-IT Convergence to Beat Attacks
EU's New AI Office Is Set to Begin Operating in June
OnDemand I Cloud NGFW Enterprise Advanced Networking Security
OnDemand I Effortless Simplicity & Unmatched Scalability With Google Cloud NGFW Enterprise, Powered by Palo Alto Networks
European Police Take Down Botnet Servers, Make Arrests
Stolen Ticketmaster Data Advertised on Rebooted BreachForums
Cloudflare Buys BastionZero to Guard Critical Infrastructure
NIST Unveils Plan to Restore National Vulnerability Database
Breach Roundup: Google AI Blunders Go Viral
Cryptohack Roundup: FTX Paid Off Whistleblowers
Hospital Allegedly Skirting Ransomware Death Suit Settlement
Internet-Exposed OT Devices at Risk Amid Israel-Hamas War
RedTail Cryptomining Malware Exploits PAN-OS Vulnerability
Dell PowerStore 4.0 Launch
Robust Incident Management for Critical Infrastructure
Overcoming Regulatory Challenges in Renewable Energy
Building Cyber Resilience With Real-Time Attack Simulations
Why Critical Infrastructure Requires Proactive OT Defense
Yet More Evidence Highlights Ransomware Groups' Banner Year
Experts Warn of Security Risks in Grid Modernization
First-Party Fraud's Big Comeback in Banking and Lending
ISMG Editors: Is SASE Living Up to the Hype in 2024?
Hacker Sells Apparent Santander Bank Customer Data
Senator Urges FTC, SEC to Investigate UHG's Cyberattack
New Logpoint CEO Mikkel Drucker Seeks Growth Via M&A, MSSPs
OpenAI Disrupts AI-Deployed Influence Operations
Introduction to Elastic Security: Modernizing security operations
Bridging the IT-OT Cultural Gap
Bridging the Gap: Cybersecurity Workforce Development
Securing Oil and Gas: Legacy Systems and Modern Threats
Building Robust Cybersecurity Program for OT Environments
Snowflake Clients Targeted With Credential Attacks
Phishing Kit Targets European Banks, Bypasses MFA
Feds Say Change Healthcare Can Handle Breach Notification
Scaling Threat Intel, Consulting: Mandiant's Way With Google
AI in Elections: Manipulating Voters With Easy Voice Cloning
Overcoming Cloud Security Concerns With a Unified Platform
Lawmakers Urge Pentagon to Diversify Cybersecurity Vendors
Russian Cyberthreat Looms Over Paris Olympics
Building Effective OT Security Strategies
How Cyber Florida Strengthens State's Cyber Resilience
Hackers Claim They Breached Australian Logistics Company
Cox Communications Patches Newly Discovered Critical API Bug
UK Vendor's Attack Disrupts Care at London NHS Hospitals
Chinese South China Sea Cyberespionage Campaign Unearthed
George Kurtz: CrowdStrike Falcon Driving Cyber Consolidation
Australian Mining Giant Confirms BianLian Ransomware Attack
Safeguarding Election Integrity in the Digital Age
How Enterprise Browsers Enhance Security and Efficiency
Enhancing Security With a Fit-for-Purpose Enterprise Browser
Demystifying AI/ML for SecOps | OnDemand Webinar
Feds Issue Alerts for Flaws in 2 Baxter Medical Devices
UK Official Touts CHERI for Memory-Safe Computing
ONCD Urges Congress to Harmonize Cybersecurity Regulations
SecurityScorecard Accuses Vendor of Stealing Trade Secrets
ISMG Editors: Opening Day Overview of InfoSec Europe 2024
Zyxel Releases Emergency Security Update for NAS Devices
What Makes Healthcare a Prime Target for Ransomware?
From Reactive to Proactive Threat Hunting
Cybersecurity Deserves the Proverbial Seat at the Table
How CISSP Certification Helps CISOs Secure Digital Business
CyberEdBoard Profiles in Leadership: Ian Thornton-Trump
Rethinking Cybersecurity: The Role of MSSPs
Microsoft Says Azure Cloud Attack Scenario Isn't a Flaw
Breach Roundup: Microsoft Deprecates NTLM Authentication
Senator Demands That HHS Ratchet Up Health Sector Cyber Regs
Cryptohack Roundup: Robinhood to Acquire Bitstamp
US Regulators Intensify Antitrust Scrutiny of AI Developers
Wiz Counters Orca Security's Patent Infringement Allegations
Renewed Info Stealer Campaign Targets Ukrainian Military
Meta's AI Model Training Comes Under European Scrutiny
The Future of Digital Security by Design
Balancing AI Innovation With Data Privacy and Security
CyberEdBoard Profiles in Leadership: Jez Reichmann
Taking a Closer Look at AI Governance and Cybersecurity
Tenable Boosts Data, Cloud Security With Eureka Acquisition
Protecting Data From Cybercriminals - Wherever It Resides
Breaking Down Silos With a Holistic View of Security, Risk
Tackling Emerging Cyberthreats Head-On
Cybersecurity Is Now a Boardroom Issue
New SEC Regulations Shape Cybersecurity Reporting Standards
Microsoft Tweaks Recall for Security
Qilin RaaS Group Believed to Be Behind Synnovis, NHS Attack
CISA Planning JCDC Overhaul as Experts Criticize Slow Start
Hypr Secures $30M to Expand Identity Protection Platform
ISMG Editors: Infosecurity Europe Conference 2024 Wrap-Up
Critical PHP Vulnerability Threatens Windows Servers
Hackers Claim They Breached Telecom Firm in Singapore
New Privacy Risks for FIs in Age of Emerging Tech
London Hospitals Seek Biologics Backup After Ransomware Hit
CyberEdBoard Profiles in Leadership: Don Gibson
Cybersecurity Lessons Learned From Latest NHS Hospital Hits
Addressing Security Gaps for Organizational Resilience
Ransomware Goes Pro, Warns Expert
Fortinet Acquires Unicorn Lacework to Enhance Cloud Security
Snowflake Hacking Spree Puts 165 Organizations at Risk
Microsoft, Google Offering Cyber Help to Rural Hospitals
Psychological Strategies for Bridging the IT-OT Divide
Lawmakers: UHG Violating HIPAA Breach Notification Rule
OT Security: Operationalizing on a Platform
FCC Advances BGP Security Rules for Broadband Providers
ChatGPT Integration Fortifies Apple's Siri and Writing Tools
Regulations and Compliance: Navigate the Shifting Landscape
Privacy Regulators Probe Impact of 23andMe's Mega Breach
AI Will Soon Exhaust the Internet. What's Next?
DOJ Investigating Medical Transcribers' Mega Hack: Report
Atos Agrees to New Financial Restructuring Plans
US DOD Seeks Commercial Partner for AI Governance Overhaul
Half a Dozen Flaws in Netgear Router Put User Data at Risk
Cyberhaven Secures $88M to Strengthen Data Security Platform
Securing Enterprise IoT: Advanced Threats and Strategies to Respond
Dutch Agency Renews Warning of Chinese Fortigate Campaign
Cleveland Cyber Incident Prompts Shutdown of City IT Systems
Chinese-Made Biometric Access System Has 24 Vulnerabilities
Ransomware Gang TellYouThePass Exploits PHP Vulnerability
Ransomware Actors Focusing on More Opportunistic Targeting
Managing AI Risks in Corporate Workflows
Gain Insight Into Financial Services Risk With Threat Intel
SEC Compliance: Lessons From the SolarWinds Case
Shift From Perimeter-Based to Identity-Based Security
CyberEdBoard Profiles in Leadership: Aman Sood
Banking on Security: Drawing Universal Cybersecurity Lessons From Financial Services
Fraudsters Impersonate CISA in Money Scams
Everfox to Acquire British Hardware Security Vendor Garrison
Brazil's Climb Onto the World Stage Sparks Cyber Risks
NIST Publishes Draft OT Cybersecurity Guide for Water Sector
Regulatory Changes Are on the Horizon. Are Companies Ready?
Beyond the Cost Center: Building Cyber Risk Management
Third-Party Oversight Is Needed to Stop Systemic Risk
Implementing GRC in a Complex Global Organization
Pakistan's 'Cosmic Leopard' Is Targeting India With RATs
China Using Hacking Competitions to Develop Domestic Talent
Breach Roundup: US Federal Cyber Incidents Go Up
Worker-Downloaded Malware Caused Ascension Ransomware Attack
Microsoft President Admits to Major Security Failures
Treasury Seeks Industry, Academic Insight on AI Use, Risks
NetSPI Strengthens Attack Surface Management With Hubble Buy
Cryptohack Roundup: Norway Freezes Hacked Ronin Funds
Visual Studio Code Has a Malicious Extension Problem
Is Cyber Becoming a Primary Domain of Warfare?
Advice to CISOs: Address AI Challenges Now!
Microsoft Backtracks on Recall Rollout
Security Researchers Expose Critical Flaw in Ivanti Software
Surge in Attacks Against Edge and Infrastructure Devices
Pope Francis in G7 Speech Warns Against Nonhuman-Centric AI
NCS Insider Prison Sentence Highlights Enterprise Risk Flaws
Meta Delays Data Harvesting for AI Plans in Europe
Microsoft, Palo Alto, CrowdStrike Lead XDR Forrester Wave
ISMG Editors: Will AI Survive the Data Drought?
HHS on Guard: Prioritizing Patient Data Security
The New Security Leader: Less Techy, More Business-Savvy
Zero-Day Exploits and Ransomware Trends for 2024
Spanish Police Bust Alleged Leader of Scattered Spider
NHS Ransomware Hack: 1,500 Medical Appointments Rescheduled
Sleepy Pickle: Researchers Find a New Way to Poison ML
Australian Regulators Detail Medibank Hack: VPN Lacked MFA
CISA Conducts First-Ever AI Security Incident Response Drill
Police Dismantle Asian Crime Ring Behind $25M Android Fraud
Huntress Lands $150M to Boost Posture, Recovery Capabilities
Hackers Plead Guilty After Breaching Law Enforcement Portal
UK Cyber Sector Booms, But Challenges Remain
NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical
Why Resilience Is More Than Just Cybersecurity
AI and Adaptive Cybersecurity for SMBs
Perks of Independence for Synopsys' Software Integrity Group
California AG Slaps Blackbaud With $6.75M Fine for 2020 Hack
German BSI Forces Microsoft to Disclose Security Measures
IMF Touts Fiscal Policy Change, Taxes to Soften AI Impact
Chemical Firms Boost Cybersecurity Ahead of New Regulations
Researchers Uncover Chinese Hacking Cyberespionage Campaign
UK Pathology Lab Ransomware Attackers Demanded $50 Million
Transparency, Not Reticence: CISOs' Key to Crisis Aversion
Latest Cyber Insurance Policy Takes Aim at Phishing Attacks
AI in Cybercrime: Lowering the Barrier for Bad Actors
Identity Startup Semperis Raises $125M to Aid Product Growth
ISC2/CIISec Tips on Recruitment, Retention in Cybersecurity
RSA Conference 2024 Compendium: 150 Interviews and More
Russian State Hackers Target French Government for Espionage
Pentagon Cybersecurity, Workforce Woes Threaten Tech Rollout
Popular Chatbots Spout Russian Misinformation, Finds Study
Radiology Practice Hack Affects Sensitive Data of 512,000
Critical UEFI Flaw in Phoenix Firmware Hits Major PC Brands
Chinese Hackers Used Open-Source Rootkits for Espionage
Microsoft 365's Security Gaps: Logging and Beyond
Cloud Security Is a Big Challenge for CISOs - Here's Why
Victims of Snowflake Data Breach Receive Ransom Demands
European CSAM Scanning Proposal Runs Into Opposition
Breach Roundup: Phishing Platform ONNX Targets Microsoft 365
Will Upcoming HHS Cyber Regs Move Needle in Health Sector?
Cryptohack Roundup: Kraken, CertiK Feud Over Zero-Day, $3M
DHS Unveils Critical Infrastructure Cybersecurity Guidance
Biden Administration Bans Kaspersky Antivirus Software
Leverage Multiple Enforcement Points for Network Security
ISMG Editors: How Did Medibank's Lack of MFA Cause a Breach?
US Sanctions 12 Kaspersky Executives
US Treasury Moves to Limit Investments in Chinese Tech Firms
Qilin Ransomware Group Leaks NHS Data
The State of SASE 2024: Rise of the Platform Approach
Google's Zero-Day Hunters Test AI for Security Research
Australia Optus 2022 Data Breach 'Not Highly Sophisticated'
Auto Dealerships Using CDK Global Hit With Cyber Disruptions
Court: HHS Overstepped HIPAA Authority in Web Tracking Guide
Change Healthcare Begins to Notify Clients Affected by Hack
Apple to Delay AI Rollout in Europe
European Union Sanctions Russian State Hackers
Information Blocking of Patient Records Could Cost Providers
Chinese Hackers Caught Spying on Taiwanese Firms
CHERI Backers Form Alliance to Promote Memory Safety Chip
CDK Begins Restoring Systems Amid Ransomware Payment Reports
JFrog Acquires Qwak to Strengthen MLOps, DevOps Integration
CISA Confirms Cyberattack on Critical Chemical Security Tool
Luxury Retailer Neiman Marcus Suffers Snowflake Breach
Why New Cyber Penalties May Strain Hospital Resources
Patched Weeks Ago, RCE Bug in AI Tool Still a 'Probllama'
US DHS Warns of AI-Fueled Chemical and Biological Threats
Atos Takeover Bid Hits New Roadblock
Nuance Ex-Employee Indicted for Breach Affecting 1 Million
US Federal Agencies Still Struggle to Recruit Cyber Talent
Hackers Quick to Exploit MOVEit Authentication Flaw
OpenAI Drops ChatGPT Access for Users in China, Russia, Iran
No Patches for Hospital Temperature Monitors' Critical Flaws
Russian Indicted for Wiper Malware Campaign Against Ukraine
CISA Report Finds Critical Open-Source Memory Safety Risks
Breach Roundup: Cyber Insurance Doesn't Cover Breach Costs
FBI, HHS Warn Health Sector of Payment Diversion Schemes
Cryptohack Roundup: Conviction in Home Invasions Case
Identity Theft Reports Fall, But Attempts at ID Misuse Rise
Palo Alto Networks, Cisco Dominate OT Defense Forrester Wave
Chatbots Will Break Guardrails If the Info Is 'Educational'
How PAM Can Help Businesses Achieve Their Goals
Gartner: 55% of Firms Now Rely on AI Governance Boards
Setting Guardrails for AI Security in Enterprises
AI's Growing Power: Making Sure It's on Your Side
Threat Intel Beyond the SOC: A Holistic Approach
Effective Communication Is Key to Successful Cybersecurity
Microsoft Is Warning More Customers About Russian State Hack
ISMG Editors: Growing Fallout From the Snowflake Breach
LevelBlue Lays Off 15% of Employees After Being Sold by AT&T
Insurance Software Vendor Notifies 6.1 Million of 2023 Hack
Multiple Vulnerabilities Found in Gas Chromatographs
Startup Odaseva Raises $54M to Bolster Global Expansion, R&D
Strengthening Microsoft 365 with Human-centric Security
How Cyber Insurers Evaluate Security Measures
CyberEdBoard Profiles in Leadership: Kenneth Townsend
Balancing AI Potential and Risk Management in Cybersecurity
Juniper Releases Emergency Fix for Maximum-Severity Flaw
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
Groups Ask HHS for Guidance on Massive Change Breach Reports
North America Midwest Summit Addresses AI's Role in Security
Millions Affected by Prudential Ransomware Hack in February
Experts Warn of Cyber Regulatory Chaos Post-Chevron Overturn
Feds Hit Health Entity With $950K Fine in NotPetya Attack
Rapid7 Purchases Noetic for Better Attack Surface Management
Evolve Ransomware Hack Affects Affirm and Fintech Companies
Meta and YouTube Update Their AI Content Policies
Cisco Patches an Exploited Zero-Day Vulnerability
Splunk Named a 10-Time Leader in Gartner® Magic Quadrant™ for SIEM
CyberEdBoard Insights: Shefali Mookencherry and Kenneth Townsend
CyberEdBoard Insights: Bradley Schaufenbuel
Cybersecurity Success Hinges on Leadership, Not Just Tech
CyberEdBoard Insights: Erik Hart and Erik Decker
Scaling Zero Trust: How ThreatLocker Uses Series D Funds
BigID's Strategy for Profitability, M&A and AI Integration
Auto Dealers Plan July Fourth Comeback After CDK Cyberattack
Torq CEO on Series B Funds: Driving AI and Hyperautomation
Children's Hospital Notifies 800,000 of Data Theft in Attack
US CISA Continues to Struggle After Major Ivanti VPN Hack
On Day 4 of Ransomware Attack, Service Still Down at Patelco
Modernizing Your PAM Program – An Identity-focused Security Strategy
Patched: RCE Flaw That Affects Critical Manufacturing
Unlocking Modern SaaS Security
FedRAMP Launches New Framework for Emerging Technologies
Adlumin's Global Expansion: CEO Talks Midmarket Security
CyberEdBoard Insights: Peter Tapling
Critical Vulnerabilities Found in Rockwell PanelView Plus
Breach Roundup: FBI Warns of US Renewable Energy Sector Threats
Cryptohack Roundup: JPEX Case Update
OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report
ISMG Editors: A Tribute to Steve King
Health Benefits Administrator Reports 3rd-Party Hack to SEC
New Zealand Fitness Retailer Hit by DragonForce Ransomware
Remembering Steve King - Cybersecurity's 'Great Connector'
Reports: Florida Health Department Dealing With Data Heist
How CISA Plans to Measure Trust in Open-Source Software
Cryptocurrency Theft Haul Surges Alongside Crypto Value
What Will Drive the Use of Faster Payments in the US?
What Will UK Labour Government Mean for AI, Data Protection?
US Busts Russian AI-Driven Disinformation Operation
4 Million People Affected by Debt Collector Data Theft Hack
Senate NDAA 2025 Boosts Military Cyber and AI Initiatives
Evolve Discloses That Hackers Stole Data of 7.6M Individuals
After Customers Get Breached, Snowflake Refines Security
State AGs Warn Consumers About Change Healthcare Breach
Singapore to Phase Out One-Time Passwords in Banking
Australia Flags Persistent Chinese Cyberespionage Hacking
Widely Used RADIUS Authentication Flaw Enables MITM Attacks
Researchers Discover New Malware Aimed at Mining Sector
BitMEX Pleads Guilty to Violating Anti-Money Laundering Laws
Cryptohack Roundup: Huione Guarantee
OnDemand | The Cost of Underpreparedness to Your Business
How Top Cybersecurity Leaders Predict Threats and Navigate Risk
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape
Multiple Threat Actors Moving Quickly to Exploit PHP Flaw
Major Health Data Breaches: How Are Trends Shifting in 2024?
Breach Roundup: Microsoft Patches Zero-Day Active Since 2023
Experts: Federal Privacy Law Needed to Curb AI Data Misuse
AT&T Details Massive Breach of Customers' Call and Text Logs
Zeus Banking Malware Player Gets 9-Year Prison Term
ISMG Editors: How Should We Handle Ransomware Code Flaws?
White House Calls for Defending Critical Infrastructure
FedNow's First Year: Mixed Bag of Achievements, Challenges
CRYSTALRAY Group Targets 1,500 Organizations in 6 Months
Skills Gap: A Major Cyber Risk Not to Be Ignored
Millions of Exim Servers Still Exposed to Critical Flaw
Experts Warn of Post-Trump Shooting Misinformation, Scams
Securing M&A Transactions With Cyber Due Diligence
OnDemand | The Business Value of Prisma Cloud for Google Cloud
Atos Secures 1.675 Billion Euros in Financing to Stay Afloat
Employees Say OpenAI Shields Whistleblowers From Regulators
Synnovis Attack Halts 8,000 NHS Patient Procedures So Far
DOD Failing to Fix Critical Cybersecurity Gaps, Report Says
Hacktivists Dump Disney Slack Data Online Over AI Projects
Rite Aid Says Ransomware Group Stole 2.2M Customers' Data
HR Firm Sacks Plan to Add AI Bots to Employee Org Charts
Bill Calls for CISA, HHS Effort to Boost Health Sector Cyber
Kaspersky to Shut US Business, Lay Off Remaining 50 Workers
Iranian State Hackers Are Deploying a New Malware Backdoor
Coast Guard Battles Cyberthreats Amid Industry Resistance
CEO Chris O'Malley on Why LogRhythm, Exabeam Opted to Merge
How to Empower IT with Immutable Data Vaults
As FedNow Marks First Year, FIs Need to Show More Enthusiasm
Change Healthcare's Breach Costs Could Reach $2.5 Billion
New AI System Shields Virtual Power Plants From Cyberattacks
UK Labour Introduces Cyber Security and Resilience Bill
UK ICO Reprimands London Hackney Council for 2020 Hack
Aqua Security Lays Off 10% of Workforce Amid CNAPP Upheaval
Securing AI in the Cloud: Insights From Orca Security's CEO
Inside Arctic Wolf's SecOps Growth Strategy From MDR to ITDR
CISA Appoints New Cybersecurity, Stakeholder Group Leaders
Gen AI Spending Slows as Businesses Exercise Caution
From Email to Human Behavior: Abnormal Security's Evolution
Operation Spincaster Targets Crypto Pig-Butchering Scams
Cyber Fail: Attack of the Zombie APIs!
Judge Dismisses Most SEC Fraud Claims Against SolarWinds
DOD Testing Generative AI Tools to Enhance Contracting
Cryptohack Roundup: $230M WazirX Exploit in India
Breach Roundup: North Korean Hackers Target macOS Users
Measuring Your Data’s Risk
The Cost of Underpreparedness to Your Business
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape
Banks Need More Time to Adopt Real-Time Payments
Banks and Airlines Disrupted as Mass Outage Hits Windows PCs
ISMG Editors: AT&T's Ransom Payment in Snowflake Breach
CrowdStrike, Microsoft Outage Uncovers Big Resiliency Issues
Federal Agencies Scramble to Fix Massive Software Outage
CrowdStrike/Microsoft Outage Latest Blow to Healthcare
ISMG Editors: What the CrowdStrike Outage Taught Us So Far
Fake Websites, Phishing Appear in Wake of CrowdStrike Outage
Response and Remediation: How CIOs Reacted to IT Outage
Microsoft Sees 8.5M Systems Hit by Faulty CrowdStrike Update
E-Prescription Vendor Breach Affects 12.9 Million Aussies
CrowdStrike's Response to Outage Will Minimize Lost Business
Chinese Cyberespionage Group Expands Malware Arsenal
Transforming Knowledge Management With Generative AI
What Biden Dropping Out Could Mean for Federal Cyber Policy
CrowdStrike Cleanup: Vast Majority of Systems Restored
Report: HHS Needs to Beef Up Cloud Security and Skills
Proactive Network Security: Lessons From CrowdStrike Outage
Hackers Froze Ukrainian Heating Systems in Winter
CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage
Companies Are Playing Catch-Up to Secure Generative AI
US FTC Investigates Impact of AI-Powered Dynamic Pricing
FBI Encountered Encryption Hurdles in Trump Shooting Probe
Daixin Gang Threatening to Leak 10 Million Ambulance Records
US CISA Urges BIND 9 Users to Address New DNS Exploits
Email Gateway Security Gaps Enable New Malware Tactics
Check Point Snags Team8's Nadav Zafrir to Replace Gil Shwed
Senator: Top Banks Only Reimburse 38% of Unauthorized Claims
Vulnerabilities in LangChain Gen AI Could Prompt Data Leak
Mandiant: North Korean Hackers Targeting Healthcare, Energy
How to Secure Data and Integrate Applications in a Hybrid Cloud Environment
CrowdStrike Outage Losses Will Hit Healthcare, Banking Hard