The FBI is warning organizations in the financial sector about an increase in botnet-launched credential stuffing attacks that are leading to the theft of millions. Many of these attacks, which target APIs, are being fed by billions of stolen credentials leaked over the last several years.
Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks, Microsoft researchers say.
Microsoft and the Cybersecurity and Infrastructure Security Agency have issued warnings that a critical vulnerability in Windows Server dubbed "Zerologon" is being actively exploited in the wild. They urge users to immediately apply an available partial patch.
The latest edition of the ISMG Security Report features an analysis on why criminals continue to use darknet markets, despite the risks. Also featured: Hackers target Virgin Mobile KSA; coping with COVID-19 stress.
The U.S. National Institute of Standards and Technology this week released a long-awaited guidance update, Special Publication 800-53 Revision 5, describing "next-generation security and privacy controls" and how to use them.
Shopify's announcement this week that two employees inappropriately accessed transactional data from 200 of the merchants that use its e-commerce platform demonstrates the importance of taking a "zero trust" approach to security and improving identity and access management capabilities, security experts say.
As the tally of reported heath data breaches related to the May ransomware attack on Blackbaud continues to climb, so do the number of lawsuits filed against the cloud-based fundraising software vendor.
Australian police say they've broken up a sophisticated SMS phishing scheme designed to collect personal details and bank login credentials. It's a rare success in the fight against unsolicited text messages.
The ephemeral and dynamic nature of cloud resources makes traditional security perimeters insufficient for successful risk management. The cloud needs a new perimeter - identity. Unfortunately, the complexity of the cloud infrastructure and cloud provider identity and access management (IAM) tools makes it...
In this webinar we explore Public Key Infrastructure as a Service (PKIaaS) and how this time-tested solution will provide organizations with a secure certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment, while...
In an in-depth interview, Denyette DePierro of the American Bankers Association provides an overview of emerging regulatory issues, cloud security challenges and the use of social media apps for payments.
The U.S. Cybersecurity and Infrastructure Security Agency is warning of an uptick in attacks using LokiBot, an information stealer capable of sweeping up credentials. Fraudsters are using new methods to spread the malware.
An international coalition of police agencies made 179 arrests and seized virtual currency, cash and drugs based on intelligence gathered from earlier takedowns of the Wall Street and Alphabay darknet marketplaces.
A U.K. resident who was a member of The Dark Overlord hacking group pleaded guilty to federal charges Monday and was sentenced to five years in prison, according to the U.S. Justice Department. The group targeted several healthcare organizations and others.