Russian military intelligence agency hackers walloped Ukraine with waves of data wipers and phishing attacks, but the torrent of destructive cyberattacks doesn't appear to have been as effective as previous Russian cyberattacks, report researchers from the Google Threat Analysis Group and Mandiant.
The data protection landscape and compliance environment has changed significantly with the implementation of GDPR, and the many other privacy regulations that have followed suit. It is no longer about what organizations think they need to be doing in order to control their data, but what they are being told they need...
As the massive ESXiArgs ransomware campaign continues to target unpatched VMware ESXi hypervisors, cybersecurity experts have released a script that can decrypt at least some affected virtual machines. Ransomware trackers count at least 2,803 victims, primarily in France, the U.S. and Germany.
Hong Kong police and Interpol disrupted an international criminal operation that planted banking Trojans through SMS phishing messages that appeared to originate from a legitimate source. Hong Kong police told the South China Morning Post the gang appears to be based overseas.
Sophisticated threats such as ransomware are continuing to target organizations and evade even the most robust defenses. In order to even have a chance of detecting and responding to these cyberattacks quick enough deploying Extended Detection and Response (XDR) is critical. However, developing a robust XDR strategy...
Sophisticated threats such as ransomware continue to target organizations and evade even the strongest defenses. Deploying an Extended Detection and Response (XDR) solution is critical to quickly detecting and responding to these cyberattacks.
However, developing a robust XDR strategy requires having a solid Endpoint...
The aim of AI in EDR solutions is to streamline the process to ensure humans are able to consume and understand the data in order to respond well, says Serge Woon, worldwide tech sales leader and co-founder at ReaQta, part of IBM. In this roundtable preview, he explains why AI is so crucial to EDR.
An Android banking Trojan is targeting Brazilian adopters of an instant payment platform known as Pix, marking another foray by the South American country's criminal underground into digital larceny. Brazil has been a hotbed of Trojan activity perpetuated by domestic cybercriminals.
The Italian cybersecurity agency says at least a dozen hacks against unpatched VMware ESXi servers in the country are likely tied to the BlackBasta ransomware group. Investigators say the ransomware campaign may have hit thousands of organizations worldwide since Thursday.
Digital transformation we all have experienced over the last few years, everything online is at risk of fraud – fraudsters will try to take advantage over customer digital footprint at any time and access point. Telesign's Seth Gilpin shares insights.
Increasing number of cyberattacks coupled with rising business costs and a potential recession are forcing organizations to rethink their security spending—to do more with less. How can chief information security officers (CISOs) and other security leaders manage increased cyber risk without overloading employees or...
Organizations today struggle with both new attack surface challenges such as cloud configuration and exposed buckets and long-standing ones around vulnerable ports and infrastructure. CEO George Kurtz says CrowdStrike's recent purchase of Reposify will help customers defend their priority assets.
Great eXpeltations is Expel’s annual report sharing the most significant data from our security operations center (SOC) in our threat detection and response efforts. It curates that data into trends that can impact your cybersecurity posture and offers resilience recommendations to protect your organization and what...
The Russia-Ukraine war has had huge economic consequences for Eset, given that the Slovakian vendor was the largest cybersecurity company in Ukraine and second-largest in Russia. The decision to halt sales in Russia and a spending slowdown in Ukraine due to the war hurt Eset, says CEO Richard Marko.
Hackers stymied by Microsoft's crackdown on macros are shifting to malicious OneNote attachments. Particularly worrying is the takeup of the tactic by an initial access broker associated with various ransomware infections, say researchers from Proofpoint.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.