In an update on the investigation into the SolarWinds supply chain attack, Deputy National Security Adviser Anne Neuberger said the Biden administration is preparing "executive action" to address security shortcomings that have come to light.
A Nigerian national has been sentenced to 10 years in prison after pleading guilty to taking part in a business email compromise operation that extorted $11 million from its victims, according to the U.S. Department of Justice.
Hackers are targeting vulnerabilities in websites offering instant quotes - especially those that provide auto insurance rates - to steal consumers' information, according to an alert from the New York State Department of Financial Services.
In 2020, a cybercrime operation known as ShinyHunters breached nearly 50 organizations, security researchers say. And this year, it shows no signs of slowing down - it's already hacked e-commerce site Bonobo and dating site MeetMindful.
Since SEGs are missing so many phish, there’s a good chance other technologies - firewalls, anti-virus, and EDR - also aren’t spotting these threats. Such gaps can leave you vulnerable for hours or even days.
Bottom line: you can’t rely on SEGs alone. They’re the first line of defense, not the last...
Why are polymorphic attacks more successful? A campaign that lacks uniformity doesn’t look like a campaign and makes it difficult for security operators to keep rules up to date at the gateway. For many cybersecurity teams who lack bandwidth, finding the full scope of a polymorphic attack to quarantine is...
With a pandemic sweeping the world, countless businesses have had to move online to cope. This sudden surge in new online commerce has also led to a rise in cyber attacks, particularly through credit card fraud.
Download 'The State of Credit Card Fraud 2021' ebook and find out how you can protect your business from...
Large Service Provider Achieves
Overall Improved Risk Profile with
Closed-Loop Change Management
and Full Network Context
Trusted by leading global brands for more than 40 years,
this service provider is one of the largest in Europe.
With more than 10,000 employees and nearly
20 operations centers throughout...
As the world comes to terms with the new normal, financial services and insurance firms must learn to balance good CX with proper fraud detection.
Download this study and read about how:
Firms have seen a 42% increase in year-over-year call volume because of the pandemic
83% of firms rely on contact center agents...
Interactive voice response (IVR) systems are now hubs for both customer care and associated fraud. This document describes how an end-to-end approach that spans time, channels and multiple data sources can detect activity by fraudsters and prevent their efforts to mine personal data and, ultimately take over...
Sen. Mark Warner, D-Va., is demanding more information from the FBI and the EPA about the Feb. 5 hacking of a water treatment facility in Oldsmar, Florida. Meanwhile, Sen. Marco Rubio, R-Fla., is requesting that the FBI provide "all assistance necessary" to the investigation.
Cybercriminal gangs operating darknet stolen payment card marketplaces are scrambling to attract customers from the now-closed Joker's Stash card market, according to the security firms Kela and Flashpoint.
A remote code vulnerability in the Android version of the file-sharing app SHAREit could allow hackers to tamper with the app's permissions, enabling them to steal sensitive data, reports security firm Trend Micro.
As more and more people work and socialize exclusively online, protecting your digital identity is more important than ever. Will this finally be the tipping point that causes people to show more concern for their online data?
Download the full report to learn more from your peers and ensure you don’t make the...
Our experts weigh in: How will we secure an all-digital, remote world?
COVID-19, remote work, and warp-speed digital transformation mean that security teams face more challenges than ever. We’ve got thoughts on beating the bad guys in 2021.
Download this guide to learn more about:
Supply Chain Attacks: Mind...