North Korean state-affiliated hackers are continuing to exploit zero-days in popular software applications as part of global supply chain attack campaigns for espionage and financial theft purposes, British and South Korean cybersecurity and intelligence officials said.
The Asia-Pacific region will dramatically increase its investment in offensive and security tools over the next decade, amid a worsening threat landscape and rising losses, experts predict. Telemetry data from IBM and BlackBerry highlights a sharp rise in attacks against organizations in the region.
When government apps and digital services lag or break, the ramifications can have far-reaching effects – on citizens, infrastructure, and national security.
That's why operational resilience is critical.
In this GovLoop playbook, agencies will learn how to increase operational resilience through unified...
A report from the global financial services company Moody’s Corp. says the Industrial and Commercial Bank of China may suffer reputational damage to its financial services subsidiary after the unit was hit with a ransomware attack from the notorious Russian-linked cybercriminal group LockBit.
The hacktivist group SiegedSec has taken responsibility for a massive data breach targeting Idaho National Laboratory, a leading nuclear energy testing lab. Concerns are now growing over what data was stolen from the laboratory - and who might have access to it.
The world's largest cryptocurrency exchange will withdraw from the U.S. market after now-former chief executive officer Changpeng Zhao pleaded guilty to felony money laundering charges in a U.S. court and the company agreed to pay $4.3 billion into federal coffers.
Mobile banking Trojans spread through deceptive social media messages remain a problem for Indian smartphone users, warns Microsoft. India accounts for 4 in 10 global transactions made with digital payments, according to the National Payments Corporation of India.
Binance Chief Executive Changpeng Zhao will plead guilty to violating anti-money laundering statutes in U.S. federal court in a settlement ending an investigation into illicit transactions at the world's largest cryptocurrency exchange. The company will pay $4.3 billion in fines and forfeiture.
With experts warning that NetScaler ADC and Gateway devices are being exploited by nation-state and cybercrime groups, the manufacturer has again urged all users to "patch immediately" as well as terminate active sessions, which attackers can otherwise use to access devices even post-patch.
Financial institutions (FIs) are grappling with sophisticated authorized and unauthorized scams that are fueled by payments innovation and higher transaction volumes. With instant payments gaining worldwide adoption, real-time monitoring is the key to stopping trending scams—but that’s not the only trend to plan...
The Ukrainian government dismissed two top cybersecurity officials as the country's anti-corruption unit probes suspected embezzlement. Six individuals have been accused of inflating the value of software and services contracts to misappropriate $1.7 million.
A hacking group linked to Russian domestic intelligence and known as Gamaredon is deploying a worm dubbed "LitterDrifter" that is spread through thumb drives to attack Ukrainian organizations. LitterDrifter has two functions: automatic propagation and communication with command-and-control servers.
Trackers of the tally of individuals affected by the Clop ransomware group's mass hack attack on MOVEit servers added another 4.5 million patients' data to the ever-ascending total. The incident currently affects more than 2,600 organizations and 77 million individuals.
Ransomware is a growing threat to business continuity, and countermeasures against it are a pressing issue. However, it is not always easy for companies and organizations with limited resources and budgets to understand which of the various approaches is best suited for their situation.
This webinar will cover the...
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in