Among the hottest cybercrime trends globally: P2P fraud. JP Blaho of BioCatch discusses the latest scams, including Zelle fraud, and differences in incidents, investigations and regulatory requirements in the U.S. and other global hotspots.
Four ISMG editors discuss important cybersecurity issues, including lessons learned from the cyberattack on a steelmaker in Iran that caused a serious fire, how the economic crisis in Sri Lanka is affecting cybersecurity and what the rising cost of cyber insurance means for the industry.
A little more than halfway into the year, hacking incidents, and especially ransomware incidents, as well as breaches involving business associates, are dominating the hundreds of major health data breaches affecting millions of individuals being reported to federal regulators.
The role of cyberattacks in Russia's war against Ukraine continues to evolve as the conflict persists, but one notable takeaway so far is the precision of the military's online attacks, which is likely an attempt to avoid spillover that would anger NATO, says Ian Thornton-Trump, CISO of Cyjax.
Tasked with heading cybersecurity in the recently created U.K. Department for International Trade, Don Gibson discusses the opportunities and challenges of building a security program from scratch, including the initial pushback he received and his efforts to win "hearts and minds."
The government of Puerto Rico announced an investment of $7.6 million toward strengthening cybersecurity on the island. The island has undergone a string a embarrassing cybersecurity incidents, including a phishing incident that stole $2.6 million of taxpayer dollars.
A federal contractor that makes rocket propulsion systems will pay $9 million to settle allegations from a former executive that it misled the U.S. government over the state of its cybersecurity defenses even after it suffered nation-state hacks. Aerojet Rocketdyne is not admitting any liability.
The U.S. Department of Defense continues to experiment with bug bounties to draw in vulnerability reports from outside white hat hackers. It kicked off a new test program for continuous rewards on America's Independence Day by setting aside a pool of $110,000.
Federal authorities are alerting healthcare and public health sector entities of threats involving North Korean state-sponsored "Maui" ransomware. Attackers use the malware to maliciously encrypt diagnostics procedures, medical imaging, and medical center intranet services.
India's stock brokers and depository participants must now report all cyberattacks and breaches to the Securities and Exchange Board of India within six hours of detection under a mandate implementing what is likely the world's tightest breach reporting timeline requirement.
Unemployment benefits websites across the United States are offline after a malware attack was detected at third-party vendor Geographic Solutions Inc. The vendor, which serves dozens of state labor departments, says no personally identifiable information has been affected by the attack.
Federal regulators issued health privacy guidance for medical providers and patients and promised to make privacy violations a top HIPAA enforcement priority in the wake of the U.S. Supreme Court overturning Roe v. Wade, the five-decade precedent that guaranteed nationwide access to abortion.
Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.
Fraudsters compromised debit card numbers and associated PINs, and possibly names and addresses, of an undisclosed number of Bank of the West customers. Unknown thieves installed skimmers in a "small number of ATMs," the bank's COO, Karl Werwath, tells ISMG.
Want to increase the capability of your SecOps team? Consolidating your security tools into a holistic ecosystem that’s always learning and adapting is key.
Begin your journey toward quick, reliable, simplified security today with XDR.
Download the Gartner® Market Guide for XDR to learn how XDR helps...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.