As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
Google will buy cybersecurity firm Mandiant for $5.4 billion, an acquisition Google says will give it new capabilities to respond to cybersecurity threats and bolster its cloud platform. Mandiant will be folded into Google's Cloud Platform.
U.S. officials say that while it would be nearly impossible for Russia to "flip the switch" and convert to cryptocurrency to stabilize its sanctioned economy, they caution that Russian elites and entities may yet try to skirt the measures by transferring and obfuscating funds across the blockchain.
Ransomware gang Lapsus$ has leaked credentials of 71,000 Nvidia employees on a Telegram page, Information Security Media Group has found. The data was stolen in a breach, data breach notification service Have I Been Pwned confirms.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Key financial members of the U.S. Senate on Wednesday sent a letter to Treasury Secretary Janet Yellen regarding potential sanctions evasions and the department's ability to police crypto assets, as adversarial countries have previously leveraged them to fund weapons programs and for cash infusion.
Security experts, legislators and researchers are worried about fraud and money laundering related to cryptocurrency platforms during the Russia-Ukraine crisis. Researchers are already observing a spike in phishing attacks and other threat vectors targeting digital wallets.
In the face of the Great Resignation, Jennifer Mitchell, vice president of operations and optimization at ActZero, predicted in late 2021 that the opposite was true for cybersecurity personnel - a phenomenon she calls the "Great Retention." Mitchell discusses the importance of work-life experience.
Why didn't Russia unleash major cyberattacks against Ukrainian critical infrastructure ahead of its invasion troop advance? While theories abound, some experts warn that, unfortunately, this war and its cost to human life is only set to get worse.
A previously undocumented advanced persistent threat campaign named Daxin has been found. It uses a stealthy rootkit backdoor to enable remote actors to communicate with secured devices not connected directly to the internet. Researchers say Chinese attackers used it to run an espionage campaign.
Fortinet's FortiGuard Labs has released its latest Global Threat Landscape Report, and it portrays adversaries who are increasingly more sophisticated and speedy and who are diversifying their attack techniques. Derek Manky tells why organizations need to respond by bolstering the cyber kill chain.
Belarus has renounced its nonnuclear status and is set to support moving the Kremlin's nuclear weapons into the country - within striking distance of Ukrainian capital Kyiv. This has sparked backlash from cyber hacktivist groups, who have now targeted and disrupted Belarus' critical services.
Days ago, the Ukrainian Ministry of Defense issued a call for Ukrainian hackers to safeguard its networks and tap into Russian infrastructure. Now, Mykhailo Fedorov, Ukraine's vice prime minister and minister of digital transformation, says he is creating an IT army and calling for digital talents.
Since 2019, the Global Cyber Alliance has been using a custom IoT honeypot solution that identifies global attack risks and collects data about IoT attacks. Leslie Daigle discusses its findings about how threats have evolved and offers advice on how to better secure IoT devices and tech.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.