As former director of information security and privacy at Sonesta Hotels, Michael Woodson championed a proactive approach to cybersecurity. His leadership philosophy underscores the importance of cultural transformation and continuous learning in building robust security programs.
Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.
French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.
GoodRx has reached a $25 million preliminary settlement of proposed class action litigation alleging the telehealth company violated privacy and an assortment of other laws and statutes when it previously collected and shared consumers' information with third parties through online tracking tools.
A South Korean company exported 240,000 satellite receivers with distributed denial-of-service attack capabilities, leading to the arrest of its CEO by the Korean National Police Agency. The company and its employees face criminal prosecution for allegedly violating South Korea's cybersecurity laws.
The founder of the notorious darknet market Hydra has been sentenced by a Moscow judge to serve a life sentence in one of the country's harsh penal colonies, together with 15 of his associates. Following its April 2022 disruption by Western law enforcement, other darknet markets replaced Hydra.
Amazon Web Services hopes to redefine enterprise innovation in the cloud with a slew of announcements made during CEO Matt Garman's keynote speech at re:Invent 2024 in Las Vegas about advancements in compute, storage, databases, generative AI and analytics.
Chinese hackers who penetrated U.S. telecoms likely haven't been fully evicted partially due to shifting tactics made in response to public disclosures, federal officials said Tuesday. Industry and government investigators have revealed in dribs and drabs a campaign of Beijing telecom hacking.
The payments industry, which has operated on established frameworks for decades, is adapting - or forced to adapt - to a new kind of intelligence. For industry heavyweights Visa and Mastercard, AI is becoming a tool to drive fraud detection, customer experience and operational agility.
China has surged past the United States in critical technology research, according to a recent report published by the Australian Strategic Policy Institute. Experts warn the shift could have profound global implications, including risks to U.S. cybersecurity, innovation and global leadership.
With $100 million in Series A funding, Upwind plans to enhance its runtime and AI-powered cloud security platform. CEO Amiram Shachar outlines the company's investments in engineering, customer engagement and scaling solutions to address vulnerabilities such as misconfigurations and insecure APIs.
The Centers for Medicare and Medicaid Services has issued proposed "guardrails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.
A threat actor is targeting Taiwanese companies using phishing emails and long-standing vulnerabilities to deliver SmokeLoader malware. The threat actor uses plugins for the infamous malware to directly attack systems rather than using SmokeLoader, as its name suggests, as a loader for other malware.
At least three National Health Service hospitals in U.K. are responding to recent cyber incidents, including a children's hospital and a heart and chest specialty hospital - both located in Liverpool - that share IT systems. INC Ransom claims to have stolen data from the two hospitals.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.