Many ransomware-wielding attackers continue to hack into organizations via remote desktop protocol. But some Sodinokibi ransomware-as-a-service affiliates have shifted instead to targeting victims via botnets, saying hackers' use of RDP exploits has grown too common.
UniCredit, an Italian banking and financial services company, sustained a data breach exposing information on 3 million customers that went undetected for four years, the company has acknowledged. Find out what data was exposed.
As modern cloud workloads utilize more cloud services, protecting them becomes even more challenging. Traditional network security solutions will not keep your clouds safe.
Join this webinar in which Dr. Christopher Kruegel, Lastline's Co-founder and Chief Product Officer, will discuss the shortcomings of...
A trio of domain name registrars are mandating a password reset after a breach affecting about 22 million accounts occurred in late August. Web.com and two of its brands, Network Solutions and Register.com are contacting victims via email.
The latest edition of the ISMG Security Report offers an in-depth analysis of how to prevent data exposure in the cloud. Plus: why PCI's new contactless payment standard lacks PINs, and how to go beyond the hype to accurately define "zero trust."
Two hackers have pleaded guilty in connection with an extortion campaign tied to the theft of data on about 57 million Uber customers and drivers. The incident led to a massive fine against the ride-sharing company for its tardy breach notification and weak security.
It's one thing to plan for a cybersecurity incident, but quite another to have proper insurance coverage to prepare for such an event. Mark Singer of Beazley shares an overview of the cyber insurance myths and realities.
Facebook is suing NSO Group, a spyware company, alleging it developed a potent exploit to spy on WhatsApp messages sent by diplomats, journalists, human rights activists and political dissidents. Facebook is seeking damages and an injunction forbidding NSO Group from accessing its infrastructure.
What is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl". Enterprises are now awakening to this challenge and attempting to overcome it.
Download this eBook to learn more about:
How "tool sprawl" has created industry fatigue;
The resulting loss of visibility;
Fast-food chain Krystal says it's investigating a payment card "security ncident" that affected as many as 228 of its restaurants across southeastern U.S. states. The incident, which involves one of the company's payment card processing systems, ran from July through last month.
Big data analytics and search tools give organizations the ability to analyze information faster than ever before. But too many organizations deactivate security controls built into Elasticsearch, Amazon S3 buckets and MongoDB when they deploy, leaving their data exposed, says Elastic's James Spiteri.
Agile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks.
Armed with billions of stolen records, fraudsters create synthetic identities to apply for credit cards, loans, and other types of credit causing unprecedented losses to financial institutions.
Download this brief to find out how to block application fraud from the start.
Application fraud continues to be a significant problem for FIs across the U.S. As identity crimes continue to grow, it is increasingly difficult for FIs to determine who they are dealing with in all delivery channels.
Download this whitepaper to learn the effects of online application fraud in the banking industry...