Russian criminals operating online who want to stay out of jail need only to follow a few simple rules, the primary one being: Never target Russians. So it's surprising that security researchers have uncovered a new ransomware-wielding gang of Russian speakers that includes Russian victims on its hit list.
Cloud services are frequently associated with digital transformation and innovation; however, these services also expand cyber-attack surfaces for threat actors to exploit.
Read this whitepaper to learn about:
The economic impact of a data leak;
The surge in ElasticSearch "ransom" demands;
Managing Open Source...
Ransomware is not new, but it still makes front-page news by crippling global enterprises and governments. By encrypting all or part of a computer or system, this malware often causes irreparable data loss, even if the owner pays the ransom.
Read this white paper to learn about the modus operandi for ransomware...
Two Russian nationals have been charged with using phishing techniques and spoofed domains to steal over $16 million from three cryptocurrency exchanges in 2017 and 2018, according to the U.S. Justice Department.
A security incident in which hackers used social engineering techniques to divert Department of Veterans Affairs payments intended for healthcare providers compromised the personal information of 46,000 U.S. veterans.
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
The average amount stolen in a business email compromise scam increased 48% during the second quarter of 2020, but the number of attacks decreased during that period, the Anti-Phishing Working Group reports.
Recent hacking incidents, including one targeting Twitter, are raising awareness of the importance of privileged access management, says David Boda, group head of information security for Camelot Group, operator of the U.K. National Lottery. He describes PAM best practices.
So-called "cybersquatting" attacks are surging, with financial and e-commerce websites - including those of PayPal, Royal Bank of Canada, Bank of America and Amazon - among the most frequent targets, according to Palo Alto Networks' Unit 42.
A recently uncovered malicious email campaign is delivering to businesses multiple types of malware, including a Trojan designed to steal banking credentials and other financial information, according to a research report from Cisco Talos.
A group of Democratic senators, including Minority Leader Charles Schumer of New York, is urging the Trump administration to impose sanctions on Russia and other "governmental actors" that are waging efforts to interfere with the November election interference.
Twitter is investigating the hacking of an account associated with Indian Prime Minister Narendra Modi for an apparent cryptocurrency scam, according to news reports. The incident appears similar to a July Twitter hack that hit well-known targets in the U.S. and Europe.
Evilnum, a hacking group that targets fintech firms mainly in the U.K. and Europe, is deploying a new remote access Trojan, according to Cybereason. The group is targeting "know your customer" procedures to start these attacks.