Microsoft is revealing details of an advanced spyware campaign in a bid to neutralize its effectiveness. It fingers Austrian firm DSIRF as responsible for coding malware known as "Subzero," which Microsoft researchers dub "Knotweed." Pressure is mounting on companies that supply spyware apps.
To build a defense strategy for valuable company data that winds up on the dark web, CISOs need to understand the dark web, know which company data could be on it and know the market value of that data, says Supro Ghose, senior vice president and CISO of a U.S.-based financial institution.
Since the decline and fall of the Conti ransomware brand earlier this year, LockBit appears to have seized the mantle, listing more victims on its data leak site than any other. Experts say the group's focus on technical sophistication and keeping affiliates happy remain key to its success.
In March of 2020, DeVry University had 40 active campuses across the United States. Then the pandemic hit, and those that were receiving on-site classes were swiftly converted to remote learning. The cybersecurity challenges were immediate and huge, and CISO Fred Kwong shares how he tackled them.
The chairman of the U.S. House Intelligence Committee vowed more action against makers of advance spyware such as Israel's NSO Group while witnesses pressed the panel to commit the intelligence community's resources to disrupting spyware companies.
Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
A nice $10 million awaits tipsters capable of providing the U.S. federal government with information leading to the identification of state-sponsored hackers who attack systems vital to America's day-to-day operations. Of special interest are hackers employed by North Korea.
Sri Lanka's national crisis has yet another downside: growing insecurity in cyberspace. Collapse of the Sri Lankan rupee has caused the price of cybersecurity product license renewals to skyrocket. Opportunistic hackers are drawn to the island. Cyber insurers are leery of renewing existing policies.
The cybersecurity of devices that use semiconductors is imperative in today's digital world, says Prathap R. This security industry veteran, who has 16 years of experience in semiconductors, discusses how IoT security has evolved over the past two decades.
A recent Securities and Exchange Commission filing by Tenet Healthcare, a major Dallas-based healthcare delivery organization, provides the latest public peek into the hefty impact a disruptive cyber incident can have on a healthcare entity's finances.
Security researchers identified a rootkit active as recently as 2020 that's made to burrow deep into computers when firmware initiates the operating system. Infected motherboards examined by Kaspersky all ran on Intel's H81 chipset. The malware comes from an unknown Chinese-speaking threat actor.
Retired Lt. Gen. Rajesh Pant, national cybersecurity coordinator for the Government of India, says the six-hour cybersecurity incident reporting requirementis necessary because it will help protect all enterprises from cyberattacks. He discusses India's cybersecurity strategy.
Michael Alan Stollery, the chief executive of Titanium Blockchain, pleaded guilty in U.S. federal court to securities fraud in a scheme involving a fraudulent cryptocurrency initial coin offering in which $21 million was stolen. Stollery faces up to 20 years of imprisonment.
Federal regulators say credit unions should report cyber incidents within 72 hours, including those experienced by third-party vendors that process member data. Just five deposit, payment, and data processing service companies dominate the credit union market.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.