A 60-second TV advertisement, paid for by cryptocurrency exchange platform Coinbase. aired during the Super Bowl on Sunday. It featured a QR code that took those who scanned it to the trading website. Some cybersecurity experts have voiced concerns about using vulnerable QR code on live TV.
The U.S. CISA has issued a "Shields Up" alert to U.S. organizations to protect against potential retaliatory cyberattacks at the hands of the Russians - especially if the Biden administration intervenes in the country's conflict with Ukraine, where Russia has massed some 100,000 troops.
Days after the Federal Bureau of Investigation and the U.S. Secret Service issued a cybersecurity advisory on the ransomware-as-a-service group BlackByte, it hit the corporate IT network of the U.S. National Football League's San Francisco 49ers team.
Security experts explain how the Rust programming language helps the BlackCat ransomware group execute targeted attacks on critical infrastructure. Compared to traditional languages like C or C++, Rust brings speed, security, stability and unparalleled detection evasion capabilities to the table.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the BlackMatter ransomware group has rebranded itself yet again, how the DOJ confiscated stolen Bitcoin worth more than $4 billion and takeaways from a U.S. Senate hearing on open-source...
Ransomware attacks in 2021 amassed a record number of victims in critical infrastructure sectors across Australia, the U.K. and U.S., those countries' lead cybersecurity agencies warn. They share intelligence on attackers' latest tactics to better equip domestic organizations to defend themselves.
The SEC voted 3-1 to advance new, mandatory cybersecurity rules for registered investment advisers, companies and funds. The proposal - open for a 30-day public comment period - would require entities to adopt and implement written cybersecurity policies and a 48-hour incident reporting mandate.
Jeff Williams, co-founder and CTO of Contrast Security, says people have a right to know if the products they use are secure. It's difficult to tell if software is secure, he says, so companies need incentives to build good security programs, improve their software and disclose any flaws they find.
Michael Hamilton, CISO at security firm Critical Insight, discusses health data breach trends. The bad news: The number of major breaches reported to regulators in 2021 hit a record high. The good news: The rate of breaches reported last year compared to 2020 appears to be slowing down.
This edition of the ISMG Security Report analyzes what prosecutors say is the biggest cryptocurrency seizure in U.S. history as well as the biggest financial seizure. It also details how a school district CISO resigned over the district's handling of a severe data breach and busts Zero Trust myths.
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
The European Central Bank, the central bank of the 19 EU countries using the euro, has reportedly warned against potential Russian cyberattacks, and EU banking institutions are reportedly conducting cyber war games to test resiliency against a potential cyber offensive, according to Reuters.
Federal authorities are again warning healthcare and public health sector entities about potential threats posed by ransomware-as-a-service group LockBit 2.0, despite the cybercrime gang's claim that it does not target healthcare organizations.
As a CISO in financial services, Bradley Schaufenbuel of Paychex enjoys the velocity of change - no two days are alike. But with that pace comes a corresponding uptick in supply chain risk, which adds a new degree of difficulty to an already challenging leadership role.
A Kentucky hospital and the Maryland Department of Health are among healthcare sector entities still battling to fully recover from recent ransomware and other disruptive cyber incidents. What can other organizations do to avoid similar fates?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.