The government of India withdrew a long-anticipated personal data protection bill from Parliament. The government of Prime Minister Narendra Modi vowed to instead introduce a comprehensive framework of global standard laws including digital privacy laws
An Indiana-based neurology practice is notifying nearly 363,000 individuals that their sensitive information was compromised in a recent ransomware attack - and that some of the data was made available on the dark web. Russian ransomware group Hive has been implicated.
A cyberattack that temporarily paralyzed Albania's pivot to digital government likely came from Iranian hackers. The attack occurred just days before members of the Mujahedin-e-Khalq, a group dedicated to overthrow of the Islamic Republic of Iran, were set to host a two-day conference.
Solana identified a common thread in the million-dollar cyberattack on its hot wallets. The exploit might come down to wallet recovery passcodes stored in plaintext on a centralized server. There is "no evidence" that the Solana protocol or its cryptography were compromised.
As ransomware attacks continue to pummel organizations, Rapid7 Chief Scientist Raj Samani says victims must identify how the attacker broke in and if they've given themselves persistent ways to regain access. Otherwise, he says, "They'll hit you again and again."
Researchers from cybersecurity firm Mandiant say they've discovered a network of inauthentic news sites transmitting Chinese propaganda apparently all under the control of Shanghai Haixun Technology Co., a Chinese PR firm that advertises "positive energy packages."
This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.
Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
Multiple individuals returned a total of $11.4 million of the $190 million worth of cryptocurrency drained from cross-chain bridge Nomad on Wednesday, blockchain security firm PeckShield tells ISMG. Three cryptocurrency wallets currently hold $95 million of the stolen funds, it says.
In his role as CISO of intelliflo, veteran leader John Rouffas manages cybersecurity, risk and privacy - all in one role. And in doing so, he says, "I like to fly by the seat of my pants a bit." He explains his unique approach to leadership and mentoring.
Hackers are using an unknown exploit to draw down internet-connected wallets on the Solana blockchain. So far, thieves have made off with about $8 million worth of cryptocurrency, predominantly from mobile wallet users of Phantom and Slope. Solana is working to identify the root cause.
Britain's Conservative Party is holding a leadership contest, with the winner set to become the country's next prime minister. But the balloting process has been delayed after the National Cyber Security Center warned that hackers could abuse a process allowing members to change their online vote.
Health insurer Aetna ACE reported to federal regulators a health data breach affecting nearly 326,000 individuals tied to an apparent ransomware incident involving OneTouchPoint, a subcontractor that provides printing and mailing services to one of the insurer's vendors.
Attackers drained crypto assets worth nearly $200 million on Monday from cross-chain bridge Nomad, a "security-first cross-chain messaging protocol." Experts say the attack occurred after Nomad updated its smart contracts and inadvertently made it easy to spoof transactions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.