A large-scale cyberespionage campaign by notorious China-based advanced persistent threat actor Mustang Panda is targeting government, academic and other sectors globally. Its main targets include Asia-Pacific organizations in Myanmar, Australia, the Philippines, Japan and Taiwan.
Trade-related services resumed Monday at Central Depository Services Ltd. in India, days after trading was suspended during a cyberattack Friday. All pending trades have now been settled, though brokers report some continued IT issues. The service says it appears that no data has been compromised.
A year after buying Wickr's encrypted instant-messaging app, Amazon will shut down Wickr Me on Dec. 31, 2023. The app has come under law enforcement scrutiny for allegations that the strong encryption shields drug peddlers and child abusers from prosecution.
The U.S. Department of Justice on Friday charged 10 individuals with using business email compromise and money laundering schemes to target public and private insurers. These schemes targeted Medicare, state Medicaid programs, private health insurers and numerous other victims.
Payment card security group PCI Security Standards Council has a new standard aimed at smoothing the contactless payment experience at retailers by ensuring that a single commercial device can process card data and a PIN. Consumers across the globe increasingly use contactless methods for payment.
User education is vital to boosting the detection rate of phishing emails or social engineering scams that could lead to data breaches or ransomware infestations. Technology alone can't make websites or email inboxes safe since both are business-critical for all users, says ID Agent's Amelia Paro.
The shift to remote work introduced new security risks for Piedmont Healthcare since workers could no longer rely on the firm to protect their information. Employees need to understand the security issues associated with connecting to the network using personal devices, says CISO Monique Hart.
U.S. federal authorities are warning critical infrastructure sectors including healthcare to be on the lookout for indicators of Hive ransomware. Healthcare is a particular favorite of Hive affiliates because hospitals and other medical providers often pay ransoms.
Why is credential stuffing hard to solve? Are weak passwords the only reason behind credential stuffing attacks? Experts Sanjay Singh, head of DevSecOps at Games24x7, and Navaneethan M., CISO at Groww, explain how geo-based authentication, user behavior analytics and monitoring can detect breaches.
Budding cybercriminals can purchase a large number of specialized services from the ransomware criminal underground, reports cybersecurity firm Sophos. The services range from malware distribution to network scanning and even include OPSEC-as-a-service.
IT and security organizations can simplify the zero trust journey in the cloud by allowing internet traffic to go directly to the required destination instead of routing through the data center, says Sudip Banerjee, field CTO for Zscaler for the Asia-Pacific and Japan region.
As the banking sector undergoes digital transformation, the future of banking requires both securing transactions and building cyber resiliency through consistent cyber drills and creating a private network for secure financial transaction, says professor D. Janakiram, director of IDRBT.
Some organizations struggle with deciding whether to add an XDR framework to the existing threat detection and response layer, but a good analysis engine can simplify the process of processing data from multiple sources, according to SentinelOne's Vats Srivatsan and Diwakar Dayal.
A well-orchestrated strategy for responding to ransomware or malware intrusion requires the right mindset and an approach that covers the entire kill chain process. Nitin Varma, managing director of CrowdStrike for India and SAARC, discusses how to respond and restore after being attacked.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.