The Secret Service of Ukraine has arrested five Ukrainian citizens on suspicion of being part of a cybercrime group called Phoenix, which it says has been tied to hacking hundreds of mobile devices, stealing personal data and also selling "hacking as a service" to others.
Automation, a good criminal network and the ability to use accounts as an alias are some of the factors contributing to synthetic ID fraud, says a panel of three experts.
Three U.S. financial agencies have conducted a series of "policy sprints" around cryptocurrency assets and related regulatory gaps, and plan to amend existing guidance and regulations to address security and market risks, the Board of Governors for the Federal Reserve said this week.
Today's remote workplace is a fertile breeding ground for insider risk - not just malicious threats, but accidental ones and compromised insiders, too. Brian Reed of Proofpoint looks at the different insider threat personae and how to mitigate their unique risks.
Ransomware attackers commonly bypass traditional email gateways, targeting people directly to gain access to a company's systems. The answer? Replace these porous controls with a people-centric security strategy, says Matt Cooke of Proofpoint.
The NSO Group is the target of a lawsuit filed by Apple, which alleges that the spyware maker abused Apple's products and services to carry out spying operations. The news follows the NSO Group's blacklisting by the U.S. government, a score downgrade by Moody's, and a reportedly failed deal with France.
Learning management platform Moodle, which caters to about 300 million users in 241 countries, is vulnerable to four high-risk flaws, according to a security advisory issued by the Indian Computer Emergency Response Team, or CERT-In.
On the heels of supply chain attacks, critical infrastructure hits and ransomware gone wild, what more can we expect from cyber attackers in 2022? Plenty, says Derek Manky of Fortinet's FortiGuard Labs. He details his New Year predictions.
Though there has been a decrease in expense fraud, vendor collusion fraud has seen a significant increase this year, says Bethmara Kessler, faculty member at the Association of Certified Fraud Examiners, or ACFE.
Chinese threat actors may increasingly look to steal sensitive, encrypted data in hopes of decrypting it with quantum computing technology in the years ahead, according to a new report. Researchers say Chinese threat actors may target government, business and academic data with long-term value.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.