Local officials with the city of Rolle, located near Lake Geneva in Switzerland, have acknowledged that they initially misjudged the impact of a recent ransomware attack that reportedly led to the leak of residents' data on the darknet.
Sen. Pat Toomey of the Senate Banking Committee is requesting input from the cryptocurrency and blockchain community to inform future legislation on its security and privacy. Several experts praise efforts to regulate the space, but cite its complexities.
A recently uncovered phishing campaign used fake COVID-19 vaccination forms - and took advantage of confusion over whether employees will return to their offices this fall - to harvest workers' email credentials, according to analysts with security firm INKY. The malicious messages appear to come from victims' HR...
As initial consumer reactions to the COVID-19 pandemic settled into durable, more defined buying behaviors in the second half of 2020, the importance of a robust and seamlessly connected omni-channel ecosystem became evident.
The FBI has issued a warning about Hive ransomware after the group took down Memorial Health System last week. The alert details indicators of compromise, tactics, techniques and procedures associated with these ransomware attacks to help organizations better defend themselves.
T-Mobile CEO Mike Sievert on Friday issued an official mea culpa for the data breach that exposed information on 54 million of the company's customers and prospects. On Thursday, a hacker who claimed responsibility for the attack called the company's cybersecurity "awful," the Wall Street Journal reports.
A vulnerability in Microsoft Azure's database service Cosmos DB has potentially put at risk thousands of Azure customers, including many Fortune 500 companies, according to the security firm Wiz. Microsoft has mitigated the flaw.
At least 10 U.S. government agencies are planning to increase the use of facial recognition technologies by 2023, according to a GAO report. The growing utilization comes as facial recognition technology raises privacy concerns.
Phishing, ransomware and unauthorized access remain the leading causes of personal data breaches as well as violations of data protection rules, Britain's privacy watchdog reports. The U.K. government has also been caught out by breaches and leaks involving military secrets and CCTV footage from a government building.
In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.
Accreditation organization CREST has concluded an investigation into whether NCC Group employees cheated on its penetration-testing exams, finding that the cybersecurity business's training materials violated its rules. It says NCC Group has agreed to overhaul its processes and demonstrate compliance.
Four months after Microsoft released the first security update for flaws in several versions of its on-premises Exchange Server software, the company has issued its first official guidance on the three actively exploited ProxyShell vulnerabilities.
To make the transformation to a DevSecOps approach, enterprises must slowly change the corporate culture by finding early adopters and starting small, says Sean D. Mack, CIO and CISO at Wiley, an education and research company.
After a string of high-profile hits, many of the largest and most notorious ransomware operations recently disappeared. But the pace of ransomware attacks hasn't diminished because of a steady influx of new operations, existing operations getting more sophisticated and old players rebranding.
Cloud-based SIEM and SOAR are just two of the new solutions that represent the modernization of security operations. Greg Martin of Sumo Logic discusses how such solutions are helping enterprises overcome legacy technology challenges such as visibility and complexity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.