Hotel and casino giant MGM Resorts says the recent hack attack against it cost $110 million in lost revenue and mitigation expenses. The publicly traded company expects to recoup losses and costs to date via cyber insurance. MGM Resorts says that its investigation remains ongoing.
America's largest hospital lobbying group says Congress should pressure health regulators into retracting a warning that online trackers embedded into patient portals could violate medical privacy law. Sen. Bill Cassidy, R-La., is seeking feedback for potential improvements to HIPAA.
Experts discuss the top things that companies, board directors and cyber leaders need to do now to be ready for compliance since the SEC fast-tracked adoption of its cybersecurity disclosure rules.
Clorox said Wednesday an August cyberattack had caused a drop in the bleach manufacturing giant's sales and profits in the quarter ended Sept. 30. The company said organic sales will drop between 21% and 26% due to widespread disruption, order processing delays and product outages after the hack.
Hackers have weaponized a zero-day in a popular workspace collaboration tool to create administrator accounts and gain unrestricted access to their on-premises instances of the software, Atlassian's Confluence Data Center and Server products, which serves millions of daily active users.
This week, Bitsight found a lot of internet-exposed industrial control systems, Apple issued new patches, Sony confirmed a data breach, Google and Yahoo tackled spam, Qualcomm patched three zero-days, Cisco revealed zero-day exploits in VPN, and the FBI warned of twin attacks.
Fundraising software powerhouse Blackbaud will pay $49.5 million to settle a multistate investigation into the company's data security practices and its response to a 2020 ransomware attack. The firm must also enhance its security and not misrepresent its data security practices.
This week, the FTX hacker moved more than $100 million of funds as the trial of the company's former CEO begins; crypto losses in the third quarter of this year were $685.5 million; and the DOJ said that China uses crypto to hide funds and identities in its illicit drug operations.
BlackBerry will split its $418 million cybersecurity business and $206 million IoT business into separate, independently operated entities following a strategic review that lasted five months. The split will help shareholders clearly evaluate the performance and future potential of each business.
What do "bank transfer request.lnk" and "URGENT-Invoice-27-August.docx.lnk" have in common? Both are the names of malicious files being sent as part of a phishing campaign attributed to the Qakbot botnet group that has continued despite law enforcement disrupting Qakbot's operations in late August.
Join us to learn from Cisco about what new, modern and sophisticated threats look like today, and how these complex threats make it harder to succeed at effective threat detection and response
A clutch of vulnerabilities in an open-source tool used by major corporations to scale up machine learning models could lead to remote takeover, says a cybersecurity firm in a warning downplayed by Meta, which co-manages the open-source project.
Microsoft says it spotted an unusual hacking campaign in which hackers attempted to move laterally through the Azure cloud after compromising a virtual SQL server. It marks the first time that computing giant defenders have seen a lateral movement attempt with SQL Server as the starting point.
Atos snagged the longtime European CEO of Accenture Technology to lead its soon-to-be-independent $5.76 billion cybersecurity, big data and digital unit. Yves Bernaert, 55, will split Atos' infrastructure and data management and business and platform solutions unit from its high-growth Eviden unit.
Email is the No. 1 attack vector in the world today. Threat actors target and exploit your people with phishing, malware, and social engineering-based attacks. That’s why it’s time to take action. Time to mitigate advanced email threats, prevent initial access, and break the attack chain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.