Ransomware Profits Dip as Fewer Victims Pay ExtortionAs Funding From Ransoms Goes Down, Gangs Embrace Re-Extortion, Researchers WarnBad news for ransomware groups: Experts find it's getting...
Author:
What Makes Sumo Logic an Appealing Target for Private Equity
What Makes Sumo Logic an Appealing Target for Private EquitySumo Logic Is a Well-Regarded SIEM Provider, But Profitability Remains ElusiveThoma Bravo, Vista Equity Partners and rival...
Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management
Why Healthcare Orgs Must Prioritize 3rd-Party Risk ManagementVenminder CEO James Hyde on Reducing Risk Exposure From Vendor RelationshipsWith breaches on the rise and the average cost...
Targets of Opportunity: How Ransomware Groups Find Victims
Targets of Opportunity: How Ransomware Groups Find VictimsWhile Some Sectors Are More Prized Than Others, Profits Trump All ConsiderationsAs ransomware continues to pummel numerous sectors, and...
Securing the SaaS Layer
Securing the SaaS LayerIn this episode of "Cybersecurity Unplugged," Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized...
David Derigiotis on the Complex World of Cyber Insurance
David Derigiotis on the Complex World of Cyber InsuranceIn this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability...
Protecting the Hidden Layer in Neural Networks
Protecting the Hidden Layer in Neural NetworksIn this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning...
The Persisting Risks Posed by Legacy Medical Devices
The Persisting Risks Posed by Legacy Medical DevicesLegislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities,...
Live Webinar | You Don’t Know Your Environment – and IT Doesn’t Either
Live Webinar | You Don't Know Your Environment - and IT Doesn't EitherPost ContentRead MoreDataBreachToday.com RSS Syndication
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware Recovery
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware RecoveryPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable Program
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable ProgramPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!Post ContentRead MoreDataBreachToday.com RSS Syndication
Russian Nuisance Hacking Group KillNet Targets Germany
Russian Nuisance Hacking Group KillNet Targets GermanyBerlin Pledges Leopard 2 Tanks for Ukraine, Provoking Passing DDoS AttacksA pro-Kremlin hacking group with a history of launching distributed...
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack Case
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack CaseDeal to End Lawsuit in 2021 Breach Follows a $4.2 Million Settlement in a 2019 HackA...
European IoT Manufacturers Lag in Vulnerability Disclosure
European IoT Manufacturers Lag in Vulnerability DisclosureResearch Firm CEO Says IoT Makers Treat Cybersecurity as Somebody Else's ProblemA review of internet of things manufacturers by Copper...
Coinbase Fined 3.3 Million Euros by Dutch Central Bank
Coinbase Fined 3.3 Million Euros by Dutch Central BankCompany Delayed Registering as a Money Transmitter, Say BankersThe Dutch central bank fined Coinbase 3.3 million euros, saying...
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimo
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimoAl menos dos agencias federales en los EE. UU. fueron víctimas de...
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíbles
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíblesLos investigadores de seguridad cibernética han descubierto una muestra de PlugX...
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain Attack
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain AttackThe "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio...
Capital One Joins Open Source Security Foundation
Capital One Joins Open Source Security FoundationOpenSSF welcomes Capital One as a premier member affirming its commitment to strengthening the open source software supply chain.Read MoreDark...
Endpoint Protection / Antivirus Products Tested for Malware Protection
Endpoint Protection / Antivirus Products Tested for Malware ProtectionSix out of the eight products achieved an "A" rating or higher for blocking malware attacks. Reports are...
‘No-Party’ Data Architectures Promise More Control, Better Security
'No-Party' Data Architectures Promise More Control, Better SecurityConsumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms...
‘Sliver’ Emerges as Cobalt Strike Alternative for Malicious C2
'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open...
LastPass Suffers Data Breach, Source Code Stolen
LastPass Suffers Data Breach, Source Code StolenResearchers warned that cyberattackers will be probing the code for weaknesses to exploit later.Read MoreDark ReadingResearchers warned that cyberattackers will...
Killnet hits Norwegian websites. Hacktivists tied to Russia’s government. Looking ahead to new cyber phases of Russia’s hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.
Killnet hits Norwegian websites. Hacktivists are tied to Russia’s government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea...
SPHERE SESSION | Carole Cadwalladr on threats to democracy
TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world’s first co-security unconference, for a discussion about...
teissTalk: Shadow-IT – keeping security out of the way of productivity?
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we...