Discover crucial insights from former black hat hacker Hector Monsegur on safeguarding your data: Learn to prevent, recognize, and swiftly recover from ransomware attacks with expert strategies.
As quantum computing looms, experts emphasize the urgency of embracing quantum-safe strategies. They highlight the need for proactive measures to protect digital assets from future breaches, deliver long-term data security and ensure the integrity of encryption.
The White House announced six new countries were joining a coalition of international governments signing onto a joint statement on efforts to counter the proliferation and misuse of commercial spyware amid growing threats to government officials in the U.S. and abroad.
In the post-ChatGPT era, nearly every technology company offers some version of artificial intelligence service. But in some companies, the only AI service available is lip service, according to recent Securities and Exchange Commission lawsuits.
Security researchers say they've spotted a hacking campaign with a strong focus in Southeast Asia that could be the work of Chinese state hacking contractor iSoon, the company whose February internal data leak threw a spotlight on a network of private sector companies hacking on behalf of Beijing.
Federal regulators have issued updated guidance about web trackers on patient portals or other health-related websites, saying that collecting and disclosing certain information - such as device IP addresses - does not necessarily pose HIPAA violations, under some circumstances.
European aerospace giant Airbus on Tuesday called off a multibillion-euro plan to acquire a cybersecurity unit of French IT consultancy firm Atos. Share values of cash-strapped Atos fell approximately 20% by the end of the trading day. Airbus' value rose by nearly 1%.
Data breach blast from the past: Data pertaining to 70 million individuals that the ShinyHunters gang claimed were AT&T customers has been leaked via a hacking forum, three years after criminals first offered it for sale. AT&T said the information didn't appear to have been stolen from its systems.
A new analysis has unearthed that cryptocurrency scammers siphoned off a staggering $43.6 million in 2022. Those who enjoy forensics should have a field day in this domain. From ethical hacking to penetration testing and incident response, there are tons of well-paying opportunities.
DHS plans to embed AI in its operations and use large language models to comb through massive amounts of data to investigate child sex traffickers and drug smugglers. While pledging to use AI responsibly, DHS plans to move quickly and target other areas such as immigration and disaster services.
Nation-state-led disinformation campaigns that intend to erode public trust are the biggest threat to the upcoming U.K. election, experts told a parliamentary panel on Monday. Incidents of disinformation created with artificial intelligence have already been reported.
Hackers who are possibly members of a criminal group affiliated with numerous ransomware-as-a-service operations are exploiting a directory traversal vulnerability in a Python library that allows unauthenticated remote attackers access to sensitive information from server files.
A data security firm led by a former CA Technologies executive raised $60 million to boost both organic and inorganic expansion around data and compliance. The round will build on the firm's new data hygiene tool as well as its new controls for detecting and tracking model access to sensitive data.
A spokesperson for the International Monetary Fund confirmed in a statement to ISMG on Monday that the global economic organization is investigating a February cyber incident that compromised 11 email accounts, all of which have since been re-secured.
A Mississippi women's health clinic has filed a proposed class action lawsuit against UnitedHealth Group alleging the disruption in claims processing caused by the cyberattack on the company's Change Healthcare unit and the resulting IT outage is threatening to push the practice into bankruptcy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.