Html Sitemap

DC Metropolitan Police Hit With Cyberattack
Thoma Bravo to Buy Proofpoint for $12.3 Billion
Lawmakers Seek to Expand CISA's Role
Cybersecurity Leadership: It’s About Cloud Security
Tips on Enhancing Supply Chain Security
FluBot Spyware Spreads Across Europe
'Ghostwriter' Disinformation Campaign Targets NATO Allies
IRS Sharpens Cryptocurrency Investigation Skills
Touhill Takes Charge at Carnegie Mellon SEI’s CERT
Civilian Cyber Reserve Program Proposed
(ISC)2: Only 13% of Cybersec Pros Had a Cyber Education
Chinese Cyberespionage Campaign Used Another Backdoor
Google COVID-19 Contact-Tracing Tool Exposes Data: Lawsuit
Fighting Ransomware: A Call for Cryptocurrency Regulation
Experian API Flaw Raises Questions
Rethinking Cybersecurity by Managing Complexity
ISMG Editors’ Panel: Cyber Extortion and More
Babuk to Close Ransomware Operation After DC Police Attack
CISA: 5 Agencies Using Pulse Secure VPNs Possibly Breached
Ransomware Gang Exploits SonicWall Zero-Day Flaw
GitHub Leaks: Lessons Learned
NSA Offers OT Security Guidance in Wake of SolarWinds Attack
Vulnerability Management: Essential Components
Researcher Finds New Vulnerabilities in Cellebrite's Tools
Attackers' Dwell Time Plummets as Ransomware Hits Continue
Ransomware: Reducing the Risk to Universities
Chinese Group Apparently Targeted Russian Defense Contractor
Buer Dropper Malware Updated Using Rust
Pulse Secure VPN Zero-Day Flaw Patched
Security Incident Leads Scripps Health to Postpone Care
Iran's Military Reportedly Backs Ransomware Campaign
IT Modernization Grants Will Prioritize Cybersecurity
NIST Seeks Input on HIPAA Security Rule Guidance Update
The Use of Data to Identify Fraud
Millions of Dell Devices Vulnerable to Update Driver Flaw
PHP Composer Flaw That Could Affect Millions of Sites Patched
Ransomware Hits Australian Telecom Provider Telstra’s Partner
SmileDirectClub: Attack Taking Big Bite Out of Revenue
3 Bills Focus on Enhancing Electrical Grid Cybersecurity
DDoS Attack Knocks Belgian Websites Offline
DHS Secretary: Small Businesses Hard-Hit by Ransomware
Exim Patches 21 Flaws in Message Transfer Agent
Mitigating the Risks of Malicious OAuth Apps
'Hack the Pentagon' Program Expands
Newly Patched Peloton API Flaws Exposed Users' Private Data
Intel, AMD Dispute Findings on Chip Vulnerabilities
US Physics Laboratory Exposed Documents, Credentials
Exclusive Interview: New HHS ONC Leader on Health Data Security
ISMG Editors Discuss Cryptocurrency Regulations and More
DNS Flaw Can Be Exploited for DDoS Attacks
CISA Alert Describes FiveHands Ransomware Threat
'Panda Stealer' Targets Cryptocurrency Wallets
How Patched Android Chip Flaw Could Have Enabled Spying
Accenture, Forcepoint, Others Make Acquisitions
US and UK Issue Joint Alert on Russian Cyber Activity
Malspam Campaign Used Hancitor to Download Cuba Ransomware
Colonial Pipeline Confirms Ransomware Causing Disruptions
Colonial Pipeline Starts Recovery From Ransomware
More Healthcare Disruptions Tied to Vendor Incidents
FBI: DarkSide Ransomware Used in Colonial Pipeline Attack
Tulsa City Officials Report Ransomware Attack
Pipeline Attack: 'Time for a Disproportionate Response'
Colonial Pipeline: 'A Global Day of Reckoning'
Authentication Challenges in Faster Payments
Healthcare's Widening Cyber 'Seams and Cracks'
Alerts: Avaddon Ransomware Attacks Increasing
Groups Call for Alignment of HIPAA Privacy Rule, Other Regs
CISA Awaits Technical Details on Colonial Pipeline Attack
Microsoft Patches 4 More Exchange Flaws
Colonial Pipeline Attack: 'All Monsters Are Human'
APT Group Using Backdoor for Espionage
Agentless Cloud Security and Compliance for AWS, Azure, and GCP
Colonial Pipeline Attack Leads to Calls for Cyber Regs
Babuk Ransomware Gang Posts More DC Metro Police Data
Colonial Pipeline Restarts Operations Following Attack
Biden Signs Sweeping Executive Order on Cybersecurity
Utilizing SOC Automation to Its Full Capacity
Making the Most of XDR
Cloud Identity Security and the Power of PAM
Colonial Pipeline Attack: 'We're Simply Unprepared'
Taking a Fresh Approach to Combating Ransomware
Take the Complexity Out of Security
Profiles in Leadership: Manish Dave of LafargeHolcim
Addressing Ransomware's Data Privacy Concerns
Navigating State Data Privacy Laws
Biden: Russian Government Not Behind Colonial Pipeline Attack
Why Endpoint Protection Is Key to Hybrid Work
Biden's Cybersecurity Executive Order: 4 Key Takeaways
How to 'Demystify' Cybersecurity
Building Accountability for Cybersecurity
Patched Wi-Fi Vulnerabilities Posed Risks to All Users
Do You Need a Human OS Upgrade?
ISMG Editors’ Panel: Analysis of Colonial Pipeline Attack
Creating Cultural Change With the Right Security Context
Profiles in Leadership: Diego Souza
Cloud Security: Encryption and Key Management Essentials
Business Imperative: Cloud Adoption, With Security
Profiles in Leadership: Tim Heger
Authentication Methods to Support 'Work From Anywhere'
Debunking Myths About MSPs
Rethinking Vulnerability Practices to Better Manage Risk
Profiles in Leadership: Michael Lines
Why Crowdsourcing Cybersecurity Needs Additional Innovation
Ripped From the Headlines: Incident Response Best Practices
Gaining Control of the 'Internet of Medical Things'
Interpol's Top Cybercrime Cop on Ransomware, Supply Chains
Fresh Strategies Offer Hope for Combating Ransomware Scourge
How Not to Handle a Data Breach
Defending Against Socially Engineered Scams
Defending Research Programs Against Foreign Threats
Ransomware Attack Leads to IT Shutdown for Irish Hospitals
Why It’s Time for a Cybersecurity ‘Reboot’
DarkSide Ransomware Gang Says It Has Shut Down
'Zero Trust': Beyond Transformation
Paying a Ransom: Does It Really Encourage More Attacks?
New Qualys CEO Tackles Cybersecurity Asset Management
Preparing for ‘Shift Left’
Threat Hunting Report: Beyond Supply Chain Attacks
Tech Spotlight: Endpoint Security
Automation and Management of Digital Identities
Tech Spotlight: Tools to Secure the New Landscape
Progress in the Fight Against Ransomware
ThreatINSIGHT Via Network Detection and Response
SASE: The Need, the Challenges, the Payoff
Passwordless: Is It Finally Ready for Prime Time?
Sophos on 2021 State of Ransomware
Fraud 2021: Mules, Synthetic IDs, Deep Social Engineering
'Zero Trust' Security for the Mainframe
Cyber Journalism: Truth Is Stranger Than Fiction
How Risky Is Cyber Insurance?
SolarWinds, Ransomware and the State of the Industry
RSA CEO Rohit Ghai on the New RSA
RSA's Zulfikar Ramzan: Beyond Digital Transformation
CISO Spotlight: Marene Allison, Johnson & Johnson
Shattering Cybersecurity's Glass Ceiling
Election Security: Lessons Learned from 2020
Making Zero-Day Flaws Disappear
Why Ransomware Attacks Keep Getting Worse and Worse
Ruby Zefo on Extreme Makeover: Privacy Edition
Michael Daniel on Operational Collaboration
Cybersecurity Resilience: One CISO's Pandemic Takeaways
Touhill: What It Takes to Be Resilient
Regional Security in COVID-19
Investing in Solutions for Tomorrow’s Attacks
Project 2030: Scenarios for the Future of Cybercrime
The Role of Breach Controls in Network Security
Security for a New Era of Resilience
Irish Healthcare Sector Was Hit by 2 Ransomware Attacks
Real-Time Application and Cloud Workload Protection
CISO Spotlight: Don Cox, CIBR
RSA's CEO: For Maximum Resiliency, Unleash Chaos Monkeys
2 Bills Introduced in Wake of Colonial Pipeline Attack
Visible Figures: Bridging the Skills Gap
Art Coviello: 'It's a Roaring '20s for Technology'
Taking on SOAR: The Challenges and Opportunities
Introducing MITRE ATT&CK Defender
CISO Spotlight: Troels Oerting, World Economic Forum
The Human Element: Not Our Biggest Risk?
Driving Healthcare Innovation With a Security Mindset
Cybersecurity Metrics That Matter
Profiles in Leadership: Adrian Mayers, Premera Blue Cross
FDA: Strong Smartphone Magnets Can Affect Cardiac Devices
RSA Cryptographers' Panel: SolarWinds, NFTs and More
Profiles in Leadership: Anne Hännikäinen, Fintraffic
Neuberger: Ransomware Requires International Response
Tracking DarkSide Ransomware Gang's Profits
Watering Hole Attack Targeted Florida Water Utilities
Profiles in Leadership: Suren Naidoo, The Foschini Group
Profiles in Leadership: Francis McGillicuddy, Finleap
The Rise of Surveillance States
Will Crypto Displace the Dollar?
Developing a Culture of Security
What Should a Modern SOC Look Like?
Cybercrime Crystal Ball: Which Threats Loom Largest?
International Student Health Insurer Breached
Colonial Pipeline CEO Confirms $4.4 Million Ransom Payment
What Would National Data Breach Notification Law Look Like?
Colonial Pipeline Ransomware Attack: CISOs React
Profiles in Leadership: Rebecca Wynn
Attackers Were Inside SolarWinds in January 2019
Researchers Uncover Another DarkSide Ransomware Variant
New WastedLocker Variant Exploits Internet Explorer Flaws
Solarium Commission's Recommendations: The Top Priorities
Eyes Wide Open: Visibility in Digital Risk Protection
Alaska Health Department Services Affected by Malware Attack
Russian Sentenced in $1.5 Million Cyber Tax Fraud Scheme
Defending Entry Points: A New Approach
Solving the Data Vulnerability Problem
Data Risk Governance: The BISO's Perspective
ISMG’s Editors’ Panel: Improving Hiring Practices and More
Healthcare’s Post-Transformation Agenda
4 Ways to Use Zero Trust Beyond VPN Replacement
Passwords: BioTech and Pharma Both Need a New Path
Colonial Pipeline CEO to Testify at Congressional Hearing
Attackers Allegedly Target Russian Federal Networks
Supply Chain: The Role of Software Bills of Materials
Windows Push Notifications Used for Fraud
StrRAT Masquerades as Ransomware
Should Paying Ransoms to Attackers Be Banned?
Cyber Insurance: Higher Premiums, Limited Coverage
FBI Warns Healthcare Sector of Conti Ransomware Attacks
Privacy Rights: GDPR Enforcement Celebrates Third Birthday
OnDemand | Managing Insider Risk with a Hybrid Workforce
Iran Devises Way to Convert Oil to Bitcoin
Cybersecurity Regs for Pipelines Reportedly Coming Soon
Update: UK Insurer Recovering From Ransomware Attack
Fourth Guilty Plea in UPMC Hacking Incident
Quantum Computing: Assessing the Risks
OnePlus Co-Founder Carl Pei Targeted in Twitter Hack
VMware Urges Rapid Patching for Serious vCenter Server Bug
How Secure Is Your Security Data Lake?
Data Breach Response Essentials for the Ransomware Age
Cybersecurity Executive Order: An Assessment
Nearly 50,000 IPs Compromised in Kubernetes Clusters
Eyes Wide Open: Visibility in Digital Risk Protection
Federal Agencies Struggling With Supply Chain Security
How the Hydra Darknet Market Broke the $1 Billion Barrier
Why Clinical Lab HIPAA Settlement Is Significant
Avoiding 'Alert Fatigue'
Belgium Investigating Attack on Interior Ministry Network
Suspected Iranian Group Wages Wiper Attacks on Israel
Health Data Breach Tally's 2021 Surge Continues
DHS Unveils New Cybersecurity Requirements for Pipelines
Canada Post: Breach Affects 1 Million
FBI to Share Compromised Passwords With Have I Been Pwned
SolarWinds Attackers Return With Fresh Phishing Campaign
ISMG Editors’ Panel: Cyber Insurance; Ransomware Update
FBI: Attackers Continue to Exploit Unpatched Fortinet Flaws
Pulse Connect Secure VPNs Still Under Attack
Identity: The Present and Future
Biden Budget Seeks to Invest Billions in US Cybersecurity
New Ransomware Variant Targets US Hospitality Sector
How Security Automation is Strengthening Defenses
Leveraging Machine Learning to Fight Money Laundering
$7 Million Digital Advertising Scam: Russian Man Convicted
Meat Processing Grinds to Halt After 'Cybersecurity Attack'
Reimagining Digital Forensics
Data Breach Culprits: Phishing and Ransomware Dominate
Siemens Patches Critical Security Flaw in Certain Products
Sweden Shut Down Infectious Disease Database After Intrusions
EU to Unveil Digital Wallet App
What's in Biden's Proposed FY 2022 HHS Budget?
Are Ransomware Attacks Impeding Criminal Prosecutions?
DOJ Seizes 2 Domains Linked to USAID Phishing Campaign
White House Puts Russia on Notice Over JBS Ransomware Hit
Uninstall Now: Critical WordPress Plug-In Flaw Exploited
Researchers Describe Antivirus Flaws
US Army Apparently Rescinds IoT Device Ban
FireEye to Separate from Mandiant Solutions
Using Behavior Metrics to Detect Authorized Payment Fraud
FBI Attributes JBS Attack to REvil Ransomware Operation
Network Intrusion, Suspected Ransomware Attack at Fujifilm
Supreme Court Votes to Limit Computer Fraud and Abuse Act
Ransomware Industry Sees Three New Entrants
Scripps Health Attackers Stole PHI of 147,000 Patients
Amazon Sidewalk Raises Privacy and Security Concerns
White House Urges Cybersecurity Boost: Business Reaction
White House Urges Businesses: Improve Ransomware Defenses
ISMG's Editors' Panel: US Election Security Lessons Learned
Profiles in Leadership: Mario Demarillas of Exceture
Profiles in Leadership: Nicki Doble, Cover-More Group
Where's the Beef? Ransomware Hit Highlights Cyber Problems
HHS OCR Issues 19th 'Right of Access' Settlement
Google Finds New Exploit That Alters Chip Memory
Is STG Building a New Cybersecurity Powerhouse?
MSPs: Tools, Transformation and Consolidation
Cox Media Group Affiliates Go Offline
Customer Identity and Access Management - at Scale
UK Cyber Security Council to Tackle Education, Standards
EU Adopts New Privacy-Focused Data-Sharing Tools
Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'
Cobalt Gang Members Sentenced by Kazakhstan District Court
US Prosecutors Charge Latvian Woman in Trickbot Gang Case
Colonial Attackers Used Compromised VPN Credentials
Siloscape Malware Reportedly Targeting Windows Containers
Identity Theft: Impact on Victims Is Getting Worse
Hospital Pays Ransom in Exchange for Promised Data Destruction
$2.3 Million of Colonial Pipeline Ransom Payment Recovered
Verizon Breach Report: Ransomware, Phishing and Top Trends
Encrypted Communications Network 'Anom' Was Sting Operation
Profiles in Leadership: Stephenie Southard, CISO, BCU
Widespread Internet Outages: Fastly Reports Problem Fixed
Profiles in Leadership: Mex Martinot, Siemens Energy
NCSC Warns of Surge in Ransomware Attacks Against Schools
CISA Expanding Mandatory Vulnerability Disclosure Program
Surge of Attacks on VMware Hosts, Threat Intel Firm Says
APT Group Kimsuky Has New Attack Technique, Researchers Say
Proposed Settlement in Nebraska Medicine Data Breach Lawsuit
Colonial CEO at Senate Hearing Details Ransomware Attack
Private Equity Firms Acquire ExtraHop in $900 Million Deal
Joomla Content System Vulnerable to Multiple Flaws
Chinese APT Group Reportedly Develops Custom Backdoor
Biden Rescinds Executive Orders Banning TikTok, WeChat
Not So Fastly: Global Outage Highlights Cloud Challenges
Microsoft Patches 6 Vulnerabilities Currently Under Attack
Analysis: How Biden Executive Order Mirrors FDA's Cyber Plans
House Probes Specifics of Colonial Ransomware Attack
RSA Spins Off Fraud and Risk Business
Upgrade Your Native Microsoft 365 Email Protection
TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud
Biden's Nominees Face Questions Over Cybersecurity Concerns
Groups Urge Biden, Congress to Bolster Health Sector Cyber
Fake Lazarus DDoS Gang Launches New 'Attacks'
ISMG Editors' Panel: The FBI's Global Cryptophone Sting
DOJ Shut Down Slilpp Marketplace for Stolen Credentials
How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?
House Oversight Committee Probing JBS Ransomware Payment
Security Firm COO Charged in Attack on Medical Center
McDonald's Breach Exposes Korean, Taiwanese Customer Data
UK Plans for Enhanced Cybersecurity Role
Will Ransomware Attacks Push Congress to Enact Regs?
Fujifilm Reportedly Refused to Pay Ransom
Union Benefits Administrator Says Data Deleted in Hack
Putin Raises Issue of Extradition Agreement
Volkswagen, Audi Notify 3.3 Million of Data Breach
The Best of Virtual RSA Conference 2021
NATO Endorses Cybersecurity Defense Policy
CISA: Defibrillator Dashboard Security Flaws Pose Risk
Emergence of Hybrid Cloud Security
How 'SEO Poisoning' Is Used to Deploy Malware
Ukraine Arrests 6 Clop Ransomware Operation Suspects
Forcepoint, Deloitte and Cerberus Sentinel Make Acquisitions
Behind the Scenes of a Business Email Compromise Attack
DHS Preparing More Cybersecurity Requirements for Pipelines
Researcher: 1 Billion CVS Health Website Records Exposed
Biden Promises Retaliation Unless Putin Stops Cyberattacks
Cyberium Domain Targets Tenda Routers in Botnet Campaign
India Moves Toward Limiting What Telecom Tech Can Be Used
Standardizing Patient Addresses: Privacy, Security Issues
Analysis: The Cyber Impact of Biden/Putin Summit Meeting
The Challenge of Securing Healthcare IoT Devices
Using Automation to Update a SOC
ISMG Editors’ Panel: NATO's Cybersecurity Policy and More
Senate Approves Chris Inglis as National Cyber Director
Russian Convicted of Aiding Kelihos Botnet Operator
Ransomware Operations 'Based on a Culture of Mistrust'
Ransomware: Strategies for Faster Detection and Response
Why Criminals Love Ransomware: In Their Own Words
Peak DDoS Traffic Up 100%, Researchers Report
NSA Offers Tips on Securing Unified Communication Channels
Security Meets 'Work from Anywhere'
Senators Draft a Federal Breach Notification Bill
SASE Comes of Age for Governments, Schools
Fake DarkSide Ransomware Gang Targets Energy, Food Sectors
First American Financial's SEC Breach Settlement: $488,000
India Launches Effort to Track, Freeze Cyber Fraud Proceeds
On Demand Webinar | AI Playbook for Financial Leaders: Top 5 Insights in 15 Minutes
On Demand Webinar | Contact Center Authentication: A Mystery Shopper's Journey
N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack
Lawmakers Unveil Cybersecurity Legislation
CISA: Firewall Rules Could Have Blunted SolarWinds Malware
The Changing Nature of the Insider Threat
Business Benefits of a SASE Approach
CISA Shifting Einstein Detection System Deeper Into Networks
Iranian Police Reportedly Crack Down on Illegal Cryptomining
US Seizes Domains of Websites Linked to Iran, Iraq
Australia Considers Mandating Ransom Payment Reporting
EU Proposes Joint Cybersecurity Unit
Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity
Medicaid Contractor Data Breach Affected 334,000 Providers
John McAfee Found Dead in Spanish Prison Cell
Irish Ransomware Attack Recovery Cost Estimate: $600 Million
Repurposed REvil Ransomware Used in Attacks
Ransomware Attack on Eye Clinic Chain Affects 500,000
FBI Seeks Extra Funds to Fight Ransomware, Other Threats
Tulsa: Ransomware Attackers Leaked 18,000 Files
Binance Says It Helped With Clop Money Laundering Bust
Profiles in Leadership: Selim Aissi, IMT (Ellie Mae)
ISMG Editors’ Panel: Examining Open-Source Software Security
High-Ranking FIN7 Gang Member Receives 7-Year Prison Term
US Secret Service Releases 'Most Wanted' Cyber Fugitive List
Sizing Up the Security Features Slated for Windows 11
Researchers Identify New Malware Loader Variant
Group Behind SolarWinds Attack Targeted Microsoft Customers
Cajee Brothers Deny $3.6 Billion Bitcoin Fraud
4 Dell Bugs Could Affect 30 Million Users
NIST Releases 'Critical Software' Definition for US Agencies
Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack
Mercedes-Benz USA Says 1.6 Million Records Exposed
IoT: The New Industrial Revolution
Hackers Disguise Rootkit as Microsoft Drivers
Report Urges NASA to Improve Cybersecurity Risk Management
Attackers Increasingly Using Cobalt Strike
Senate Bill Addresses Federal Cyber Workforce Shortage
Microsoft Edge Vulnerabilities Let Hackers Steal Data
GAO: HHS Needs to Improve Cybersecurity Info-Sharing Efforts
Enhancing Email Security for Microsoft 365
Zyxel Warns of Attacks on Its Firewall, VPN Products
HHS OIG: Medicare Should Require Hospital Device Security
White House Will Release Details on Exchange Attacks
Capital One Breach Suspect Faces New Criminal Charges
Multinational Police Raid Seizes DoubleVPN Servers
ISMG Editors’ Panel: FBI Assessment of Cybersecurity Trends
700 Million 'Scraped' LinkedIn User Records Offered for Sale
CISA Tool Helps Measure Readiness to Thwart Ransomware
US Tracking Brute-Force Attacks Linked to Russia
Google Investigates Ad Injected Into 2FA SMS Messages
REvil's Ransomware Success Formula: Constant Innovation
Hades Ransomware Has Targeted 7 Large Companies
The Executive Perspective Series featuring the White House Executive Order and More
Congress Considers Measures to Improve Telecom Security
CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices
Senate Bill Proposes Cyber Training for Federal Employees
Digital Fraud: Trends and Mitigations
Fraud and the Rise of Brand Abuse
Profiles in Leadership: Alex Cunningham, CISO, Advisor360°
Biden Orders Investigation of Kaseya Ransomware Attack
Kaseya Was Working on Patches Before Ransomware Attack
Kaseya Attack: REvil Offers $70 Million 'Universal Decryptor'
Update: Microsoft Issues 'PrintNightmare' Security Update
Kaseya: Up to 1,500 Organizations Hit in Ransomware Attack
Kaseya Sees Service Restoration Delay After Ransomware Hit
Kroger, British Airways Agree to Settle Data Breach Lawsuits
Kaseya Ransomware Attack: 'It Could Have Been Much Worse'
Kaseya Ransomware Attack: 'This Is a Dramatic Escalation'
Republican National Committee Says Systems Weren't Breached
Gartner Offers Insights on Migrating to SASE
Zero Trust: Two Models for Implementation
Healthcare Workers Allege Amazon Alexa Violates Privacy
FIDO Alliance Update: New Guidelines, Standards Enhancements
Kaseya Raced to Patch Before Ransomware Disaster
Biden Faces Russian Ransomware Curtailment Challenge
Kaseya Announces New Service Restoration Date
Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete
List of Victims of Kaseya Ransomware Attack Grows
NetOps and DevOps - Bridging the Gap
ISMG Editors’ Panel: Analysis of Kaseya Attack
Government Cybersecurity Summit: A Preview
Malspam Campaign Targets Kaseya Victims
Biden's New Executive Order Looks to Address Data Privacy
CNA Discloses Breach Related to March Ransomware Attack
Interpol Calls for New Ransomware Mitigation Strategy
Add Morgan Stanley to List of Accellion FTA Hack Victims
Yearlong Phishing Campaign Targets Energy Firms
Kaseya Says Software Fully Patched After Ransomware Attack
Ransomware Landscape: REvil Is One of Many Operators
Microsoft to Acquire RiskIQ
Prosecutors: Insider Trading Tips Sold on Darknet Sites
US Senate Approves Jen Easterly as CISA Director
SolarWinds Issues Patches in Wake of Zero-Day Attacks
Guess Confirms Ransomware Attack and Data Breach
2 State Cybersecurity, Data Privacy Laws Enacted
Espionage Campaign Using Updated Variant of Bandook Spyware
REvil's Infrastructure Goes Offline
Supply Chain Ransomware Breach Affects 1.2 Million
Microsoft Releases Patches for 4 Exploited Zero-Day Flaws
Is China's 'Cyber Capacity' Really 10 Years Behind the US?
Constant Ransomware Business Refinements Boosting Profits
Using XDR to Detect Ransomware, Supply Chain Attacks
CISA Emergency Directive: Patch 'PrintNightmare' Flaw
Iranian APT Gang Phishes Middle East Experts
FCC Finalizes Plan to Rip and Replace Chinese Telecom Gear
A 'First Responder' Approach to Cybersecurity
SonicWall Urges Patching of Devices to Ward Off Ransomware
NortonLifeLock in Talks to Buy Antivirus Rival Avast
US Offering $10 Million Reward for Cyberthreat Information
Why It's Time to Reassess IAM in Healthcare
Facebook Disrupts Iranian APT Campaign
ISMG Editors’ Panel: Challenges for New CISA Leader
How Mespinoza Ransomware Group Hits Targets
Israeli Firm Candiru's Spyware Used to Target Dissidents
Google to Patch 8 Chrome Flaws, Including a Zero-Day
What's Next Step for REvil Ransomware Victims?
DOD and DHS Need More Collaboration on Cybersecurity Issues
US Blacklists 6 Russian Organizations Over Security Concerns
Spyware Exposé Highlights Suspected Apple Zero-Day Flaws
Leak of 50,000 Contact Details Tied to Spyware Targeting
US: Chinese Government Waged Microsoft Exchange Attacks
US Indicts 4 Chinese Nationals for Lengthy Hacking Campaign
Advisory Describes Chinese Attackers' Tactics
China's Cyberattacks: Sizing Up International Response
Data Analytics: 3 Critical Questions
Leak of Alleged Pegasus Target List Restokes Spyware Debate
Case Study: A REvil Ransom Negotiation
Law Firm Serving Fortune 500 Firms Hit by Ransomware
Can the US Curb China's Cyber Ambitions?
TSA Issues Cybersecurity Requirements for Pipelines
State of Incident Response 2021
Spyware Zero-Day Hits Show Apple Ecosystem's Imperfections
Microsoft Disrupts Business Email Compromise Domains
Incident Response: Why Persistence Is Vital
Cybereason, Rapid7 and Microsoft Announce Acquisitions
NIST Publishes 'Critical Software' Security Guidance
Senators Introduce Federal Breach Notification Bill
Third Arrest in Connection With 2020 Twitter Hack
Automation to Scale Security in the Cloud
Chinese APT Group Attacks French Organizations
Patch Roundup: Windows, Linux, Oracle, Juniper
Dutch Police Arrest 2 Tied to Phishing Operation
Experts Testify on Cyberthreats to Water Treatment Plants
Hospital Worker Charged in COVID Relief Fraud Case
Kaseya Obtains Decryption Tool After REvil Ransomware Hit
Saudi Aramco Traces Data Leak to Attack on Supplier
ISMG Editors’ Panel: Examining the Pegasus Project
US Customs Apps Put Travelers' PII at Risk
Congress Focuses on Industrial Control System Security
Resiliency Is Key to Surviving a CDN Outage
HHS Seeking Input on Improving Security Risk Analysis Tool
IoT Security Dangers Loom as Office Workers Return
Mercenary Hacking Group Deploys Android Malware
Hackers Target Kubernetes Using Misconfigured Argo Workflows
Australia Says Uber 'Interfered' With Users' Privacy
Attackers Rely on 'Exotic' Languages for Malware Creation
Kaseya Says It Paid No Ransom to Obtain Universal Decryptor
18 Companies to Participate in NIST 'Zero Trust' Project
What We Can Learn From Hackers
AvosLocker Ransomware Gang Recruiting Affiliates, Partners
M&A Update: Deloitte and Sophos Make Acquisitions
Pegasus Spyware: World Leaders Demand Israeli Probe
New Hacking Group Exploits Vulnerabilities in Web Apps
Congress Urged to Update Federal Laws to Combat Ransomware
Experts Testify on Pipeline Cybersecurity Measures
BlackMatter Ransomware Claims to Be Best of REvil, DarkSide
Tips on Recruiting, Retaining Cybersecurity Staff
Biden Calls for Critical Infrastructure Security Standards
Kaseya's Unitrends Technology Has Zero-Day Flaws
Measuring Success of 'No More Ransom' Project
Israeli Government Visits NSO Group Amid Spyware Claims
9 Ransomware Enablers - And Tactics for Combating Them
What Can Be Done to Enhance Electrical Grid Security?
Insurer: Size of Claims Paid for Ransomware Attacks Declines
Second Defendant Sentenced in EHR-Related Fraud Case
Patch Issued for Flaw in Sunhillo SureLine Surveillance App
Senate Bill Proposes Further Restrictions on Huawei, ZTE
Wiper Malware Used in Attack Against Iran's Train System
ISMG Editors’ Panel: Ransomware Update
Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
Flaw Found in Moodle Online Learning Platform
Patching Woes: Most Frequently Exploited CVEs Listed
Researchers Find More Servers Tied to Russian-Linked Attacks
Amazon Hit With $885 Million GDPR Fine
Congress Hears Ideas for Boosting Cybersecurity Workforce
NIST Works to Create AI Risk Management Framework
SolarWinds Attackers Accessed US Attorneys' Office Emails
Ransomware Attackers Eying 'Pure Data-Leakage Model'
FatalRAT Exploits Telegram to Deliver Malicious Links
NSA Reminder: Beware of Public Wi-Fi
Zoom Agrees to Settle Security Lawsuit for $85 Million
Ransomware Actors Set Up a Call Center to Lure Victims
Words With Friends Breach: Zynga's Case Set for Arbitration
Global Incident Response: The Rise of Integrity Attacks
COVID 19: What Delta Variant Means to Business Recovery
Chinese APT Groups Targeted Asian Telecoms
Report: 7 Federal Agencies Still Lack Basic Cybersecurity
NSA, CISA Release Guidance on Kubernetes Security
Food Delivery Services Face GDPR Fines Over AI Algorithms
Microsoft Database Engine Vulnerabilities Patched
PayPal to Hire Dozens of Cryptocurrency Security Experts
Anne Neuberger on Why No Sanctions Issued Against China Yet
How to Keep Developer Secrets, Secret
Cybersecurity M&A Update: Five Firms Make Moves
Researchers Disclose 14 Flaws in NicheStack
Chinese Cyberthreats: The Impact on National Security
CISA's Easterly Unveils Joint Cyber Defense Collaborative
Apple's Image Abuse Scanning Worries Privacy Experts
Cybersecurity Leadership: Risk in OT and IIoT
Is Darknet Forum Ransomware Chatter Ban Having an Impact?
ISMG Editors’ Panel: Government Cybersecurity Challenges
Countering Cyberthreats: 2 Legislative Proposals Introduced
Audit Slams FDIC for Inadequate Mobile Device Security
Hackers Target Critical Infrastructure in Southeast Asia
Leveraging Password Managers to Counter Breaches
Flaws in John Deere Systems Show Agriculture's Cyber Risk
FTC Warns: SMS Phishing Scam Impersonates State Agencies
Iranian Group Used Android Backdoor
BlackMatter Group Debuts Linux-Targeting Ransomware
2 Plead Guilty in Vast Money Laundering Scheme
10 Initial Access Broker Trends: Cybercrime Service Evolves
NIST Guidance Focuses on Creating 'Cyber Resiliency'
Conti Group Takes Advantage of Vulnerable Exchange Servers
Senate Passes Infrastructure Bill Boosting Cyber Funding
Poly Network Says $600 Million in Cryptocurrency Stolen
Microsoft Patches 3 Zero-Day Vulnerabilities
REvil Decryption Key Posted on Cybercrime Forum
Synology NAS Devices Targeted by StealthWorker Botnet
What Can Be Done to Overcome Cybersecurity Staff Shortage?
NortonLifeLock to Buy Avast for Over $8 Billion
OMB Spells Out Agencies' Cybersecurity Timelines
Accenture Hit by Apparent Ransomware Attack
Zero Trust and the Critical Role of Strong Authentication
Back to the Future: Notorious AlphaBay Market Reboots
23 Charged in European Email Fraud Scheme
Cyberspace Solarium Commission Offers Progress Assessment
Lawmakers Want Federal Cybersecurity Leaders' Roles Clarified
ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response
Assessing AI Security Solutions: Questions to Ask
Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
Ukrainian Police Shutter Allegedly Illegal Crypto Exchanges
Scripps Health Reports Financial Toll of Ransomware Attack
Poly Network Hacker Reportedly Returns Most of Stolen Funds
Cybercriminals Reportedly Created Blockchain Analytics Tool
Microsoft Details Yearlong Office 365 Phishing Campaign
T-Mobile USA Investigates Possible Data Breach
Information Blocking Rule: Understanding the Exceptions
Profiles in Leadership: Rob Hornbuckle, CISO, Allegiant
FINRA Warns Members of Phishing Scheme
FFIEC Updates Authentication Guidance
Colonial Pipeline: Attack Exposed Personal Data
Memorial Health System in Ohio Latest to Be Hit With Attack
T-Mobile Probes Attack, Confirms Systems Were Breached
Respect in Security: A Pledge to Eliminate Harassment
Researchers Describe New DoS Attack Method
Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?
FireEye, CISA Warn of Critical IoT Device Vulnerability
Banking Groups Object to Breach Notification Bill Provisions
T-Mobile: Attackers Stole 8.6 Million Customers' Details
The Extended Enterprise Under Threat
Amid Surveillance Debate, Cellebrite Stops Serving Bangladesh
Massachusetts Man Pleads Guilty in SIM Swapping Case
Ransomware Hits Brazilian National Treasury
Retaining Security Workers: What Works?
'Neurevt' Trojan Targets Mexican Bank Customers
Financial Services and the Zero Trust Journey
US Census Bureau Criticized for Handling of Breach
Health Data Breach Tally Update: Ransomware Persists
Nigerian Gang Asks for Insider Help to Plant Ransomware
Hacker Steals $97 Million From Crypto Exchange 'Liquid'
Ohio Man Admits to Operating Illegal Bitcoin 'Mixer' Service
Ransomware: LockBit 2.0 Borrows Ryuk and Egregor's Tricks
Profiles in Leadership: Darrell Bateman of City Bank Texas
ISMG Editors’ Panel: Fraud Trends
World Bank Launches Global Cybersecurity Fund
National Cyber Director Chris Inglis Focusing on Resiliency
Record-Setting DDoS Attack Hits Financial Service Firm
US State Department Reportedly Sustained Cyber Incident
Healthcare Organizations Mopping Up After Cyberattacks
US, Singapore Sign Cybersecurity Agreements
CISA: Patching ProxyShell Flaws in Exchange Servers Is Urgent
Mozi Botnet Targeting Netgear, Huawei, ZTE Gateways
Misconfigured Microsoft Power Apps Spill Sensitive Data
Fighting Unemployment Benefits Fraud: Key Steps
Exposing Software Supply Chain Risks
Audit: USAID Needs to Enhance Data Protections
Google Removes Fake Crypto-Mining Apps
Profiles in Leadership: Nandhini Duraisamy
White House Tech Meeting: Focus on Critical Infrastructure
Researchers Demonstrate AI Can Be Fooled
Updated PRISM Backdoor Discovered
Threat Modeling: Making the Right Moves
Profile in Leadership: Laura-Lea Berna, BC Transit
Citizen Lab: Bahrain Used Pegasus to Spy on Activists
White House Unveils Supply Chain, New Security Initiatives
Board Members: Mitigating Their Security Risks
FortiGuard Labs: A 10-Fold Increase in Ransomware
Financial Execs Say Security a Top Cryptocurrency Barrier
Fin8 Using an Updated Backdoor
Modernization of Security Operations
7 Emerging Ransomware Groups Practicing Double Extortion
After Ransomware Attack, When Must Patients Be Notified?
Microsoft Issues Security Advisory on ProxyShell Flaws
Data Breach Culprits: Phishing and Ransomware Dominate
ISMG Editors’ Panel: Crypto Exchange Hacks
Azure Database Service Flaw Could Affect Thousands of Firms
US Agencies Increasing Use of Facial Recognition Tech
T-Mobile CEO Apologizes for Mega-Breach, Offers Update
FBI Issues Alert on Hive Ransomware
Phishing Attack Used Spoofed COVID-19 Vaccination Forms
Senator Seeks Input on Securing Crypto, Blockchain
Microsoft: Beware Phishing Attacks with Open Redirect Links
Cybersecurity Investment: Trends and Misconceptions
Healthcare, Isolation and Embracing Zero Trust
IG: DoD Did Not Properly Secure Access to VIP Records
SEC to Monitor Illicit Activity on DeFi Platforms
Scammers Impersonate OpenSea Customer Support
Profiles in Leadership: Conrad Bell, VP & CISO, C Spire
Uncovering the Dark Web: A Solution For Conducting Effective External Threat Protection
IronNet Goes Public by Merging With LGL Systems
Federal Departments Ordered to Improve Logging Capabilities
Crisis Management: Responding to a Disaster
OnDemand | Overcome IT/OT Convergence Challenges with Managed Services
OnDemand | What Every Water Utility Needs to Know About Cybersecurity
SEC Sanctions 8 Firms for 'Deficient Cybersecurity Procedures'
XDR: A Fresh Look at Detection and Response
Fighting Fraud With ID Verification
'ProxyToken' Bug Put Microsoft Exchange Email at Risk
CISA Warns of Holiday Ransomware Attacks
Attackers Keep Refining Business Email Compromise Schemes
Medical Group: 655,000 Affected by 'Network Outage' Breach
Bitcoin ATM Firms Seek to Shape Regulations
House Debates Breach Notification Measure
Vendors Issue Security Advisories for OpenSSL Flaws
ISMG Editors’ Panel: New and Rebranded Ransomware Groups
125,000 Coinbase Users Get False Security Alerts
LockFile Ransomware Using New Techniques to Evade Detection
FTC Bans SpyFone Company, CEO From Surveillance Business
Facebook's WhatsApp Hit With $266 Million GDPR Fine
White House Warns Of Cyberthreats Over Labor Day Weekend
Could Lessons From Plane Hijackings Help Fight Ransomware?
Conti Ransomware Threat Rising as Group Gains Affiliates
Preventing Identity Fraud: The Road Ahead For Financial Services
OnDemand | Postmortem of a Ransomware Attack
SEC Charges BitConnect on $2 Billion Fraud Scheme
Autodesk Says Company Was Targeted by SolarWinds Attackers
Attackers Are Selling Their Victims’ Internet Bandwidth
Moxa Devices Prone to Vulnerabilities Affecting Railways
Atlassian Vulnerability Being Exploited in the Wild
Cisco Patches Critical Authentication Bypass Bug
Aussie Researcher Fakes Digital COVID-19 Vaccination Proof
The Difference Between Espionage and Financial Breaches
Profiles in Leadership: Bobbet Castillo, Petnet
ISACA 2021 Report: Top Trends, Improving Cyber Maturity
Alleged Trickbot Developer Arrested in South Korea
Netgear Fixes Critical Flaws Affecting Smart Switches
20 Years Later: A Cyber 9/11 Is Unlikely
2 Data Leaks Reported in Indonesia's COVID-19 Tracking Apps
SEC Warns of Fraudulent Cryptocurrency Schemes
Orchestration and Automation: The New 'Must-Haves'
Zero-Day Attacks Exploit MSHTML Flaw in Microsoft Windows
Resilience CEO on White House Meeting, Cyber Insurance
DDoS Attack Disrupts New Zealand Banks, Post Office
8,000+ Confluence Servers Still Vulnerable to Atlassian Flaw
Lawsuit: Fertility App Maker Sent Data to Google, Facebook
White House Pushing Federal Agencies Toward 'Zero Trust'
Pro-China Operatives Push Protests, Pandemic Conspiracies
Groove Promises Maximum Profits for Ransomware Affiliates
20 Years After 9/11: How US Cybersecurity Landscape Evolved
National Cyber Director Sees Ransomware As Continuing Threat
Bitcoin Scam Run by Fake Exchange, Report Says
Cybercrime Money Launderer Handed 11-Year Sentence
China-Linked Grayfly Gang Spotted Using Sidewalk Backdoor
United Nations Says Attackers Breached Its Systems
The Cost of Cloud Compromise and Shadow IT
Microsoft Alert: Serious Flaw in Azure Container Instances
ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs
Transforming an Organization's Security Culture
Ukrainian Extradited to US Faces Credential Theft Charges
SolarWinds Attack Spurring Additional Federal Investigations
HHS on Information Blocking Rule Enforcement: Stay Tuned
Department of Commerce Establishes AI Advisory Committee
Pysa Ransomware Gang Targets Linux
The 'Basics We Need to Get Right'
Olympus: 'Potential Cyber Incident' Disrupted EMEA System
House Bill Seeks to Insulate CISA Director From Politics
BitSight, Mastercard and Tenable Make Acquisitions
HHS Warns Health Sector of BlackMatter Attacks
New York Vaccine Passport App Stored Forged Credentials
Apple Patched iMessage. But Can It Be Made Safer Overall?
Profiles in Leadership: Tim Nedyalkov, Commonwealth Bank
Top Initial Attack Vectors: Passwords, Bugs, Trickery
Massachusetts Attorney General Probing T-Mobile Breach
Clinic: EHR Data Too Damaged to Recover Post-Attack
SEC Chair Pushes for Additional Cryptocurrency Regulations
OnDemand | Cyber Threats Facing Oil, Gas & Chemical Businesses
Microsoft Patches MSHTML Vulnerability
Travis CI Flaw Exposed Secrets From Public Repositories
Profiles in Leadership: Tammy Klotz, CISO, Covanta
Russia Has Taken No Action to Combat Ransomware, FBI Says
Former US Intelligence Officers Spied on US for UAE
Microsoft Fully Ditches the Password
Lawsuit: Health System Failed to Heed Ransomware Warnings
House Committees Seek to Spend Millions on Cybersecurity
New York Court Shuts Down Crypto Platform 'Coinseed'
Republican Governors Association Targeted in Exchange Attacks
FTC: Health App, Device Makers Must Report Breaches
Is Grief's Threat to Wipe Decryption Key Believable?