Oil service giant Halliburton told U.S. federal regulators Tuesday that hackers stole data after the firm acknowledged "unauthorized activity" on its networks in late August. The incident "caused disruptions and limitation of access to portions of the company's business applications," the firm said.
Ransomware remains a critical concern for healthcare systems, affecting the availability of patient care. Hugo Lai, CISO at Temple University Health System, said defenders need to understand the dependencies within business processes to effectively combat ransomware.
Three men have pleaded guilty to running OTPAgency, a subscription service for fraudsters designed to automatically phone targets and trick them into sharing the one-time codes criminals need to log into their bank accounts. The service targeted more than 12,500 individuals over its 18-month run.
In the digital era, Microsoft 365 is an essential tool for getting work done. Unfortunately, its popularity has made it a prime target for cyber criminals. Every year, people-centric Microsoft 365 attacks cost organisations millions of dollars and cause frustration for security teams and users alike. This e-book...
This State of Phish Report gives in-depth regional summaries to explore how local nuances affect user behaviour when it comes to cybersecurity awareness and the importance of phishing protection.
A few APJ highlights in this Report are:
Only 28% of users in South Korea consider security to be their responsibility,...
Zero-day attacks and unpatched vulnerabilities make a lot of headlines. But the results of our inaugural 2024 Data Loss Landscape report show that people are the root cause of most data loss incidents.
This Global Survey Report of 600 security practitioners, explores the current state of data loss protection (DLP)...
A hacking group tied to North Korea exploited a zero-day vulnerability in the open source Google Chromium web browser to try and steal cryptocurrency, Microsoft said. The attack campaign is the latest to involve a sophisticated North Korean rootkit called FudModule. Google has fixed the flaw.
The Cybersecurity and Infrastructure Security Agency told Information Security Media Group it is in the process of carrying out its most expansive national effort to secure election infrastructure across the country ahead of the upcoming November election.
Brazil has begun blocking domestic access to social platform X - including criminalizing access by Brazilians who might use a VPN - after the company failed to comply with court orders tied to combating disinformation campaigns, and a law requiring it has a legal representative in the country.
Nacha's new ACH rules require all banks to update policies and procedures to ensure better fraud detection. These changes help banks comply with new standards without relying solely on technical solutions, said Devon Marsh, managing director of ACH network rules and risk management at Nacha.
Network detection and response delivers ground truth in cybersecurity, giving organizations crucial visibility into attacker behavior before, during and after ransomware attacks. Corelight CEO Brian Dye explains how NDR helps security teams verify threats and contain incidents effectively.
Beware a surge in attacks tied to a ransomware group called RansomHub that's recruited affiliates from down-or-out operations LockBit and BlackCat and successfully crypto-locked systems at more than 200 organizations nationwide, including critical infrastructure, the U.S. government warned.
Recent developments suggest the U.S. is taking a more serious approach to holding faster payments platforms accountable for scams. It's unlikely any changes will occur before the November U.S. election, but the move toward more regulation is a good start, said Ken Palla, retired MUFB Bank director.
Two months after RansomHub claimed to have published 100GBs of its stolen data on the dark web, the Florida Department of Health is notifying citizens that their sensitive information has been compromised. The attack affected the vital statistics system used to issue birth and death certificates.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.