AN EXCERPT FROM SECTION 5 OF THE 2021 VOICE INTELLIGENCE AND SECURITY REPORT.
Unintended consequences is a popular topic when it comes to security. In many ways, security involves the study of unintended consequences, as we monitor
and measure how effective those controls remain through tests of intended and...
An Israeli citizen who served as the administrator of the now-shuttered DeepDotWeb portal that connected internet users with dark web marketplaces selling malware, data and contraband has pleaded guilty to a money laundering conspiracy charge.
The ODP Corp. reports in a Securities and Exchange Commission 8-K filing that it has suffered a loss of about $28 million due to a March 1 cyber incident at its business services and supplies subsidiary, CompuCom, that forced the company to shut down some of its operations.
As times change, many companies and organizations have worked on ramping up their multi-faceted security defenses. However, threat actors and cyber criminals also adapt and hunt for new vulnerabilities, compromising data by embracing new exploits to ensure substantial financial payoff.
In this report, we...
Cyber-insurance is a supplement, not a substitute.
Instead of a get-out-of-jail-free card, businesses and organizations need to start looking at cyber-related insurance policies as a supplement to their own risk calculations - not as a substitute.
Download this white paper and learn why if we continue to see a...
Projects with potential cybersecurity components included in the Biden administration's $2 trillion infrastructure spending proposal include upgrading the aging and insecure electrical grid, addressing supply chain vulnerabilities and supporting research on artificial intelligence and quantum computing.
The Iranian-linked threat group TA453, also known as Charming Kitten and Phosphorus, conducted a phishing campaign, dubbed "BadBlood," in late 2020 that targeted senior U.S. and Israeli medical researchers in an attempt to obtain their Microsoft Office credentials, according to Proofpoint.
Security practitioners often tread a fine and not entirely well-defined legal line in collecting current and meaningful research. This research can also pose ethical questions when commercial sources for stolen data fall into a gray area.
NIST has drafted guidelines for how to use its cybersecurity framework to address cyberthreats and other security issues that can target state and local election infrastructure and disrupt voting.
The Government Accountability Office is urging the U.S. government to respond more rapidly to cybersecurity issues, especially in the wake of the SolarWinds supply chain attack that led to the breach of nine federal departments as well as about 100 companies.
Check Point Research says it has spotted more than 50,000 ransomware attack attempts worldwide so far against unpatched on-premises Microsoft Exchange email servers.
Advanced threats are on the rise. Networks are inundated with phishing attacks, malware hides in encrypted traffic, and ransomware is an ever-present threat. Protecting your business requires a modern firewall able to deal with sophisticated threats, without adding complexity to your network.
In this eBook, we...
The zero-day attacks against Accellion's File Transfer Appliance show that a number of big-name firms continued to use the legacy technology - even though more secure, cloud-based options were available. Evidently, many CISOs didn't see a compelling reason to move on. Of course, now they do.
Ransomware attacks are ever evolving and more prevalent than before – directly disrupting business and causing reputational repercussions by making the headlines. Combined with the costs of lawsuits and fines, endpoint attacks cost large enterprises over $9 million. In a CyberArk survey of 1,000 IT security decision...
The changing threat landscape and the frequency, sophistication and targeted nature of adversaries require an evolution of security operational practices with a combination of prevention, detection and response of cyber attacks.
This report from Watchguard helps security teams understand the well-known cyber-attack...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.