NBC News reports that President Joe Biden has been given a menu of options for conducting offensive cyber strikes again Russia. But the White House's press secretary says the report is "off base and does not reflect what is actually being discussed in any shape or form."
As Russia's military invasion and cyberattacks on Ukraine escalate, critical infrastructure entities, including those in the health sector of the U.S. and other countries condemning Russia's actions, must also be on high alert for potentially disruptive cyber assaults, some experts warn.
"Shadow data" - it's the new "shadow IT," and it puts your enterprise data at potential risk in public cloud environments. Amit Shaked, CEO and co-founder of Laminar, defines the risk, explains the threat and describes how best to mitigate it.
The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
A week after a distributed denial-of-service attack on the Ukrainian Ministry of Defense, a DDoS attack has reportedly struck Ukranian government and bank websites - including the Ukrainian Ministry of Foreign Affairs, the Cabinet of Ministers and Verkhovna Rada, according to an early report.
Two years of accelerated cloud migration have brought great services and efficiencies to enterprises. But they also have expanded and exposed a growing risk: Cloud data security. Laminar CMO Andy Smith discusses the urgency of the challenge and how to address it.
In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.
As Russia's invasion of Ukraine continues, what will happen next remains unclear. Accordingly, cybersecurity experts are again calling on organizations globally to focus on what they can control, including their cybersecurity defenses and business resiliency preparedness.
Xenomorph, a new banking Trojan that appears to be linked to the nasty Alien malware family and has been downloaded more than 50,000 times in the Google Play Store, has been targeting European banks. But ThreatFabric research shows that overlay attacks more frequently target cryptocurrency wallets.
Hacking incidents still dominate the major health data breaches being reported to the U.S. Department of Health and Human Services in the first months of 2022 by far, with only one other type of breach appearing on the federal tally so far this year. Are organizations missing other breaches?
The EU confirmed that it will activate its elite cybersecurity team to assist Ukrainians if Russian cyberattacks occur. The news follows rapid escalation in the Russia-Ukraine border conflict, where Russia has amassed over 100,000 troops and is reportedly considering full-scale invasion.
Cryptocurrency exchange Coinbase briefly halted its services Feb. 11 after a security researcher uncovered a critical vulnerability affecting its Retail Advanced Trading platform, allowing malicious users to sell BTC without owning any. The researcher who found the flaw got a $250,000 bug bounty.
On this week's "Sound Off," attorney Lisa Sotto demonstrates how Colonial Pipeline did "a lot right" in its response to the DarkSide ransomware attack that led the firm to shut down operations for nearly a week last May. She shares best practices for enterprises to improve incident response plans.
The Conti ransomware group has a new trick up its sleeve: hiring "multiple elite developers and managers" to essentially acquire the venerable TrickBot malware operation, which it has been using for the past year to better distribute its ransomware, says threat intelligence firm Advanced Intelligence.
After Russian President Putin's doubled down on the claim that Ukraine has always been a part of Russia, federal and state-level agencies prepare for cyberattacks that could be on the horizon if the situation escalates. CISA and other agencies recommend keeping rapid communication systems in place.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.