The U.S. is on "borrowed time" for a major cyberattack that could potentially seriously disrupt critical infrastructure, but the nation can secure its systems and resources to avoid such cybersecurity disasters, says Rep. Eric Swalwell, D-California.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
The new Expel Quarterly Threat Report provides even more data on what we’re seeing, detection opportunities, and resilience recs to help protect your organization — now on a quarterly basis.
Novartis says no sensitive information was compromised in an alleged attack involving the drugmaker's data showing up for sale on the dark web. The incident comes as new reports warn of a surge in cyberattacks on healthcare sector entities and the return of Emotet malware.
The website of the Russian Ministry of Construction, Housing and Utilities was reportedly hacked and defaced on Sunday. The attacker demands a 1-million-ruble ransom be paid by Tuesday to ensure the security of stolen data. A ministry spokesperson told a state news agency that all data is protected.
For criminals looking to cash in, opportunities to commit fraud and other financial crimes have never been so plentiful. Advances in payment technology, such as transaction options like Venmo, WorldPay and AliPay such as those from Apple and Qiwi, always open doors to new risks.
The recent rise of cryptocurrency is...
This annual survey seeks to evaluate the current and projected impact of fraud on the finance and treasury environment. Practitioners from all industries are polled on their experiences with fraud and on the range of controls, safeguards and security practices employed to protect their financial assets and...
Commercial banking fraud mitigation is experiencing a new level of interest from FIs as they try to combat escalating and highly sophisticated attack vectors from organized crime rings while also trying to stave off Fintechs encroaching into their territory.
By effectively leveraging the vast amount of data at...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
According to Datto's Global State of the Channel Ransomware Report, 85% of managed service providers (MSPs) report ransomware attacks against clients in the last two years.
96% of MSPs predict attacks will continue at current, or worse rates. As these malicious attacks continue to target businesses, it's crucial...
At the start of 2021, vaccine rollout let people imagine an end to pandemic disruption. But some of the world’s smartest cyber criminals weren’t interested in returning to business as normal. Over the first half of the year, a series of ransomware attacks on global infrastructure pushed cybersecurity to the top of...
U.S. government agencies have issued a warning to organizations in the country against paying ransom to the Karakurt data extortion group. The threat actor's promises to delete stolen data and not disclose the security incident to the public if its demands are met are false, the agencies say.
In the latest weekly update, four ISMG editors discuss important cybersecurity issues, including the trending topics at this year's RSA Conference, how security researchers are tracking a zero-day vulnerability in Microsoft Office and what Broadcom's acquisition of VMware means for security.
The 15th edition of the annual Verizon Data Breach Investigations Report examines the rapid growth in ransomware, along with other threat vectors. Chris Novak, global director of the Threat Research Advisory Center at Verizon Business Group, discusses key findings and reviews the security landscape.
The latest edition of the ISMG Security Report discusses how security researchers have warned of a new attack campaign targeting 1,200 cloud-based Elasticsearch databases. It also revisits the Kaseya supply chain attack and examines how we can mitigate mobile phone fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.