The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Fleming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky.
Providers have traditionally used deterministic data such as credit histories and scores in determining the suitability of an applicant. The problem is that deterministic data was never intended to assess fraud risk or verify identities but rather to gauge creditworthiness. Moreover, Gen-Z and younger millennials may...
Some security experts are questioning whether Experian is doing enough to ensure security after a researcher discovered that an API the credit reporting firm uses to allow lenders to check the credit score of prospective borrowers could expose customer's scores.
A coalition of government agencies and security firms has released a framework for how to disrupt ransomware attacks that calls for expanded regulation of the global cryptocurrency market to better track the virtual coins paid to cybercriminals during extortion schemes.
A Massachusetts man has pleaded guilty to running a yearslong scam that used SIM swapping and other hacking techniques to steal more than $530,000 worth of cryptocurrency.
A Chinese advanced persistent threat group known as Naikon deployed a new malware backdoor to wage a lengthy cyberespionage campaign against military organizations in Southeast Asia, security firm Bitdefender reports.
An ongoing disinformation campaign dubbed "Ghostwriter," which leverages compromised social media accounts, is targeting several NATO member countries in Europe, attempting to undermine confidence in the defensive organization as well as spread discord in Eastern Europe, according to FireEye.
FluBot Android spyware is once again spreading throughout Europe following a temporary dip in activity in March after police arrested four suspects allegedly involved in the campaign, according to researchers at Proofpoint.
As the global pandemic enters its second year, IT and infosec teams continue to face challenges on all sides. On top of “ordinary” cybersecurity issues, they're dealing with an explosion of pandemic-themed phishing scams and a continued surge in ransomware attacks—all while attempting to transition many users to...
Whether they result in fraudulent wire transfers, misdirected payments, diverted payrolls, supply-chain fraud or exposed personal data, business email compromise (BEC) and email account compromise (EAC) are growing. BEC and EAC attacks subvert human trust and imperfect financial controls—not technical...
All email, cloud, and compliance solutions are not created equal. As organizations make the move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these "good enough" features may not be good enough for your organisation.
Download our e-book to...
Gartner predicts that more than 75% of global organizations will be running containerized applications in production, and it’s no wonder, because containers revolutionize app development, from speed of delivery to scalability.
Learn how containers help organizations save resources and quickly get software to...
Dan Kaminsky, a renowned security researcher, died last week at age 42. He gained cybersecurity fame in 2008 after discovering and helping to coordinate a patch for a massive security flaw in the internet's Domain Name System.
Ransomware continues to prove a reliable moneymaker for criminals, with the average cyber extortion payoff rising to $220,298, reports ransomware incident response firm Coveware. Zero-day attacks and shakedowns targeting Accellion File Transfer Appliance users helped boost criminals' profits.
The FBI and CISA are warning of continued cyberthreats stemming from Russia's Foreign Intelligence Service, or SVR, which the Biden administration formally accused of carrying out the SolarWinds supply chain attack. A joint alert describes how Russian attackers are targeting vulnerable networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.