A longer sales cycle for small businesses and delayed subscription start dates for large enterprises have forced CrowdStrike to lower its sales forecast going forward. The Austin-based endpoint security company says deals with SMB clients took 11% longer to close in the fiscal quarter ended Oct. 31.
The shortage of cybersecurity professionals in the United States includes a scarcity of expertise in medical device security, says Bill Aerts, senior fellow and managing director of the University of Minnesota's recently launched Center for Medical Device Cybersecurity.
Cybersecurity experts warn that large healthcare and public sector organizations are continuing to get hit by "big-game hunting" attackers wielding Lorenz ransomware. Among the group's known victims are Wolfe Eye Clinic in Iowa and Salud Family Health of Colorado.
As the U.S. celebrates Thanksgiving, let's give thanks for this cybercrime karma: For more than two years, law enforcement and security experts have been exploiting flaws in the crypto-locking malware to help victims decrypt their systems without paying a ransom.
Microsoft says vulnerabilities in outdated web servers are likely responsible for a cyberattack last month against Indian energy giant Tata Power. Attackers targeted Boa servers, which were discontinued in 2005, to potentially compromise Tata and other critical infrastructure organizations around the world.
Before the newly spotted AxLocker ransomware crypto-locks systems, it steals Discord tokens, which can be sold on cybercrime markets. Among Discord's many users are cryptocurrency and NFT enthusiasts, and experts say the stolen credentials facilitate attempts to socially engineer them.
Ten state attorneys general are urging Apple to address privacy and security gaps in third-party applications available on the App Store that track, collect or store reproductive health data. The letter comes as scrutiny intensifies over how large tech firms handle sensitive health data.
Broadcom's acquisition of VMware faces challenges from European regulatory authorities over potential competitive advantages. The $61 billion deal announced in May still needs clearance from the EU and also faces scrutiny by U.K. authorities before it can be finalized.
Creativity and innovation give businesses a competitive edge. Some companies keep innovations as secrets, and because the secrets are of great value to those companies, they take steps to ensure the information is protected. A trade secret is a type of intellectual property, and it's often the key to competitive...
Data breaches are tricky to cover, and we want to report on them in an ethical way. That requires picking what should be reported for informed public discourse but avoiding topics that may encourage attackers' efforts to shame victims into paying a ransom and anything resembling data dump voyeurism.
After the collapse of the FTX cryptocurrency exchange, I received a small postcard from Japan. The sender was Mt. Gox. Here's how I bought a bitcoin for $12 and had a painful front-row seat for the first big cryptocurrency exchange collapse, plus some thoughts about cryptocurrency.
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
Federal officials released updated guidance for medical device cybersecurity incidents, including ransomware, as cyberattacks against the healthcare sector continue to surge. From mid-2020 through 2021, 82% of healthcare systems reported a cyber incident, 34% of which involved ransomware.
Russian hackers have a campaign to maliciously encrypt files of Ukrainian victims. But unlike other ransomware groups, they are doing so without the possibility of offering a decryptor. Ukraine’s Computer Emergency Response Team identifies the group as UAC-0118, also known as From Russia with Love.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.