Modern organizations have many different application types across their organization – from DevOps pipelines and cloud-native apps to robotic process automation bots and static homegrown apps. How do you keep the secrets used by all these different types of applications safe from attackers?
Dutch police have arrested a man accused of working as a developer for Tornado Cash. "He is suspected of involvement in concealing criminal financial flows and facilitating money laundering through the mixing of cryptocurrencies via the decentralized Ethereum mixing service," Dutch authorities say.
Hybrid war includes cyberattacks, critical infrastructure attacks and efforts to get information. Victoria Beckman, director of Microsoft's Digital Crimes Unit in the Americas, says Ukraine used a national cybersecurity strategy to withstand such attacks from Russia and so can other countries.
Some 60 breaches affecting about 2.5 million individuals were added in July to the federal tally of major health data breaches. A vast majority of 2022 breaches continue to be linked to large hacking incidents and ransomware demands - with 40% tied to outside vendors.
An updated version of the Russian-linked SOVA Android Trojan is back with updated attack techniques targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets. Researchers at Cleafy uncovered that the Trojan now also features ransomware capabilities.
The U.S. Consumer Financial Protection Bureau is warning lenders they can be liable for data breaches for causing consumers "substantial injury." To avoid liability, the bureau recommends that banks implement multifactor authentication and especially Web Authentication.
A "secure message-themed" phishing campaign targeting healthcare providers aims to lure recipients to an Evernote notepad website in an attempt by hackers to harvest security credentials, federal authorities warn, saying the scheme puts entities at risk for potential data security compromises.
The co-chairs of Congress' Cyberspace Solarium Commission request an "urgent briefing" with Biden administration officials to discuss the state of cybersecurity in the healthcare and public health sector and call for actions to address rising cyberthreats.
In the latest weekly update, four ISMG editors discuss the breach of customer engagement platform Twilio, a cyberattack on the U.K.'s NHS that has reignited concerns about supply chain security in the healthcare sector, and the U.S. Treasury clamping down on shady cryptocurrency mixers.
Ransomware-wielding attackers continue to seek new ways to maximize profits with minimal effort. Top tactics spotted recently by experts include continuing to partner with initial access brokers and botnet operators and testing new monetization models, such as "mediation as a service."
Enterprises spend a lot of time on what zero trust is, but too little time on design thinking - and why cybersecurity solutions need that element baked in from the start. Brian Barnier and Prachee Kale of ThinkDesignCyber and CyberTheory Institute give an overview of their zero trust strategy.
Cyber insurance can defray costs associated with data breaches and ransomware attacks. But Kelly Butler of the advisory firm Marsh & McLennan Companies says insurers are tightening their requirements for policies due to rising costs associated with increasingly severe incidents.
Security executives at Black Hat USA 2022 discuss the latest cybersecurity trends from confidential computing and unified threat hunting languages to attack surface management and recovery services, social engineering campaigns and blockchain vulnerabilities.
A U.S. federal jury convicted former Twitter employee Ahmad Abouammo for spying on Saudi Arabian dissidents on behalf of Saudi Arabia. The jury also found him guilty of conspiracy to commit wire fraud, falsification of records and money laundering.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.