news analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian Constantin17 Nov 20234 minsRansomwareComplianceCybercrime news Federal government faced ‘extensive compromise’By Samira Sarraf15 Nov 20234 minsCyberattacksCybercrimenews Major Australian ports shut down following cyber incidentBy Samira Sarraf12 Nov 20232 minsCyberattacksSupply ChainCybercrime newsGenerative AI to fuel stronger phishing campaigns, information operations at scale in 2024By Samira Sarraf 08 Nov 20236 minsPhishingCyberattacksGenerative AI news analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleBy Michael Hill 06 Nov 20235 minsRansomwareZero TrustCybercrime newsGovernments should not pay ransoms, International Counter Ransomware Initiative members agreeBy Michael Hill 02 Nov 20233 minsRansomwareGovernmentCybercrime opinionWhat the White House executive order on AI means for cybersecurity leadersBy Christopher Burgess 31 Oct 20236 minsCSO and CISOGovernmentThreat and Vulnerability Management brandpostSponsored by Palo Alto NetworksDefending Against Advanced Threats, Part 2By Stephanie Regan with David Moulton 25 Oct 20232 minsCybercrime brandpostSponsored by Palo Alto NetworksCSO_Defending Against Advanced Threats, Part 1 By Kristopher Russo with David Moulton 25 Oct 20232 minsCybercrime Articlesnews analysisQakbot infrastructure dismantled in multinational cybercrime takedownMore than $8.6 million in cryptocurrency seized from the Qakbot cybercriminal organization and will aid victims.By Michael Hill 30 Aug 2023 5 minsBotnetsMalwareCybercrimenewsSuspected Met Police data breach potentially exposes sensitive officer, staff informationUnauthorised access at a supplier might have compromised names, ranks, photos, vetting levels, and pay numbers for officers and staff.By Michael Hill 29 Aug 2023 3 minsData BreachData PrivacyCybercrimenewsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeThe two, including a 17-year-old, were convicted for their part in attacks on Uber, Nvidia, and other companies.By Michael Hill 24 Aug 2023 2 minsHacker GroupsCybercrimenews analysisClop ransomware dominates ransomware space after MOVEit exploit campaignThe fast-rising Clop ransomware gang is capitalizing on compromising a single environment, underscoring the need to assess security of software supply chains.By Lucian Constantin 23 Aug 2023 4 minsRansomwareCybercrimefeature6 best practices to defend against corporate account takeover attacksWhen bad actors get control of business or corporate accounts, it can be more dangerous than comprised personal or consumer accounts. Here are some ways to stop them.By Linda Rosencrance 17 Aug 2023 10 minsBusinessCyberattacksCybercrimenewsUK police data breach exposes victim informationDisclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies.By Michael Hill 15 Aug 2023 3 minsData BreachIdentity TheftLegalbrandpostSponsored by Rapid7The challenge of managing unlimited threats in a limited budget: cyber security experts comment By Rapid7 14 Aug 2023 5 minsCybercrimeStorage Securitynews analysisTakeovers of MFA-protected accounts increase, as Microsoft 365 phishing campaign showsThe new phishing campaign targets business executives and uses EvilProxy to defeat multifactor authentication.By Lucian Constantin 10 Aug 2023 5 minsMulti-factor AuthenticationMulti-factor AuthenticationMulti-factor AuthenticationnewsRansomware victim numbers surge as attackers target zero-day vulnerabilitiesRansomware groups are also prioritizing the exfiltration of files, which has become the primary source of extortion.By Michael Hill 07 Aug 2023 8 minsRansomwareCyberattacksCybercrimenews analysisRansomware gang increases attacks on insecure MSSQL serversNew research shows a dramatic rise in double-extortion ransomware attacks by the Mallox group By Lucian Constantin 26 Jul 2023 3 minsRansomwareCyberattacksCybercrimenews analysisVEC campaign targets critical infrastructure firms with invoice fraud attackThreat actor compromised five different vendor email accounts and delivered email attacks to 15 individuals across five customer organizations.By Michael Hill 26 Jul 2023 5 minsEmail SecurityCyberattacksCybercrimenews analysisSophisticated HTTP and DNS DDoS attacks on the riseCybercriminals are now using techniques to launch distributed denial of service attacks once only available to nation-state threat actors.By Lucian Constantin 20 Jul 2023 7 minsDDoSCyberattacksCybercrime Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Ransomware in 2022 By Veeam 25 Jan 2023Backup and RecoveryCybercrimeRansomware whitepaper Countering Ransomware With Veeam + Lenovo By Veeam 24 Jan 2023CybercrimeRansomwareSecurity View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield 05 Dec 20237 mins Election HackingGovernmentSecurity Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte 05 Dec 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO