news analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian ConstantinNov 17, 20234 minsRansomwareComplianceCybercrime news Major Australian ports shut down following cyber incidentBy Samira SarrafNov 12, 20232 minsCyberattacksSupply ChainCybercrimenews Generative AI to fuel stronger phishing campaigns, information operations at scale in 2024By Samira SarrafNov 08, 20236 minsPhishingCyberattacksGenerative AI news analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleBy Michael Hill Nov 06, 20235 minsRansomwareZero TrustCybercrime newsGovernments should not pay ransoms, International Counter Ransomware Initiative members agreeBy Michael Hill Nov 02, 20233 minsRansomwareGovernmentCybercrime opinionWhat the White House executive order on AI means for cybersecurity leadersBy Christopher Burgess Oct 31, 20236 minsCSO and CISOGovernmentThreat and Vulnerability Management brandpostSponsored by Palo Alto NetworksDefending Against Advanced Threats, Part 2By Stephanie Regan with David Moulton Oct 25, 20232 minsCybercrime brandpostSponsored by Palo Alto NetworksCSO_Defending Against Advanced Threats, Part 1 By Kristopher Russo with David Moulton Oct 25, 20232 minsCybercrime news analysisCryptojacking campaign Qubitstrike targets exposed Jupyter Notebook instancesBy Lucian Constantin Oct 19, 20235 minsCryptocurrencyMalwareCybercrime ArticlesnewsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeThe two, including a 17-year-old, were convicted for their part in attacks on Uber, Nvidia, and other companies.By Michael Hill Aug 24, 2023 2 minsHacker GroupsCybercrimenews analysisClop ransomware dominates ransomware space after MOVEit exploit campaignThe fast-rising Clop ransomware gang is capitalizing on compromising a single environment, underscoring the need to assess security of software supply chains.By Lucian Constantin Aug 23, 2023 4 minsRansomwareCybercrimefeature6 best practices to defend against corporate account takeover attacksWhen bad actors get control of business or corporate accounts, it can be more dangerous than comprised personal or consumer accounts. Here are some ways to stop them.By Linda Rosencrance Aug 17, 2023 10 minsBusinessCyberattacksCybercrimenewsUK police data breach exposes victim informationDisclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies.By Michael Hill Aug 15, 2023 3 minsData BreachIdentity TheftLegalnews analysisTakeovers of MFA-protected accounts increase, as Microsoft 365 phishing campaign showsThe new phishing campaign targets business executives and uses EvilProxy to defeat multifactor authentication.By Lucian Constantin Aug 10, 2023 5 minsMulti-factor AuthenticationPhishingCyberattacksnewsRansomware victim numbers surge as attackers target zero-day vulnerabilitiesRansomware groups are also prioritizing the exfiltration of files, which has become the primary source of extortion.By Michael Hill Aug 07, 2023 8 minsRansomwareCyberattacksCybercrimenews analysisRansomware gang increases attacks on insecure MSSQL serversNew research shows a dramatic rise in double-extortion ransomware attacks by the Mallox group By Lucian Constantin Jul 26, 2023 3 minsRansomwareCyberattacksCybercrimenews analysisVEC campaign targets critical infrastructure firms with invoice fraud attackThreat actor compromised five different vendor email accounts and delivered email attacks to 15 individuals across five customer organizations.By Michael Hill Jul 26, 2023 5 minsEmail SecurityCyberattacksCybercrimenews analysisSophisticated HTTP and DNS DDoS attacks on the riseCybercriminals are now using techniques to launch distributed denial of service attacks once only available to nation-state threat actors.By Lucian Constantin Jul 20, 2023 7 minsDDoSCyberattacksCybercrimenewsInitial access broker posts targeting banks increase on dark webFinancial institutions should continuously monitor the dark web to identify threats and prevent breaches, Searchlight Cyber advises in a new study.By Apurva Venkat Jul 19, 2023 4 minsFinancial Services IndustryCybercrimeNetwork Securitynews analysisSilentbob worm attack targets multiple cloud technologiesCybercrime group TeamTNT re-emerges with new malware that can rapidly infect systems and spread.By Lucian Constantin Jul 13, 2023 8 minsBotnetsCyberattacksMalwarenewsInterpol arrests suspected senior member of hacker group OPERA1ERThe group is believed to have stolen an estimated $11 million — potentially as much as $30 million — in more than 30 attacks across 15 countries in Africa, Asia, and Latin America. By Apurva Venkat Jul 07, 2023 4 minsCyberattacksCybercrime Show more Show less View all Resources whitepaper 2023 Payment Security Report insights During the 20-year history of PCI security compliance, Verizon has highlighted several leading methods and models that significantly simplify the complexity of PCI security program design and management. The post 2023 Payment Security Report insights appeared first on Whitepaper Repository. By Verizon 06 Dec 2023Business OperationsComplianceCybercrime whitepaper Partnerships Key to OT Cybersecurity By Intel Corporation 04 Dec 2023Application Performance ManagementCybercrimeSecurity whitepaper Watch the "Cyber Risk is a Business Risk Keynote" Video By Trend Micro 28 Nov 2023CybercrimeData and Information SecuritySecurity View all Video on demand videoWhat is inside a hacker's backpack?To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher. Sep 06, 2023 33 minsHackingCybercrime Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41 Aug 08, 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 Aug 07, 2018 15 minsPhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur Dec 06, 20234 mins IT JobsSecurity Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities By Susan Bradley Dec 06, 20236 mins Patch Management SoftwareThreat and Vulnerability ManagementWindows Security feature What should be in a company-wide policy on low-code/no-code development By Ericka Chickowski Dec 06, 202315 mins Application SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO