newsUK data regulator orders end to spreadsheet FOI requests after serious data breachesThe Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal informationBy Michael HillSep 29, 20233 minsGovernmentCybercrimeData and Information Security news analysis Web app, API attacks surge as cybercriminals target financial servicesBy Michael HillSep 27, 20236 minsFinancial Services IndustryCyberattacksApplication SecuritybrandpostSponsored by Sophos Unmasking ransomware threat clusters: Why it matters to defenders Sep 21, 20233 minsCybercrime news analysisAWS cryptojacking campaign abuses less-used services to hideBy Lucian Constantin Sep 18, 20236 minsMalwareCloud SecurityCybercrime news analysisHacker group compromises MSSQL servers to deploy FreeWorld ransomwareBy Lucian Constantin Sep 01, 20234 minsHacker GroupsRansomwareCybercrime news analysisQakbot infrastructure dismantled in multinational cybercrime takedownBy Michael Hill Aug 30, 20235 minsBotnetsMalwareCybercrime newsSuspected Met Police data breach potentially exposes sensitive officer, staff informationBy Michael Hill Aug 29, 20233 minsData BreachData PrivacyCybercrime newsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeBy Michael Hill Aug 24, 20232 minsHacker GroupsCybercrime news analysisClop ransomware dominates ransomware space after MOVEit exploit campaignBy Lucian Constantin Aug 23, 20234 minsRansomwareCybercrime Articlesnews analysisAttackers add hacked servers to commercial proxy networks for profitProxyjacking allows attackers to sell unknowing victims' unused network bandwidth.By Lucian Constantin Jun 30, 2023 4 minsCybercrimefeatureHow the new deepfake reality will impact cyber insuranceCyber liability insurers are beginning to take notice of the threats posed by deepfakes. That may mean changes in insurance policies and what it takes to qualify for one.By Deb Radcliff Jun 29, 2023 8 minsInsurance IndustryCybercrimeData and Information SecuritynewsEncrochat bust leads to 6,500 arrests, seizure of $1B in assetsAn international investigation intercepted and analyzed over 115 million conversations that took place over the encrypted messaging platform among more than 60,000 users. By Apurva Venkat Jun 28, 2023 4 minsCommunications SecurityCybercrimenews analysisMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaignThis newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.By Lucian Constantin Jun 14, 2023 5 minsPhishingEmail SecurityCybercrimenews analysisBusiness email compromise scams take new dimension with multi-stage attacksA new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication.By Lucian Constantin Jun 12, 2023 6 minsEmail SecurityCyberattacksCybercrimenews analysisClop extortion gang gives MOVEit exploit victims one week to reach outAt least 20 organizations have been compromised by Clop's MOVEit exploit, according to new research.By Lucian Constantin Jun 07, 2023 5 minsRansomwareCyberattacksCybercrimefeatureWhat is the Cybercrime Atlas? How it can help disrupt cybercrimeThe Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting cybercrime. By Samira Sarraf Jun 01, 2023 6 minsCyberattacksCybercrimeopinionWhat cybersecurity professionals can learn from the humble antWhen ants work together to defend their colony, it’s all for one and one for all. This model could help forge an immediate global, coordinated, and effective response to cyberattacks.By Christopher Burgess May 22, 2023 5 minsCSO and CISOGovernmentCybercrimebrandpostSponsored by NTTCyberattacks: How to strengthen your security, fastBy Sean Duffy, Vice President: Go-to-Market Cybersecurity at NTT May 19, 2023 5 minsCyberattacksCybercrimenewsRussian national indicted for ransomware attacks against the USMikhail Pavlovich Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers.By Apurva Venkat May 18, 2023 4 minsRansomwareLegalCybercrimenews analysisNew ransomware gang RA Group quickly expanding operationsThe RA Group uses double extortion and has detailed information on its victims.By Lucian Constantin May 15, 2023 4 minsRansomwareCyberattacksCybercrimenews analysisLaw enforcement crackdowns and new techniques are forcing cybercriminals to pivotResearchers say that law enforcement crackdowns and new investigative tools are putting pressure on cybercriminals, but challenges for defenders remain.By Cynthia Brumfield May 15, 2023 7 minsRansomwareBlockchainCybercrime Show more Show less View all Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Maturing Criminal Marketplaces Present New Challenges The Sophos 2023 Threat Report reveals evolving trends, including the continuous lowering of barriers to entry for would-be cybercriminals and the commodification of "advanced persistent threat" tools. The post Maturing Criminal Marketplaces Present New Challenges appeared first on Whitepaper Repository. By Sophos 28 Sep 2023Application Performance ManagementCybercrimeSecurity whitepaper Revealed: The State of Cybersecurity in 2023 By Sophos 28 Sep 2023Application Performance ManagementCybercrimeRansomware whitepaper Discover the State of Ransomware in 2023 By Sophos 28 Sep 2023Application Performance ManagementCybercrimeRansomware View all Video on demand videoWhat is inside a hacker's backpack?To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher. Sep 06, 2023 33 minsHackingCybercrime Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41 Aug 08, 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 Aug 07, 2018 15 minsPhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity By Michael Hill Sep 29, 20234 mins Education IndustryEducation IndustryEducation Industry feature Cybersecurity startups to watch for in 2023 By CSO Staff Sep 29, 202319 mins CSO and CISOSecurity news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules By Cynthia Brumfield Sep 28, 20236 mins RegulationData BreachFinancial Services Industry podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO