news analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian ConstantinNov 17, 20234 minsRansomwareComplianceCybercrime news Major Australian ports shut down following cyber incidentBy Samira SarrafNov 12, 20232 minsCyberattacksSupply ChainCybercrimenews Generative AI to fuel stronger phishing campaigns, information operations at scale in 2024By Samira SarrafNov 08, 20236 minsPhishingCyberattacksGenerative AI news analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleBy Michael Hill Nov 06, 20235 minsRansomwareZero TrustCybercrime newsGovernments should not pay ransoms, International Counter Ransomware Initiative members agreeBy Michael Hill Nov 02, 20233 minsRansomwareGovernmentCybercrime opinionWhat the White House executive order on AI means for cybersecurity leadersBy Christopher Burgess Oct 31, 20236 minsCSO and CISOGovernmentThreat and Vulnerability Management brandpostSponsored by Palo Alto NetworksDefending Against Advanced Threats, Part 2By Stephanie Regan with David Moulton Oct 25, 20232 minsCybercrime brandpostSponsored by Palo Alto NetworksCSO_Defending Against Advanced Threats, Part 1 By Kristopher Russo with David Moulton Oct 25, 20232 minsCybercrime brandpostSponsored by SophosTech Leaders: Here’s what to focus on in security Oct 24, 20234 minsCybercrime Articlesnews analysisHacker group compromises MSSQL servers to deploy FreeWorld ransomwareThe DB#JAMMER group also deploys a Cobalt Strike command-and-control agent.By Lucian Constantin Sep 01, 2023 4 minsHacker GroupsRansomwareCybercrimenews analysisQakbot infrastructure dismantled in multinational cybercrime takedownMore than $8.6 million in cryptocurrency seized from the Qakbot cybercriminal organization and will aid victims.By Michael Hill Aug 30, 2023 5 minsBotnetsMalwareCybercrimenewsSuspected Met Police data breach potentially exposes sensitive officer, staff informationUnauthorised access at a supplier might have compromised names, ranks, photos, vetting levels, and pay numbers for officers and staff.By Michael Hill Aug 29, 2023 3 minsData BreachData PrivacyCybercrimenewsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeThe two, including a 17-year-old, were convicted for their part in attacks on Uber, Nvidia, and other companies.By Michael Hill Aug 24, 2023 2 minsHacker GroupsHacker GroupsHackingnews analysisClop ransomware dominates ransomware space after MOVEit exploit campaignThe fast-rising Clop ransomware gang is capitalizing on compromising a single environment, underscoring the need to assess security of software supply chains.By Lucian Constantin Aug 23, 2023 4 minsRansomwareCybercrimefeature6 best practices to defend against corporate account takeover attacksWhen bad actors get control of business or corporate accounts, it can be more dangerous than comprised personal or consumer accounts. Here are some ways to stop them.By Linda Rosencrance Aug 17, 2023 10 minsBusinessCyberattacksCybercrimenewsUK police data breach exposes victim informationDisclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies.By Michael Hill Aug 15, 2023 3 minsData BreachIdentity TheftLegalnews analysisTakeovers of MFA-protected accounts increase, as Microsoft 365 phishing campaign showsThe new phishing campaign targets business executives and uses EvilProxy to defeat multifactor authentication.By Lucian Constantin Aug 10, 2023 5 minsMulti-factor AuthenticationPhishingCyberattacksnewsRansomware victim numbers surge as attackers target zero-day vulnerabilitiesRansomware groups are also prioritizing the exfiltration of files, which has become the primary source of extortion.By Michael Hill Aug 07, 2023 8 minsRansomwareCyberattacksCybercrimenews analysisRansomware gang increases attacks on insecure MSSQL serversNew research shows a dramatic rise in double-extortion ransomware attacks by the Mallox group By Lucian Constantin Jul 26, 2023 3 minsRansomwareCyberattacksCybercrimenews analysisVEC campaign targets critical infrastructure firms with invoice fraud attackThreat actor compromised five different vendor email accounts and delivered email attacks to 15 individuals across five customer organizations.By Michael Hill Jul 26, 2023 5 minsEmail SecurityCyberattacksCybercrimenews analysisSophisticated HTTP and DNS DDoS attacks on the riseCybercriminals are now using techniques to launch distributed denial of service attacks once only available to nation-state threat actors.By Lucian Constantin Jul 20, 2023 7 minsDDoSCyberattacksCybercrime Show more Show less View all Resources whitepaper Watch the "Cyber Risk is a Business Risk Keynote" Video Dive into the dynamic intersection of cybersecurity and business risk in this insightful keynote replay. The post Watch the “Cyber Risk is a Business Risk Keynote” Video appeared first on Whitepaper Repository. By Trend Micro 28 Nov 2023CybercrimeData and Information SecuritySecurity whitepaper Cyberattacks on Small Businesses are Big Business By Xerox 15 Nov 2023CyberattacksCybercrimeSecurity whitepaper Wertvollen Content vor Bedrohungen schutzen By Box 14 Nov 2023CybercrimeData ManagementSecurity View all Video on demand videoWhat is inside a hacker's backpack?To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher. Sep 06, 2023 33 minsHackingCybercrime Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41 Aug 08, 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 Aug 07, 2018 15 minsPhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs By Maria Korolov Nov 29, 20239 mins Security PracticesVulnerabilitiesSecurity news Amazon’s AWS Control Tower aims to help secure your data’s borders By Jon Gold Nov 28, 20233 mins RegulationCloud Security news North Korean hackers mix code from proven malware campaigns to avoid detection By Shweta Sharma Nov 28, 20233 mins Malware podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO