Protect Data Differently for a Different World – Dark Reading
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach. – Read More
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach. – Read More
Ultimately, a more cyber-secure world requires a global governing body to regulate and campaign for cybersecurity, with consistent regulatory requirements in the various regions around the world. – Read More
The scheme, from the group also known as APT28, involves targeting Eastern European diplomats in need of personal transportation, tempting them with a purported good deal on a Audi Q7…
The runaway success of an upstart ransomware outfit called “Dark Angels” may well influence the cyberattack landscape for years to come. – Read More
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies. – Read More
Now that the Authy Desktop app has reached EOL and is no longer accessible, users are hoping their 2FA tokens synced correctly with their mobile devices. – Read More
In a monoculture, cybercriminals need to look for a weakness in only one product, or discover an exploitable vulnerability, to affect a significant portion of services. – Read More
A simple toggle in Proofpoint’s email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough? – Read More
Having a robust identity continuity plan is not just beneficial but essential for avoiding financially costly and potentially brand-damaging outages. – Read More
By injecting malicious bytecode into interpreters for VBScript, Python, and Lua, researchers found they can circumvent malicious code detection. – Read More
Law firms make the perfect target for extortion, so it’s no wonder that ransomware attackers target them and demand multimillion dollar ransoms. – Read More
Researchers say the attacks are easy to perform, difficult to contact, nearly unrecognizable, and “entirely preventable.” – Read More
The prolific ransomware group has shifted away from phishing as the method of entry into corporate networks, and is now using initial access brokers as well as its own tools…
A malvertising campaign uses phishing to steal legitimate account pages, with the endgame of delivering the Lumma stealer. – Read More
Significant upcoming legislation promises to tighten the screws on cyber incident response in Australia, mirroring CIRCIA in the US. – Read More