Microsoft says it seized control of seven domains belonging to Russian GRU-linked state-sponsored threat group Strontium. The group, also called APT28 and Fancy Bear, used the domains to target Ukrainian media organizations and had U.S. and EU government entities and decision-makers on its radar.
APT-C-23, a politically motivated, Hamas-linked threat actor, is using fake Facebook profiles to trick high-ranking Israeli officials into downloading previously undocumented Trojanized Android and PC direct message applications that grant them access to the victims' devices.
A week after the Spring4shell vulnerability was first detected, security companies Microsoft, Check Point and Akamai have identified exploitation attempts, and Trend Micro has confirmed the first successful attempt - the Mirai botnet leveraging CVE-2022-22965 for its malicious operations.
David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.
A $960,000 NFT rug pull scam has affected at least 1,191 people who bought the tokens, a blockchain investigator and researcher who tweets as @zachxbt tells ISMG. Michael Fasanello, a private sector compliance professional specializing in anti-money laundering, also verifies the scam.
In the latest "Proof of Concept," Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP and David Pollino, former CISO at PNC Bank, join Information Security Media Group editors to discuss U.S. regulatory trends and supply chain risk management.
This edition discusses the latest episode of "The Ransomware Files," which covers the REvil ransomware gang's 2021 attack on Kaseya. It also examines how healthcare entities can prepare for potential spillover attacks from the hybrid Russia-Ukraine war and highlights from ISMG's Chicago Summit.
The Justice Department has announced that it has successfully disrupted "Cyclops Blink," a botnet controlled by the Russia-linked threat actor Sandworm, aka Voodoo Bear. The court-authorized operation was conducted in March and removed the botnet from thousands of infected devices worldwide.
Financial institutions must be aware of artificial intelligence being used by criminals against them, says John Buzzard, lead analyst, fraud and security, Javelin Strategy & Research. He discusses the findings of Javelin's latest identity fraud report.
The U.S. Treasury Department has sanctioned Russian darknet marketplace Hydra and cryptocurrency exchange Garantex. The German Bundeskriminalamt shut down Hydra on Tuesday, and Garantex allegedly was involved in ransomware and cybercriminal activities targeting U.S. citizens and other entities.
Chinese state-backed threat actor Cicada, aka APT10, is attacking global organizations in what appears to be a monthslong espionage campaign. On its radar are government, legal, religious and nongovernmental organizations in Europe, Asia and North America, the Symantec Threat Hunter team says.
Every customer expects highly personalized onboarding interactions featuring tailored touchpoints, minimal friction and accelerated approvals. How can an elegant onboarding experience help add more accounts and reduce customer abandonment? This infographic from LexisNexis® Risk Solutions provides tips on how to:...
Although the final weeks of 2021 will be remembered for the resurgence of the pandemic, driven by the new Omicron strain, the second half of the year marked the end of restrictions and the reopening of economies in many parts of the world.
What has become clearly apparent from analysis of the LexisNexis® Digital...
Expel is out with its new forward-looking report, “Great eXpeltations,” and
among the topics covered are supply chain targeting, ransomware & cryptojacking, along with business email compromise.
So what are the top trends and predictions for the 2022 cyber threat landscape and how do you better protect your...
Findings from the latest LexisNexis® Risk Solutions Cybercrime Report revealed that between July-December 2021, the mobile share of transactions in the LexisNexis® Digital Identity Network® reached 75% for the first time, as app-based transactions become the predominant means by which consumers transact globally. ...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.