The Swiss government says that online attackers used a variant of "Turla" malware - previously tied to campaigns with suspected Russian intelligence ties - to steal at least 23 GB of sensitive information from state-owned defense firm RUAG.
After Kansas Heart Hospital suffered a ransomware infection and paid the demanded ransom, its attackers demanded more. At that point, the hospital reportedly declined to comply, relying instead on its pre-prepared backup and recovery plan.
Distributed denial-of-service attacks are increasingly targeting the application layer, rather than the network, which means organizations must build new defensive strategies, says Sanjai Gangadharan of A10 Networks.
Reserve Bank of India wants to recruit senior vice presidents for four vertical functions in its proposed IT subsidiary. But the search for a CEO to lead the team is still ongoing. What is the reason for the delay? And how can the process be streamlined?
More than 150 security practitioners are expected to attend the Middle East Security Awards conference in Dubai May 24-25. Here is a quick peek at what's expected.
Too few organizations have in-house incident response teams. As a result, they lack the native ability to even detect evolving threats, such as ransomware, says Ann Barron-DiCamillo of Strategic Cyber Ventures in this video interview. What are the must-have response capabilities?
Officials in several nations are probing the security of the SWIFT interbank messaging system in the wake of recent hacker attacks. Can the bank-owned cooperative better police members, secure access to its network as well as spot emerging hack attacks and fraud?
A hacker published personal information, including email addresses, from a database of subscribers for an online archival service of Fairfax Media's Sydney Morning Herald in Australia.
Another series of SWIFT-enabled hack attacks against a bank has come to light, following the theft of $81 million from the central bank of Bangladesh and SWIFT warning that other banks are also being targeted.
Today's threat actors are more focused, funded and disruptive than ever. But the cybersecurity defense industry is not built to respond appropriately, thought leader Tom Kellermann of Strategic Cyber Ventures says in this video interview. What are security leaders overlooking?
Banks and regulators have begun reviewing SWIFT-related information security practices and requirements following the online heist of $81 million from Bangladesh Bank. Authorities say much of that money is still missing.
A data breach at Cabcharge, a large Australian taxi booking and payments service, exposed details on customer movements, drivers and partial credit card numbers. One expert warns that the data could be useful to fraudsters.
Security leaders, while welcoming India's new intellectual property rights policy as a step in the right direction, argue that the policy lacks specifics around awareness creation, enforcement of IP rights and software patenting.
In a shocking twist, the developers behind the TelsaCrypt ransomware have apologized for their ransom campaign and released a master decryption key, which all victims can now use to unlock the malware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.