A phishing campaign against users of a Ukrainian battlefield awareness tool masqueraded as an email from a Ministry of Defense employee telling the users to update their digital certificates, says the Ukrainian Computer Emergency Response Team. The tool, dubbed Delta, is a digital map.
Chinese hackers are exploiting known vulnerabilities in a Citrix networking appliance and virtual private network. The products, Citrix ADC and Gateway, are popular in the healthcare sector. Left unpatched, attackers may execute ransomware attacks or steal intellectual property.
To avoid having to even consider paying a ransom, experts have long urged all organizations to put in place appropriate defenses. Two defensive strategies for healthcare firms are moving backup and recovery to the cloud and practicing incident response scenarios.
Malware analysis and sandboxing solutions traditionally have been bound to operating systems and file types, but file types in the critical infrastructure world are different. Critical infrastructure cannot rely on standard malware analysis tools given the unique operating systems used in the space.
Epic Games, maker of Fortnite, will pay $520 million to the U.S. government to settle allegations it violated children's privacy and charged credit cards without authorization. Epic said its previous practices adhered to "long-standing industry practices" but that "the old status quo" has changed.
Expel raised $31 million less than a year after hauling in $140 million to fuel the MDR vendor's international expansion and provide a financial cushion. The company has doubled down on the United Kingdom, Ireland, Sweden and the Netherlands to take advantage of its existing customer base there.
In the year ahead for cybersecurity, predicting risk and vulnerabilities will be a key area of innovation and adoption for forward-leaning enterprises, says Trend Micro's Dhanya Thakkar.
Karl Sebastian Greenwood, a dual citizen of Sweden and the United Kingdom, pleaded guilty in U.S. federal court to his role in selling the purported multibillion-dollar cryptocurrency pyramid OneCoin that netted $4 billion. He now faces sentencing.
IronNet is just days away from insolvency and its board of directors says it will investigate allegations that company executives misled investors over growth projections. The firm was founded and is helmed by retired Army Gen. Keith Alexander, the former NSA director and U.S. Cyber Command chief.
More than a quarter million Medicare beneficiaries will be issued new Medicare cards and identifiers following a ransomware attack on a government contractor compromising a range of sensitive personal and health information.
In October, former Uber CSO Joe Sullivan was convicted of covering up a 2016 data breach. The trial likely marked the first time a chief security officer had faced criminal charges over incident response. Attorney Jonathan Armstrong says, "This trend is going to be difficult to put back in the box."
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
APIs increasingly drive everything from web and mobile application development to IoT devices since they streamline communication among disparate systems, says Synack CEO Jay Kaplan. But testing the efficacy and security of APIs remains challenging given the size of API endpoints.
In the latest weekly update, Troy Leach, chief strategy officer at Cloud Security Alliance, joins ISMG editors to discuss the latest innovation in the payments space and accompanying risks, as well as how the case of Sam Bankman-Fried's failed cryptocurrency exchange will affect regulatory actions.
After 20 years DDoS remains a problem due to the old protocols used by the internet, making DDOS protection and mitigation not just sensible to have but a fundamental element of cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.