This week, exiled Russian journalist Galina Timchenko's iPhone was found to contain NSO Group's Pegasus spyware, a Russian businessman was sentenced for insider trading, more than 300,000 people were affected by an attack on See Tickets and period-tracking apps raised privacy concerns in the U.K.
The drumbeat for potential federal legislation to better protect sensitive health information - or at least new regulations - appears to be growing louder in Congress. One of the Senate's four lawmaker doctors is quizzing the healthcare industry on ways to safeguard health data.
Hackers stole the personal details of thousands of police officers and staff in a ransomware attack that swept up one of the United Kingdom's largest law enforcement agencies. The Greater Manchester Police on Thursday described the attack as targeting a third-party supplier of various organizations.
A major ransomware attack on the Sri Lankan government's cloud infrastructure compromised approximately 5,000 government email accounts and wiped out numerous emails that had not been protected by offline backups. The agency said some employees lost three months of email messages.
Kubernetes is warning all users to immediately update their clusters to the latest version - released Aug. 23 - to patch a trio of critical command injection vulnerabilities attackers can use to remotely execute code. Akamai has released proof-of-concept code for exploiting one of the flaws.
Booking and reservation systems, as well as slot machines, hotel room door locks, ATMs and more remain offline at multiple MGM Resorts properties as the publicly traded casino hotel giant battles "a cybersecurity issue" that one group of security researchers has tied to a ransomware group attack.
In Part 1 of this three-part blog post, Nikko Asset Management's Marcus Rameke provides an introduction and defines the requirements for making the transformative journey to the cloud. Parts 2 and 3 will discuss more detailed aspects of making the shift to the cloud.
How does an organization achieve peace of mind with security while overcoming the challenges of complex hybrid and multi-cloud networks? Here are the top reasons why your organization should consider implementing a cloud-native firewall service to protect your AWS environments and applications.
In constantly changing environment, organizations have to respond quickly and prioritize IT and security requirements and need to be prepared for a variety of challenges to ensure secure operations.
Organizations need to shore up & modernize the security operations and a cloud-native SIEM powered by AI can...
In today's digital landscape, understanding your vulnerabilities is the first step to fortifying your defenses. Your organization's attack surface represents those potential gateways that malicious actors could exploit to access your most critical assets.
Download the guide written by Fortra and roadmap to a more...
In a world where cyberattacks strike every few seconds, causing catastrophic damage with an average data breach cost of $4.4 million globally, how do some businesses stay resilient?
The answer lies in embracing offensive security—a proactive approach to cybersecurity. Unlike reactive strategies, offensive security...
In the latest weekly update, ISMG editors discuss the state of cybersecurity market resilience in 2023, why U.S. federal regulators publicly named 130 healthcare firms using web trackers and how SentinelOne ended its partnership with startup Wiz amid takeover discussions.
Perimeter 81's ease of deployment and embrace of a cloud-based architecture made it stand apart from other secure remote access offerings, according to Check Point Software CEO Gil Shwed. The deal will help Check Point build a scalable network foundation that extends to thousands of users.
Multiple nation-state hacking groups have been exploiting known flaws in Zoho ManageEngine software and Fortinet firewalls to steal data, cybersecurity officials warn. A new alert details exploits of each vulnerability by separate groups that targeted the same aeronautical firm.
Welcome to the report summarizing the survey conducted in spring/summer 2023. It attracted 214
responses from senior cybersecurity professionals in the NA,
APAC, UKI and EU regions.
The goals for this study were to identify:
The top organizational challenges in securing non-SSO
integrated apps;
How...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.