Html Sitemap

SolarWinds Supply Chain Hit: Victims Include Cisco, Intel
The Hunt for 'Shadow APIs'
Implementing 'Zero Trust' in a Hybrid Cloud Environment
Cryptomining Worm Now Targets Web Apps, IoT Devices
Hackers Use Mobile Emulators to Steal Millions
Brand Impersonation: It's an InfoSec Problem
After Data Leak, FTC Orders Firm to Fix Security
Microsoft Finds Backdoor; CISA Warns of New Attack Vectors
DOJ Seizes $4 Million in Assets Tied to Phantom Secure
Malicious Browser Extensions Downloaded 3 Million Times
FBI Warns of DoppelPaymer Ransomware Attack Surge
SolarWinds Hack: Lawmakers Demand Answers
At Last, Results of HIPAA Compliance Audit Program Revealed
NSA Warns of Hacking Tactics That Target Cloud Resources
President Trump Downplays Impact of SolarWinds Breach
FireEye: SolarWinds Hack 'Genuinely Impacted' 50 Victims
DOJ Seizes Fake Domains Impersonating Moderna, Regeneron
Bill Spells Out New Factors to Weigh in Setting HIPAA Fines
US Treasury Suffered 'Significant' SolarWinds Breach
Putting Identity at Center of Cybersecurity Programs
Former 'Silk Road' Associate Sentenced to 8 Months in Prison
EU Launches Decryption Tool for Law Enforcement
Other Tech Firms Back Facebook's Lawsuit Against NSO Group
Are EU Privacy Regulators Starting to Find GDPR Consensus?
HHS Issues Another Settlement on Patient Access to Records
Guidance Offered on Data Disclosures During Pandemic
Critical Flaws Put Dell Wyse Thin Client Devices at Risk
Police Dismantle Cybercrime 'Bulletproof Hosting Service'
Leveraging CIAM to Fight Fraud
Zero Trust and the Role of Internet Isolation
Phishing Email Campaign Uses Updated COVID-19 Theme
NIST's Ron Ross: 'The Adversary Lives in the Cracks'
Ex-NSA Director: SolarWinds Breach Is 'A Call for Action'
Emotet Botnet Returns After 2-Month Hiatus
'UltraRank' Targets More E-Commerce Sites
FBI Warns of COVID-19 Vaccine Fraud Schemes
CISA Warns SolarWinds Incident Response May Be Substantial
DHS Warns of Data Theft Risk Posed by Chinese Technology
Fake Amazon Gift Cards Deliver Dridex Trojan
Lazarus Group Targeted COVID-19 Research
Microsoft Warned CrowdStrike of Possible Hacking Attempt
'WeLeakInfo' Site: UK Police Arrest 21 Alleged Users
Citrix Warns Its ADC Products Are Being Used in DDoS Attacks
SolarWinds Attack: 'This Hit the Security Community Hard'
How Will Biden Administration Tackle Cybersecurity?
Fresh Card Skimmer Attacks Multiple E-Commerce Platforms
SolarWinds Orion: Fixes Aim to Block Sunburst and Supernova
Ransomware 2020: A Year of Many Changes
Paving the Road to Customer IAM
FinCEN: Beware Scams Related to COVID-19 Vaccines
T-Mobile Alerts Customers to New Breach
CISA Releases New Guidance on SolarWinds Patch
FBI Warns Of Swatting Attacks Targeting Smart Home Devices
2021: The Evolution of 'Zero Trust'
British Judge Denies US Extradition of Assange
New Golang-Based Worm Targets Servers to Mine Monero
100,000 Zyxel Devices Vulnerable to Backdoor
Analysis: 2020 Health Data Breach Trends
Defense Funding Measure Includes 77 Cybersecurity Provisions
Compliance Lessons From 2020 Fraud Cases
Severe SolarWinds Hacking: 250 Organizations Affected?
Citrix Updates ADC Products to Help Block DDoS Attacks
Ransomware Attacks in Healthcare Surging
Shareholder Sues SolarWinds for Alleged Security Failures
Researchers Disclose Details of FIN7 Hacking Group's Malware
Pharma Discussion | Mitigating Phishing in the Era of Mobile Devices
Phishing Emails Spoof Australia's Cyber Security Center
UK Court Denies Assange Bail During Appeals Process
SolarWinds Attack: Pointing a Finger at Russia
Blood Testing Lab Data Leaked
NSA Releases Guidance on Obsolete Encryption Tools
Ransomware Attack Delays EHR Rollout
Rioters Open Capitol's Doors to Potential Cyberthreats
ElectroRAT Malware Targets Cryptocurrency Wallets
Leveraging 'Multisectoral' Authentication
Case Study: The Very Group's Digital Security Journey
Was JetBrains Tool an Infection Vector for SolarWinds Hack?
Trump Executive Order Bans 8 More Chinese Apps
The Cyber Risk Management Challenges After Capitol Riot
Researchers Warn Attackers Are Scanning for Zyxel Products
SolarWinds Hires Chris Krebs to Reboot Its Cybersecurity
2021: The State of Privacy
Ryuk Ransomware Profits: $150 Million
Federal Courts Investigate 'Apparent Compromise' of System
Senior Managers Lag on Cybersecurity Hygiene
State Department Plans to Create Cybersecurity Office
JPMorgan Chase Hacker Sentenced to 12 Years in Prison
Ransomware and EHR Systems: A Dangerous Mix
Twitter Permanently Suspends President Trump's Account
FBI Issues Alert on Growing Egregor Ransomware Threat
Why Compliance Teams Need a Dashboard
Capitol Riot: Self-Surveillance Feeds Investigation
Defining and Refining Next-Gen AML
Reserve Bank of New Zealand Investigates Data Breach
Kaspersky: SolarWinds Backdoor Similar to Russian 'Kazuar'
Paging System Leak Affects Thousands of Patients
Parler Content Forcibly Archived by Researchers After Riot
Vulnerable Database Exposed UN Employees' Data
Updated macOS Cryptominer Uses Fresh Evasion Techniques
SolarWinds Describes Attackers' 'Malicious Code Injection'
Massive DarkMarket Underground Marketplace Taken Down
New Year Kicks Off With Vendor Consolidation
Biggest Fine Yet for Patient Records Access Violation
Mimecast Says Hackers Compromised Digital Certificate
'SolarLeaks' Site Claims to Offer Attack Victims' Data
Capitol Breach: Cybersecurity Lessons to Apply
Mobile RAT for Android Offered on Darknet Forums
COVID-19 Vaccine Documents, Personal Data Leaked
Watering Hole Operation Leveraged Zero-Day Exploits
Does Trump's Second Impeachment Have Cybersecurity Impact?
Sizing Up the Role of Deception Technology
How Conti Ransomware Works
CISA Warns of Surge in Attacks Targeting Cloud Services
Office 365 Backup and Teams: What You Need to Know
FTC Orders Health App Vendor to Revamp Privacy Practices
Ransomware Disrupts Scottish Environment Protection Agency
NSA Offers Guidance on Adopting Encrypted DNS
'Scam-as-a-Service' Scheme Spreads
Capitol Riot Suspects Identify Themselves
Biden Inauguration: Defending Against Cyberthreats
Appeals Court Vacates $4.3 Million HIPAA Penalty
Iranian APT Group Revived Phishing Activities Over Holidays
Excellus Health Plan Hit With $5.1 Million HIPAA Settlement
Magecart Groups Hide Behind 'Bulletproof' Hosting Service
Joker's Stash Reportedly Shutting Down Operations
FBI: Disinformation Campaigns Seek to Exploit Capitol Siege
COVID-19 Vaccine Themes Persist in Fraud Schemes
Iranian Cyber Operation Posts Threats
Manufacturing System Protection from Cyber Attacks
Biden's $10 Billion Cybersecurity Proposal: Is It Enough?
Building Trust in a Digital Consumer Landscape
Privacy Fines: Total GDPR Sanctions Reach $331 Million
FBI Warns of Increase in Vishing Attacks
Microsoft Taking Additional Steps to Address Zerologon Flaw
OpenWRT Project Community Investigating Data Breach
COVID-19 First Anniversary: It's About Vaccines & Variants
'Raindrop' Is Latest Malware Tied to SolarWinds Hack
How to Manage Software Supply Chain Risks
Free Auditing Tool Helps Detect SolarWinds Hackers' Malware
Trump Orders IaaS Providers to Track Foreign Users
Ransomware Incident Reportedly Leads to Health Data Leak
Malwarebytes CEO: Firm Targeted by SolarWinds Hackers
Is Passwordless Authentication the Solution to the Password Problem?
'FreakOut' Botnet Targets Unpatched Linux Systems
The Final HIPAA Actions Under Trump Administration
Supply Chain Integrity: The Role of Verified Reproducible Builds
Fueled by Profits, Ransomware Persists in New Year
Biden Fills 3 Cybersecurity Positions
Good News: Cryptocurrency-Enabled Crime Took a Dive in 2020
Cryptomining Campaign Linked to Iranian Software Firm
Microsoft Describes How SolarWinds Hackers Avoided Detection
Data Exchange Expert Micky Tripathi to Head HHS ONC
President Biden Orders SolarWinds Intelligence Assessment
Texas Medical Center Breach Affects 640,000
DreamBus Botnet Targets Linux Systems
Researchers Identify SAP Flaw Exploit
Biden's COVID-19 Plan Calls for Assessment of Cyberthreats
Account Takeover Goes Mobile
Fraudsters Are Using Google Forms to Evade Email Filters
DDoS Attackers Revive Old Campaigns to Extort Ransom
Protecting Apps and Data in Kubernetes
SonicWall Investigating Zero-Day Attacks Against Its Products
Case Study: Live Oak Bank Tackles Cloud Security with Orca Security
Fraud Prevention Without Friction
NIST's IoT Guidance: A Look at the Draft
Assessing the SolarWinds Hack's Impact on Fraud
Profiles in Leadership: Arun DeSouza
Russian Pleads Guilty to Running Cybercrime Forum
Automating the SOC: 'Start Small'
DDoS Attackers Exploit Vulnerable Microsoft RDP Servers
Pediatric Hospital Faces Lawsuit After Blackbaud Breach
Cyber Incident Knocks Construction Firm Palfinger Offline
Vulnerability Researchers Hit by North Korean Hackers
Jim Clark: Why He's Giving Away Passwordless Technology
Combating SolarWinds Supply Chain and SUNBURST Backdoor - from Device to Cloud
Mimecast Confirms SolarWinds Hackers Breached Company
2 Arrested for Alleged Theft of COVID-19 Patient Data
Profiles in Leadership: Donna Ross
Email Security: The Risks You're Missing
Ransomware: Should Governments Hack Cybercrime Cartels?
OnDemand | The 5 Principles for integrating Security Into DevOps
Law Enforcement Operation Disrupts Notorious Emotet Botnet
Pirated Software Sites Deliver Fresh DanaBot Malware
Post-Merger Blues: Old EHR System Breached
Phishing Campaign Features Fake Office 365 Update
Chris DeRusha Named Federal CISO
Dead System Admin's Credentials Used for Ransomware Attack
Another Takedown: Netwalker Ransomware Gang Disrupted
Stopping Fraud at the IVR
Researchers: Beware of 10-Year-Old Linux Vulnerability
Lawsuit: App Maker Shared Health Data With Chinese Firms
EDR, NDR, MDR, XDR: It Still Comes Down to Detection and Response
Fighting Fraud in COVID-19 Relief Programs
Reported US Data Breaches Declined by 19% in 2020
Police Using Emotet's Network to Help Victims
CISO Dialogue
IAM in a Multi/Hybrid Cloud Environment – Can We Do it Better This Time?
UScellular: Hackers Accessed Customer Data
Microsoft Offers Details on Hack of Vulnerability Researchers
Phishing Kit Can Change Lures and Text
OIG: VA Workers Hid ‘Big Data’ Project Privacy, Security Risks
Is Trickbot Botnet Making a Comeback?
The Rise of ‘Frankenstein Fraud’ for Synthetic Identities
Getting a Return on SOC Investments
After Joker’s Stash Closes, What Comes Next?
Kids’ Health Insurer’s Website Vulnerable for 7 Years
SolarWinds Hackers Cast a Wide Net
Tackling ID Theft With Additional Security Layers
Ransomware Newcomers Include Pay2Key, RansomEXX, Everest
Washington State Breach Tied to Accellion Vulnerability
SonicWall Confirms Zero-Day Flaw Affects Certain Products
Democrats Introduce COVID-19 Data Privacy Bill
Updated Agent Tesla Malware Disables Endpoint Protection
China Tied to Separate SolarWinds Espionage Campaign
'Kobalos' Linux Malware Targets Supercomputers Worldwide
Wind River Systems Investigating Possible Data Breach
NCSC Warns of China’s Efforts to Collect US DNA Data
New DHS Secretary Pledges to Investigate SolarWinds Hack
The Future of Identity Proofing
Do Ransomware Operators Have a Russian Government Nexus?
Updated Trickbot Deploys Fresh Reconnaissance Tool
Medical Researcher Sentenced in IP Theft Case
Unusual Phishing Campaign Extracted Office 365 Credentials
2020 Breach Statistics: An Analysis
Recently Uncovered Botnet Targets Android Devices
CISOs on Ransomware and Malicious Insiders
Fonix Ransomware Gang Shuts Down Operations
Study: iPhone 12 Magnets Can Deactivate Cardiac Devices
Microsoft: Office 365 Was Not SolarWinds Initial Attack Vector
Fraudsters Target Discord Users in Cryptocurrency Scam
Plex Media Servers Used to Amplify DDoS Threats
Your Microsoft 365 productivity cloud and the backup it deserves
Cybersecurity Leadership: Asset Discovery and Visibility
FTC Finalizes SkyMed Data Leak Settlement
Hacker Breached Florida City's Water Treatment System
Case Studies: CISOs Take on the 'Zero Trust' Challenge
NHS Reports COVID-19 App Success, Backed by Strong Privacy
Data Exfiltration Enabled by Google Chrome Sync Extension
5 Critical Questions Raised by Water Treatment Facility Hack
Investments in Israel's Cybersecurity Sector Grow 70%
LodaRAT Malware Can Now Target Android Devices
2021: Beyond Accelerated Transformation
Profiles in Leadership: Glauco Sampaio
How Deepfakes Can Defeat Video ID Verification Tests
Chinese APT Group Deploys ‘Most Sophisticated’ Shellcode
SIM-Swapping Hackers Steal Celebrities' Cryptocurrency
Senators Demand More Coordination in SolarWinds Investigation
Patient Files Dumped on Darknet Site After Hacking Incidents
Microsoft Issues Second Patch for Netlogon Vulnerability
World Health Organization CISO on Supply Chain Risk
How to Make the Most of Automation in the SOC
HHS OCR Issues 15th Records Access Settlement
SAP Commerce Product Has Vulnerability
White House Taps Neuberger to Lead SolarWinds Probe
The Challenge of Detecting Lateral Movement
Securing Telemedicine and Future of Remote Work in Healthcare with SASE
2 More Breaches Tied to Accellion File Transfer Appliance
Siemens Patches 21 Vulnerabilities in 2 Tools
Notification of Breach Affecting 219,000 Delayed
Sharp Healthcare Latest to Be Fined for Records Access Failure
Water Treatment Hack Prompts Warning From CISA
M&A Update: Apax Partners to Acquire Herjavec Group
Finding and Removing Rogue Wi-Fi Access Points
Suspected Egregor Ransomware Affiliates Busted in Ukraine
Microsoft's Smith: SolarWinds Attack Involved 1,000 Developers
Health Data Breach Tally Crowded With Vendor Incidents
Privacy Legislation Progresses in 5 More States
Zero Trust: The New Reality
France Ties 3-Year Hacking Campaign to Russia's Sandworm
Microsoft Patches 12-Year-Old Vulnerability
Biden Assesses US Policies on China Cybersecurity Issues
DTEX Case Study: Williams Racing
DTEX Case Study: VicTrack
What is Next-Gen Insider Threat Management?
South Korea Claims North Korea Tried Hacking Pfizer
CyberEdBoard Executive Member, Jeffrey Brown, guest speaks on panel at ISMG Zero Trust Virtual Cybersecurity Summit
CyberEdBoard Executive Member, Sujeet Bambawale, guest speaks on panel at ISMG Zero Trust Virtual Cybersecurity Summit
Darknet Markets Compete to Replace Joker's Stash
File-Sharing App SHAREit for Android Has Remote Code Flaw
Senators Push for Action on Water Treatment Hack Investigation
3 North Koreans Indicted for Conspiring to Steal $1.3 Billion
PACS Flaws Put Data at Risk for 18 Months
Nigerian Gets 10-Year Sentence for BEC Scam
Hackers Target Instant Quote Websites
White House Preparing 'Executive Action' After SolarWinds Attack
Human Challenge: Hard For Humans, Easy For Bots
'Cuba' Ransomware Gang Hits Payment Processor, Steals Data
IRS Warns of Fresh Fraud Tactics as Tax Season Starts
Eye Care Practice: Vendor Paid Ransom for Return of Data
Creating a Digital ID to Verify COVID-19 Testing
M&A Update: CrowdStrike to Acquire Humio for $400 Million
Reevaluating Supply Chain Security
New Malicious Adware Exploits Apple M1 Chip
Accellion: How Attackers Stole Data and Ransomed Companies
Ransomware: How to Regain Lost Ground
Fraudsters Using Telegram API to Harvest Credentials
Sequoia Capital Investigating 'Cybersecurity Incident'
Chinese Hacking Group 'Cloned' NSA Exploit Tool
Russian Hacking Group Deploys IronPython Malware Loader
Python Software Rushes to Tackle RCE Vulnerability
Silver Sparrow Malware Infects 30,000 Macs
France Warns of Stolen Healthcare Credentials
Senators Grill Cybersecurity Execs on SolarWinds Attack
The Changing Needs for Enterprise DLP
Using ID Screening to Fight COVID-19 Economic Relief Fraud
Updated Minebridge RAT Targets Security Researchers
Prison Time for Scheme to Frame Nurse for HIPAA Violations
Cybersecurity Agencies Warn of Accellion Vulnerability Exploits
Senate SolarWinds Hearing: 4 Key Issues Raised
OnDemand Webinar: 2021 State of Physical Access Control
Federal Reserve's Money Transfer Services Suffer Outage
6,000 VMware vCenter Devices Vulnerable to Remote Attacks
Executive Order Focuses on Supply Chain Risk Management
Lazarus Hits Defense Firms With ThreatNeedle Malware
Ransomware: Beware of 13 Tactics, Tools and Procedures
Microsoft Releases Queries for SolarWinds Attack Detection
Microsoft Patches Windows Remote Code Flaw
DHS to Provide $25 Million More for Cybersecurity Grants
Big Data Healthcare Project Raises Privacy Issues
House SolarWinds Hearing Focuses on Updating Cyber Laws
NSA Issues Guidance on 'Zero Trust' Implementation
Ryuk Ransomware Updated With 'Worm-Like Capabilities'
Equifax CISO Jamil Farshchi on SolarWinds and Supply Chains
Defending Supply Chains in the Crosshairs
Rockwell Controllers Vulnerable
Indian Vaccine Makers, Oxford Lab Reportedly Hacked
Why This Facebook Privacy Settlement Is Unusual
Cryptocurrency Firm Tether Refuses to Pay Ransom to Hackers
Hackers Use Search Engine Optimization to Deliver Malware
What a Modern Threat Intelligence Program Should Be
India Fights Against Malware Targeting Power Supply
Ransomware Attack's Economic Impact: $67 Million
AI Supremacy: Russia, China Could Edge Out US, Experts Warn
Microsoft Patches Four Zero-Day Flaws in Exchange
Cybersecurity Leadership: Identity, Access, Complexity
Lazarus Group Tied to TFlower Ransomware
GAO Report Highlights Need for Centralized Cyber Leadership
Changing Authentication for Employees
Exchange Server Attacks Spread After Disclosure of Flaws
Security Labs: A Boost for Software Development Training
Dynamic Fraud Prevention
Russian Cybercrime Forum 'Maza' Suffers Data Breach
Qualys Gets 'Clopped' by Accellion-Exploiting Attackers
Okta to Buy Auth0 for $6.5 Billion
Google Patches Zero-Day Vulnerability in Chrome
Lesson From SolarWinds Attack: It's Time to Beef Up IAM
In Healthcare, Ransomware Hitting Diverse Targets
Researchers Disclose More Malware Used in SolarWinds Attack
Mark of Ransomware's Success: $370 Million in 2020 Profits
Digital Risk Protection and 'Offensive Defense'
Supply Chain Attack Jolts Airlines
Hackers Exploit Exchange Flaws to Target Local Governments
VMware Patches Vulnerability on View Planner
IAM: Are you all in or just dipping your toes?
CIAM in Action: Lessons Learned from the Trenches
Fraudsters Devise More COVID-19 Vaccine Schemes
How Unprotected Encryption Keys Enabled the SolarWinds Attack
Supermicro and PulseSecure Issue Advisories on Trickboot
Phishing Attack Uses Fake Google reCAPTCHA
COVID-19: Are We Rounding the Corner?
Better Identity Coalition: A Project Update
John McAfee Charged With Cryptocurrency Fraud
Profiles in Leadership: Sawan Joshi
Profiles in Leadership: Jack Leidecker
Zero Trust and the Critical Role for Strong Authentication
Lawmakers Urge FTC to Enforce Health Breach Notification Rule
McAfee to Sell Enterprise Unit for $4 Billion
Correcting the Process of Continuous Monitoring
ZLoader Malware Hidden in Encrypted Excel File
Bill Would Allow Americans to Sue Foreign Hackers
Researchers Describe a Second, Separate SolarWinds Attack
List of Hacked Exchange Servers May Boost Recovery Efforts
Shodan Founder: Using Search Engine to Find Vulnerabilities
Startup Probes Hack of Internet-Connected Security Cameras
Microsoft Patch Tuesday: A Call to Action
Hackers Waging 'Living Off the Land' Attacks on Azure
CISA Will Manage .Gov Domain in Effort to Enhance Security
The Impact of COVID-19 on Cybersecurity Strategies
Adobe Patches 8 Critical Vulnerabilities
Police Target Criminal Users of Sky ECC Cryptophone Service
On Demand Webinar | How to Effectively Manage the Modern Risks of Open-Source Code
ROI Case Study - Nucleus Research: European Financial Services Institution
Relief Package Includes Less for Cybersecurity
Microsoft Exchange: At Least 10 APT Groups Exploiting Flaws
More Health Data Breaches Tied to Vendor Incidents
DearCry Ransomware Targets Unpatched Exchange Servers
OnDemand Webinar | Security Education for Developers
OnDemand Webinar | Public Sector Digital Transformation and Secure Software
Debt Collection Firm Reaches Breach Settlement With States
Spear-Phishing Campaign Distributes Nim-Based Malware
GAO: CISA Has Many Unfinished Tasks
Federal Privacy Bill Reintroduced in Congress
New Attack Uses Fake Icon to Deliver Trojan
Cryptophone Service Crackdown: Feds Indict Sky Global CEO
UK Set to Boost Cybersecurity Operations
Exchange Hacks: How Will the Biden Administration Respond?
Taking Complexity Out of Threat Intelligence
Hacking Incidents, Vendor Breaches Keep Surging
Rushed to Market: DearCry Ransomware Targeting Exchange Bug
Demystifying 'Passwordless' Authentication
Microsoft Issues Mitigation Tool for an Exchange Server Flaw
Tips on Selecting a Protective DNS Service
Microsoft Exchange: Server Attack Attempts Skyrocket
US Intelligence Reports: Russia, Iran Targeted 2020 Election
Fake Telegram Desktop App Malware Campaign Persists
Reevaluating Your Third-Party Risk Strategy
Florida Teen Pleads Guilty in 2020 Twitter Hack
Mimecast Update: SolarWinds Hackers Stole Source Code
White House Establishes Group to Investigate Exchange Attacks
Researchers Demonstrate Browser-Based Side-Channel Attack
John Kindervag: Reflections on 'Zero Trust'
Internet-Enabled Crime: 2020 US Losses Exceed $4.2 Billion
Researchers Uncover Widely Used Malware Crypter
FCC Moves Toward Banning 3 Chinese Telco Firms From US
Health Insurer Sues Accellion in Wake of Hacking Incident
The Case for 'Zero Trust' Approach After SolarWinds Attack
Feds Charge Verkada Camera Hacker With 'Theft and Fraud'
Follow the Data: Security’s 'New Now'
Lessons from the SolarWinds Hack: A CISOs Approach
Building Trust in a Digital Transformation Journey: The Role of a CISO
The Anatomy of the Solarwinds Attack
Russian Pleads Guilty in Tesla Hacking Scheme
Panel Discussion: Cybersecurity Week in Review
Tax-Themed Phishing Campaign Emerges
Purpose Built: Securing vSphere Workloads
Hackers Used Trojanized Xcode to Target macOS Developers
GAO: Electrical Grid's Distribution Systems More Vulnerable
Data Sharing: Myths vs. Reality
Microsoft Exchange Flaw: Attacks Surge After Code Published
Attackers Exploiting F5 Networks' BIG-IP Vulnerability
Acer Reportedly Targeted by Ransomware Gang
Remote Work Creates Insider Threat Concerns
Charm Offensive: Ransomware Gangs 'Tell All' in Interviews
VMware, Recorded Future, Others Announce M&A Deals
Swiss Firm Says It Accessed SolarWinds Attackers' Servers
Cybercrime Forum Administrator Sentenced to 10 Years in Prison
A Tale of Breach Notification Blunders
Accellion Data Breach Ensnares Energy Giant Shell
Fighting Fraud as Digital Payments Skyrocket
Determining the Total Cost of Fraud
CISA Prepares to Use New Subpoena Power
SolarWinds Attackers Manipulated OAuth App Certificates
CEO Pleads Guilty in Fraud Case Involving HIPAA Violations
IoT Vendor Sierra Wireless Reports Ransomware Attack
Gartner on Enterprise IoT: Segment and Isolate Everything
'Black Kingdom' Ransomware Hits Unpatched Exchange Servers
REvil Ransomware Can Now Reboot Infected Devices
Phishing Campaign Used Fake Office 365 Update Messages
Ransom Paid Just Before Netwalker Gang Disrupted
Insurer CNA Disconnects Systems After 'Cybersecurity Attack'
Ransomware-Wielding Gangs Love to Phish With Trojan Loaders
HHS Issues 17th HIPAA 'Right of Access' Settlement
Hades Ransomware Targets 3 US Companies
SolarWinds Attack Illustrates Evolving Russian Cyber Tactics
FBI Issues Alert on Mamba Ransomware
Microsoft: Exchange Ransomware Activity 'Limited' So Far
Applying CIAM Principles to Employee Authentication
'Zero Trust': An Outdated Model?
ISMG Editors' Panel: Hot Cybersecurity Issues
OpenSSL Fixes Flaws That Could Lead to Server Takedowns
Retailer Fat Face Pays $2 Million Ransom to Conti Gang
After Breach, Mental Healthcare Provider Sues Amazon
COVID-19-Related Fraud: 474 Charged So Far
How Old Breaches Fuel New Identity Crimes
Senators Raise Concerns About Energy Dept. Cybersecurity
Attacker Updates PHP Source Code to Include Backdoor
OnDemand | Spending Your Next Cybersecurity £ (Hint: It's Not on Prepping for Quantum Computing)
Ransomware: Home Health Firm Reports 2nd Cloud Vendor Incident
GAO Pushes for Speeding Up Cybersecurity Enhancements
Hades Ransomware Gang Linked to an Exchange Attack
HHS Issues Another HIPAA 'Right of Access' Settlement
Fake 'System Update' App Targets Android Users
Check Point: 50,000 Attempted Ransomware Attacks Target Exchange
NIST Drafts Election Security Guidance
Adopting a 'Shift Left' Strategy
As SolarWinds Announces More Patches, Analysts Offer Advice
Iran-Linked Phishing Campaign Targeted Medical Researchers
Breach Victims Piling Up in Wake of Cloud Vendor Attack
Biden's Infrastructure Plan: 3 Cybersecurity Provisions
Fighting Drug Diversion Fraud With Technology
Connecting Users to Apps
Switching Away from Paper Documents for Good
VMware Patches 2 Flaws in vRealize Operations
DeepDotWeb Portal Administrator Pleads Guilty
CISA Orders Agencies to Recheck for Exchange Compromises
Weekly Wrap: Accellion FTA Breaches and More
Ubiquiti Acknowledges Extortion Attempt
Securing the Technology Transformation of Healthcare
Defending Against the Surge in Healthcare Cyberattacks During the COVID Crisis
North Korean Group Targets Security Researchers - Again
Detect and Track Sunburst (And the Next Big One) In Your Network
Synthetic Identity Fraud: How to Define and Detect
Kansas Man Faces Federal Charges Over Water Treatment Hack
Beyond Your SIEM - Threat Detection at Scale with Automation
What’s the Point of Threat Intelligence Without Threat Detection?
Vendor Breach Involved PHI Exposure on GitHub
FBI and CISA: APT Groups Targeting Government Agencies
533 Million Facebook Account Records Posted to Forum
Capital One Warns of More Data Leaked in 2019 Breach
Healthcare Phishing Incidents Lead to Big Breaches
Ariel Weintraub Takes Charge of Cybersecurity at MassMutual
Facebook Data Exposure: Lessons to Learn
Evolution of Endpoint Security
Ransomware Cleanup Costs Scottish Agency $1.1 Million
Africa OnDemand | Mitigating Remote Risks: Maintaining Visibility and Maximizing Efficiency
EMEA OnDemand | Mitigating Remote: Maintaining Visibility and Maximizing Efficiency
IG: Cybersecurity Weaknesses Persist in US Energy Dept.
Stolen Cards, Reportedly From Cardpool.com, Sold on Darknet
More Accellion Health Data Breaches Revealed
Senators Raise Security Concerns Over Selling Personal Data
OnDemand Webinar | Measuring Risk in Self-Service: Data Analysis on Real IVR Traffic
Ziggy Ransomware Gang Offers Victims Ransom Refunds
Attackers Target Unpatched SAP Applications
An Alternative Approach to Cryptocurrency Security
Why Didn't Government Detect SolarWinds Attack?
In Wake of Breaches, Accellion Faces at Least 14 Lawsuits
Attackers Using Malicious Doc Builder Called 'EtterSilent'
Krebs: States Need a Cyber Funding Boost
Ransomware Gang Exploits Old Fortinet VPN Flaw
600,000 Payment Cards Stolen From Swarmshop Darknet Market
New Regs Aim to Improve Patient Records Access, Sharing
Weekly Roundup: Biden’s Cybersecurity Proposals and More
US Blacklists 7 Chinese Supercomputer Entities
Visa Describes New Skimming Attack Tactics
Fraudsters Flooding Collaboration Tools With Malware
Cofense and StrikeForce Announce Acquisitions
Biden Seeks to Boost CISA's Budget by $110 Million
Why Is Mastercard Working on Digital ID Assurance?
NSA Veterans Nominated for Top Cyber Posts
Microsoft to Buy Nuance Communications for $19.7 Billion
HHS Information Security Program Still 'Not Effective'
Texas Man Charged With Planning to Bomb AWS Data Center
A Tale of 3 Data 'Leaks': Clubhouse, LinkedIn, Facebook
Modern Bank Heists: Attackers Go Beyond Account Takeover
Initial Access Brokers: Credential Glut Weakening Prices?
Former DHS Leader Shares Details on SolarWinds Attack
Millions of Devices Potentially Vulnerable to DNS Flaws
Cyberattacks on Health Insurers Continue
Profiles in Leadership: Jo Stewart-Rattray
Intelligence Report: 4 Nations Pose Serious Cyberthreat to US
Profiles in Leadership: Andrea Szeiler
Microsoft Patches 4 Additional Exchange Flaws
FBI Removing Web Shells From Infected Exchange Servers
Defining Synthetic ID Fraud: How It Helps With Mitigation
Educating Hospital Board Members on Cybersecurity
Phishing Campaign Targeting COVID Vaccine 'Cold Chain' Expands
What SolarWinds Can Teach Us About Third-Party Risk
How Sanofi, a Global Pharmaceutical Company, Stopped a Cyberattack with Vectra
Senators Push for Changes in Wake of SolarWinds Attack
Lazarus E-Commerce Attackers Also Targeted Cryptocurrency
US Sanctions Russia Over SolarWinds Attack, Election Meddling
Bank Groups Object to Proposed Breach Notification Regulation
Advice for Combating the 'Next' SolarWinds Attack
Unscripted: 3 Security Leaders Dissect Today's Top Trends
XDR: Solving the Threat Detection Gap
ISMG Editors’ Panel: The Facebook Breach and More
US Pulls Back Curtain on Russian Cyber Operations
Attack on Codecov Affects Customers
The Economics of Software Flaw Discoveries, Exploits
How to Prevent Wire Transfer Fraud
Payment Card Theft Ring Tech Leader Gets 10-Year Sentence
What Are the Reasons Behind Health Data Breach Surge?
PR Campaign: Babuk Ransomware Gang Claims Decryptor Repaired
White House 'Stands Down' SolarWinds, Exchange Response Groups
Identity Management at the Core of Recent M&A Activity
Geico Says Driver's License Numbers Stolen From Website
Telehealth: Safeguarding Patient Data
100-Day Plan to Enhance Electrical Grid Security Unveiled
XCSSET Malware Can Adapt to Target More Macs
Nation-State Actor Linked to Pulse Secure Attacks
Lazarus Group Hid Remote-Access Trojans in Bitmap Images
SonicWall Patches 3 Zero-Day Flaws
REvil Ransomware Gang Threatens Stolen Apple Blueprint Leak
Mitigating Risks as Ransomware Tactics Change
Second Medical Researcher Sentenced in Hospital IP Theft Case
CISA Orders Agencies to Mitigate Pulse Secure VPN Risks
Self-Sovereign Identity: More Use Cases
New FIDO Protocol Simplifies IoT Device Onboarding
Joker Malware Targets More Android Devices
DOJ Launches Task Force to Battle Ransomware Threat
ER Physician Association Hacked
Supernova Attack Leveraged SolarWinds, Pulse Secure
Turkish Police Probe Thodex Cryptocurrency Exchange
ISMG Editors’ Panel: Securing Cryptocurrencies and More
Analysts Uncover More Servers Used in SolarWinds Attack
QNAP Systems' Appliance Users Hit by Ransomware
Rapid7 Acquires Open-Source Community Project Velociraptor
Florida Public Defender Describes Malware Attack's Impact
Cryptomining Campaign Leverages Exchange Server Flaws
Apple Patches Worst Zero-Day Bug 'in Recent Memory'
Yes, It’s a $3 Million Ransomware Defense Warranty
Emotet Malware Automatically Uninstalled
FBI, CISA Warn of Ongoing Russian Cyberthreats
Attack on Radiation Systems Vendor Affects Cancer Treatment
Click Studios Hacked, Exposing Users' Passwords
FBI Shares Email Addresses to Speed Emotet Cleanup
COVID-19: Is the End in Sight?
DC Metropolitan Police Hit With Cyberattack
Thoma Bravo to Buy Proofpoint for $12.3 Billion
Lawmakers Seek to Expand CISA's Role
Cybersecurity Leadership: It’s About Cloud Security
Tips on Enhancing Supply Chain Security
FluBot Spyware Spreads Across Europe
'Ghostwriter' Disinformation Campaign Targets NATO Allies
IRS Sharpens Cryptocurrency Investigation Skills
Touhill Takes Charge at Carnegie Mellon SEI’s CERT
Civilian Cyber Reserve Program Proposed
(ISC)2: Only 13% of Cybersec Pros Had a Cyber Education
Google COVID-19 Contact-Tracing Tool Exposes Data: Lawsuit
Fighting Ransomware: A Call for Cryptocurrency Regulation
Experian API Flaw Raises Questions
Rethinking Cybersecurity by Managing Complexity
ISMG Editors’ Panel: Cyber Extortion and More
Babuk to Close Ransomware Operation After DC Police Attack
CISA: 5 Agencies Using Pulse Secure VPNs Possibly Breached
Ransomware Gang Exploits SonicWall Zero-Day Flaw
GitHub Leaks: Lessons Learned
NSA Offers OT Security Guidance in Wake of SolarWinds Attack
Vulnerability Management: Essential Components
Researcher Finds New Vulnerabilities in Cellebrite's Tools
Attackers' Dwell Time Plummets as Ransomware Hits Continue
Ransomware: Reducing the Risk to Universities
Buer Dropper Malware Updated Using Rust
Pulse Secure VPN Zero-Day Flaw Patched
Security Incident Leads Scripps Health to Postpone Care
Authentication: Lessons Learned During Pandemic
IT Modernization Grants Will Prioritize Cybersecurity
NIST Seeks Input on HIPAA Security Rule Guidance Update
The Use of Data to Identify Fraud
Millions of Dell Devices Vulnerable to Update Driver Flaw
PHP Composer Flaw That Could Affect Millions of Sites Patched
Ransomware Hits Australian Telecom Provider Telstra’s Partner
SmileDirectClub: Attack Taking Big Bite Out of Revenue
3 Bills Focus on Enhancing Electrical Grid Cybersecurity
DHS Secretary: Small Businesses Hard-Hit by Ransomware
Exim Patches 21 Flaws in Message Transfer Agent
Mitigating the Risks of Malicious OAuth Apps
'Hack the Pentagon' Program Expands
Newly Patched Peloton API Flaws Exposed Users' Private Data
Intel, AMD Dispute Findings on Chip Vulnerabilities
US Physics Laboratory Exposed Documents, Credentials
Exclusive Interview: New HHS ONC Leader on Health Data Security
ISMG Editors Discuss Cryptocurrency Regulations and More
DNS Flaw Can Be Exploited for DDoS Attacks
CISA Alert Describes FiveHands Ransomware Threat
How Patched Android Chip Flaw Could Have Enabled Spying
Accenture, Forcepoint, Others Make Acquisitions
US and UK Issue Joint Alert on Russian Cyber Activity
Malspam Campaign Used Hancitor to Download Cuba Ransomware
Colonial Pipeline Confirms Ransomware Causing Disruptions
Colonial Pipeline Starts Recovery From Ransomware
More Healthcare Disruptions Tied to Vendor Incidents
FBI: DarkSide Ransomware Used in Colonial Pipeline Attack
Pipeline Attack: 'Time for a Disproportionate Response'
Colonial Pipeline: 'A Global Day of Reckoning'
Authentication Challenges in Faster Payments
Healthcare's Widening Cyber 'Seams and Cracks'
Alerts: Avaddon Ransomware Attacks Increasing
Groups Call for Alignment of HIPAA Privacy Rule, Other Regs
CISA Awaits Technical Details on Colonial Pipeline Attack
Microsoft Patches 4 More Exchange Flaws
Colonial Pipeline Attack: 'All Monsters Are Human'
Agentless Cloud Security and Compliance for AWS, Azure, and GCP
Did Data Leak Discovery Reveal a Ransomware Incident?
Colonial Pipeline Attack Leads to Calls for Cyber Regs
Colonial Pipeline Restarts Operations Following Attack
Biden Signs Sweeping Executive Order on Cybersecurity
Utilizing SOC Automation to Its Full Capacity
Making the Most of XDR
Cloud Identity Security and the Power of PAM
Colonial Pipeline Attack: 'We're Simply Unprepared'
Taking a Fresh Approach to Combating Ransomware
Take the Complexity Out of Security
Profiles in Leadership: Manish Dave
Addressing Ransomware's Data Privacy Concerns
Navigating State Data Privacy Laws
Biden: Russian Government Not Behind Colonial Pipeline Attack
Why Endpoint Protection Is Key to Hybrid Work
Biden's Cybersecurity Executive Order: 4 Key Takeaways
How to 'Demystify' Cybersecurity
Building Accountability for Cybersecurity
Patched Wi-Fi Vulnerabilities Posed Risks to All Users
Do You Need a Human OS Upgrade?
ISMG Editors’ Panel: Analysis of Colonial Pipeline Attack
Creating Cultural Change With the Right Security Context
Profiles in Leadership: Diego Souza
Cloud Security: Encryption and Key Management Essentials
Business Imperative: Cloud Adoption, With Security
Profiles in Leadership: Tim Heger
Authentication Methods to Support 'Work From Anywhere'
Debunking Myths About MSPs
Rethinking Vulnerability Practices to Better Manage Risk
Profiles in Leadership: Michael Lines
Why Crowdsourcing Cybersecurity Needs Additional Innovation
Ripped From the Headlines: Incident Response Best Practices
Gaining Control of the 'Internet of Medical Things'
Interpol's Top Cybercrime Cop on Ransomware, Supply Chains
Fresh Strategies Offer Hope for Combating Ransomware Scourge
How Not to Handle a Data Breach
CISO Mitch Parker on Playing Catch-Up in Healthcare
Defending Against Socially Engineered Scams
Defending Research Programs Against Foreign Threats
Ransomware Attack Leads to IT Shutdown for Irish Hospitals
Why It’s Time for a Cybersecurity ‘Reboot’
DarkSide Ransomware Gang Says It Has Shut Down
'Zero Trust': Beyond Transformation
Paying a Ransom: Does It Really Encourage More Attacks?
New Qualys CEO Tackles Cybersecurity Asset Management
Preparing for ‘Shift Left’
Threat Hunting Report: Beyond Supply Chain Attacks
Tech Spotlight: Endpoint Security
Automation and Management of Digital Identities
Tech Spotlight: Tools to Secure the New Landscape
Progress in the Fight Against Ransomware
ThreatINSIGHT Via Network Detection and Response
SASE: The Need, the Challenges, the Payoff
Passwordless: Is It Finally Ready for Prime Time?
Sophos on 2021 State of Ransomware
Fraud 2021: Mules, Synthetic IDs, Deep Social Engineering
'Zero Trust' Security for the Mainframe
Cyber Journalism: Truth Is Stranger Than Fiction
How Risky Is Cyber Insurance?
SolarWinds, Ransomware and the State of the Industry
RSA CEO Rohit Ghai on the New RSA
RSA's Zulfikar Ramzan: Beyond Digital Transformation
CISO Spotlight: Marene Allison, Johnson & Johnson
Shattering Cybersecurity's Glass Ceiling
Election Security: Lessons Learned from 2020
Making Zero-Day Flaws Disappear
Why Ransomware Attacks Keep Getting Worse and Worse
Ruby Zefo on Extreme Makeover: Privacy Edition
Michael Daniel on Operational Collaboration
Cybersecurity Resilience: One CISO's Pandemic Takeaways
Touhill: What It Takes to Be Resilient
Regional Security in COVID-19
Investing in Solutions for Tomorrow’s Attacks
Project 2030: Scenarios for the Future of Cybercrime
The Role of Breach Controls in Network Security
Security for a New Era of Resilience
Irish Healthcare Sector Was Hit by 2 Ransomware Attacks
Real-Time Application and Cloud Workload Protection
CISO Spotlight: Don Cox, CIBR
RSA's CEO: For Maximum Resiliency, Unleash Chaos Monkeys
2 Bills Introduced in Wake of Colonial Pipeline Attack
Visible Figures: Bridging the Skills Gap
Art Coviello: 'It's a Roaring '20s for Technology'
Taking on SOAR: The Challenges and Opportunities
Introducing MITRE ATT&CK Defender
CISO Spotlight: Troels Oerting, World Economic Forum
The Human Element: Not Our Biggest Risk?
Driving Healthcare Innovation With a Security Mindset
Cybersecurity Metrics That Matter
Profiles in Leadership: Adrian Mayers
FDA: Strong Smartphone Magnets Can Affect Cardiac Devices
RSA Cryptographers' Panel: SolarWinds, NFTs and More
Profiles in Leadership: Anne Hännikäinen
Neuberger: Ransomware Requires International Response
Tracking DarkSide Ransomware Gang's Profits
Watering Hole Attack Targeted Florida Water Utilities
Profiles in Leadership: Suren Naidoo
Profiles in Leadership: Francis McGillicuddy
The Rise of Surveillance States
Will Crypto Displace the Dollar?
Developing a Culture of Security
What Should a Modern SOC Look Like?
Cybercrime Crystal Ball: Which Threats Loom Largest?
International Student Health Insurer Breached
Colonial Pipeline CEO Confirms $4.4 Million Ransom Payment
What Would National Data Breach Notification Law Look Like?
Colonial Pipeline Ransomware Attack: CISOs React
Profiles in Leadership: Rebecca Wynn
Attackers Were Inside SolarWinds in January 2019
Researchers Uncover Another DarkSide Ransomware Variant
New WastedLocker Variant Exploits Internet Explorer Flaws
Solarium Commission's Recommendations: The Top Priorities
Eyes Wide Open: Visibility in Digital Risk Protection
Alaska Health Department Services Affected by Malware Attack
Defending Entry Points: A New Approach
Solving the Data Vulnerability Problem
Data Risk Governance: The BISO's Perspective
ISMG’s Editors’ Panel: Improving Hiring Practices and More
Healthcare’s Post-Transformation Agenda
4 Ways to Use Zero Trust Beyond VPN Replacement
Passwords: BioTech and Pharma Both Need a New Path
Ransomware Gang Provides Irish Health System With Decryptor
Colonial Pipeline CEO to Testify at Congressional Hearing
Supply Chain: The Role of Software Bills of Materials
Windows Push Notifications Used for Fraud
StrRAT Masquerades as Ransomware
Should Paying Ransoms to Attackers Be Banned?
Cyber Insurance: Higher Premiums, Limited Coverage
FBI Warns Healthcare Sector of Conti Ransomware Attacks
Privacy Rights: GDPR Enforcement Celebrates Third Birthday
OnDemand | Managing Insider Risk with a Hybrid Workforce
Iran Devises Way to Convert Oil to Bitcoin
Cybersecurity Regs for Pipelines Reportedly Coming Soon
Update: UK Insurer Recovering From Ransomware Attack
Fourth Guilty Plea in UPMC Hacking Incident
Quantum Computing: Assessing the Risks
OnePlus Co-Founder Carl Pei Targeted in Twitter Hack
VMware Urges Rapid Patching for Serious vCenter Server Bug
How Secure Is Your Security Data Lake?
Data Breach Response Essentials for the Ransomware Age
Cybersecurity Executive Order: An Assessment
Nearly 50,000 IPs Compromised in Kubernetes Clusters
Eyes Wide Open: Visibility in Digital Risk Protection
Federal Agencies Struggling With Supply Chain Security
Why Clinical Lab HIPAA Settlement Is Significant
Avoiding 'Alert Fatigue'
Belgium Investigating Attack on Interior Ministry Network
Suspected Iranian Group Wages Wiper Attacks on Israel
Health Data Breach Tally's 2021 Surge Continues
DHS Unveils New Cybersecurity Requirements for Pipelines
FBI to Share Compromised Passwords With Have I Been Pwned
SolarWinds Attackers Return With Fresh Phishing Campaign
ISMG Editors’ Panel: Cyber Insurance; Ransomware Update
FBI: Attackers Continue to Exploit Unpatched Fortinet Flaws
Pulse Connect Secure VPNs Still Under Attack
Identity: The Present and Future
Biden Budget Seeks to Invest Billions in US Cybersecurity
New Ransomware Variant Targets US Hospitality Sector
How Security Automation is Strengthening Defenses
$7 Million Digital Advertising Scam: Russian Man Convicted
Meat Processing Grinds to Halt After 'Cybersecurity Attack'
Reimagining Digital Forensics
Data Breach Culprits: Phishing and Ransomware Dominate
Siemens Patches Critical Security Flaw in Certain Products
Sweden Shut Down Infectious Disease Database After Intrusions
What's in Biden's Proposed FY 2022 HHS Budget?
Are Ransomware Attacks Impeding Criminal Prosecutions?
DOJ Seizes 2 Domains Linked to USAID Phishing Campaign
White House Puts Russia on Notice Over JBS Ransomware Hit
Uninstall Now: Critical WordPress Plug-In Flaw Exploited
Researchers Describe Antivirus Flaws
Health Data for Millions Deleted From Cloud Bucket
FireEye to Separate from Mandiant Solutions
Using Behavior Metrics to Detect Authorized Payment Fraud
FBI Attributes JBS Attack to REvil Ransomware Operation
Network Intrusion, Suspected Ransomware Attack at Fujifilm
Supreme Court Votes to Limit Computer Fraud and Abuse Act
Ransomware Industry Sees Three New Entrants
Scripps Health Attackers Stole PHI of 147,000 Patients
Amazon Sidewalk Raises Privacy and Security Concerns
White House Urges Cybersecurity Boost: Business Reaction
White House Urges Businesses: Improve Ransomware Defenses
ISMG's Editors' Panel: US Election Security Lessons Learned
Profiles in Leadership: Mario Demarillas
Profiles in Leadership: Nicki Doble
Where's the Beef? Ransomware Hit Highlights Cyber Problems
HHS OCR Issues 19th 'Right of Access' Settlement
Google Finds New Exploit That Alters Chip Memory
Is STG Building a New Cybersecurity Powerhouse?
MSPs: Tools, Transformation and Consolidation
Cox Media Group Affiliates Go Offline
Customer Identity and Access Management - at Scale
UK Cyber Security Council to Tackle Education, Standards
Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'
Cobalt Gang Members Sentenced by Kazakhstan District Court
US Prosecutors Charge Latvian Woman in Trickbot Gang Case
Siloscape Malware Reportedly Targeting Windows Containers
Identity Theft: Impact on Victims Is Getting Worse
Hospital Pays Ransom in Exchange for Promised Data Destruction
$2.3 Million of Colonial Pipeline Ransom Payment Recovered
Verizon Breach Report: Ransomware, Phishing and Top Trends
Encrypted Communications Network 'Anom' Was Sting Operation
Profiles in Leadership: Stephenie Southard
Widespread Internet Outages: Fastly Reports Problem Fixed
Profiles in Leadership: Mex Martinot
CISA Expanding Mandatory Vulnerability Disclosure Program
Surge of Attacks on VMware Hosts, Threat Intel Firm Says
APT Group Kimsuky Has New Attack Technique, Researchers Say
Proposed Settlement in Nebraska Medicine Data Breach Lawsuit
Colonial CEO at Senate Hearing Details Ransomware Attack
Private Equity Firms Acquire ExtraHop in $900 Million Deal
Joomla Content System Vulnerable to Multiple Flaws
Chinese APT Group Reportedly Develops Custom Backdoor
Biden Rescinds Executive Orders Banning TikTok, WeChat
Not So Fastly: Global Outage Highlights Cloud Challenges
Microsoft Patches 6 Vulnerabilities Currently Under Attack
Analysis: How Biden Executive Order Mirrors FDA's Cyber Plans
House Probes Specifics of Colonial Ransomware Attack
RSA Spins Off Fraud and Risk Business
Upgrade Your Native Microsoft 365 Email Protection
TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud
Biden's Nominees Face Questions Over Cybersecurity Concerns
Groups Urge Biden, Congress to Bolster Health Sector Cyber
Fake Lazarus DDoS Gang Launches New 'Attacks'
ISMG Editors' Panel: The FBI's Global Cryptophone Sting
DOJ Shut Down Slilpp Marketplace for Stolen Credentials
How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?
House Oversight Committee Probing JBS Ransomware Payment
Security Firm COO Charged in Attack on Medical Center
Will Ransomware Attacks Push Congress to Enact Regs?
Fujifilm Reportedly Refused to Pay Ransom
Union Benefits Administrator Says Data Deleted in Hack
Volkswagen, Audi Notify 3.3 Million of Data Breach
The Best of Virtual RSA Conference 2021
NATO Endorses Cybersecurity Defense Policy
CISA: Defibrillator Dashboard Security Flaws Pose Risk
Emergence of Hybrid Cloud Security
How 'SEO Poisoning' Is Used to Deploy Malware
Ukraine Arrests 6 Clop Ransomware Operation Suspects
Forcepoint, Deloitte and Cerberus Sentinel Make Acquisitions
Behind the Scenes of a Business Email Compromise Attack
DHS Preparing More Cybersecurity Requirements for Pipelines
Researcher: 1 Billion CVS Health Website Records Exposed
Biden Promises Retaliation Unless Putin Stops Cyberattacks
Cyberium Domain Targets Tenda Routers in Botnet Campaign
India Moves Toward Limiting What Telecom Tech Can Be Used
Standardizing Patient Addresses: Privacy, Security Issues
Analysis: The Cyber Impact of Biden/Putin Summit Meeting
The Challenge of Securing Healthcare IoT Devices
Using Automation to Update a SOC
ISMG Editors’ Panel: NATO's Cybersecurity Policy and More
Senate Approves Chris Inglis as National Cyber Director
Russian Convicted of Aiding Kelihos Botnet Operator
Ransomware Operations 'Based on a Culture of Mistrust'
Ransomware: Strategies for Faster Detection and Response
Why Criminals Love Ransomware: In Their Own Words
Peak DDoS Traffic Up 100%, Researchers Report
NSA Offers Tips on Securing Unified Communication Channels
Security Meets 'Work from Anywhere'
Senators Draft a Federal Breach Notification Bill
SASE Comes of Age for Governments, Schools
Fake DarkSide Ransomware Gang Targets Energy, Food Sectors
First American Financial's SEC Breach Settlement: $488,000
On Demand Webinar | AI Playbook for Financial Leaders: Top 5 Insights in 15 Minutes
On Demand Webinar | Contact Center Authentication: A Mystery Shopper's Journey
Ransomware Attack Compromises Fertility Patients' Records
Lawmakers Unveil Cybersecurity Legislation
CISA: Firewall Rules Could Have Blunted SolarWinds Malware
The Changing Nature of the Insider Threat
Business Benefits of a SASE Approach
CISA Shifting Einstein Detection System Deeper Into Networks
US Seizes Domains of Websites Linked to Iran, Iraq
Australia Considers Mandating Ransom Payment Reporting
EU Proposes Joint Cybersecurity Unit
Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity
Medicaid Contractor Data Breach Affected 334,000 Providers
John McAfee Found Dead in Spanish Prison Cell
Irish Ransomware Attack Recovery Cost Estimate: $600 Million
Repurposed REvil Ransomware Used in Attacks
Ransomware Attack on Eye Clinic Chain Affects 500,000
FBI Seeks Extra Funds to Fight Ransomware, Other Threats
Tulsa: Ransomware Attackers Leaked 18,000 Files
Binance Says It Helped With Clop Money Laundering Bust
Profiles in Leadership: Selim Aissi
ISMG Editors’ Panel: Examining Open-Source Software Security
High-Ranking FIN7 Gang Member Receives 7-Year Prison Term
US Secret Service Releases 'Most Wanted' Cyber Fugitive List
Sizing Up the Security Features Slated for Windows 11
Researchers Identify New Malware Loader Variant
Group Behind SolarWinds Attack Targeted Microsoft Customers
4 Dell Bugs Could Affect 30 Million Users
NIST Releases 'Critical Software' Definition for US Agencies
Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack
Mercedes-Benz USA Says 1.6 Million Records Exposed
IoT: The New Industrial Revolution
Hackers Disguise Rootkit as Microsoft Drivers
Report Urges NASA to Improve Cybersecurity Risk Management
Attackers Increasingly Using Cobalt Strike
Senate Bill Addresses Federal Cyber Workforce Shortage
Microsoft Edge Vulnerabilities Let Hackers Steal Data
GAO: HHS Needs to Improve Cybersecurity Info-Sharing Efforts
Enhancing Email Security for Microsoft 365
Zyxel Warns of Attacks on Its Firewall, VPN Products
HHS OIG: Medicare Should Require Hospital Device Security
White House Will Release Details on Exchange Attacks
Capital One Breach Suspect Faces New Criminal Charges
Multinational Police Raid Seizes DoubleVPN Servers
ISMG Editors’ Panel: FBI Assessment of Cybersecurity Trends
700 Million 'Scraped' LinkedIn User Records Offered for Sale
REvil Target: University Medical Center of Southern Nevada
CISA Tool Helps Measure Readiness to Thwart Ransomware
US Tracking Brute-Force Attacks Linked to Russia
Google Investigates Ad Injected Into 2FA SMS Messages
REvil's Ransomware Success Formula: Constant Innovation
Hades Ransomware Has Targeted 7 Large Companies
The Executive Perspective Series featuring the White House Executive Order and More
Congress Considers Measures to Improve Telecom Security
CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices
Senate Bill Proposes Cyber Training for Federal Employees
Digital Fraud: Trends and Mitigations
Fraud and the Rise of Brand Abuse
Profiles in Leadership: Alex Cunningham
Biden Orders Investigation of Kaseya Ransomware Attack
Kaseya Was Working on Patches Before Ransomware Attack
Kaseya Attack: REvil Offers $70 Million 'Universal Decryptor'
Update: Microsoft Issues 'PrintNightmare' Security Update
Kaseya: Up to 1,500 Organizations Hit in Ransomware Attack
Kaseya Sees Service Restoration Delay After Ransomware Hit
Kroger, British Airways Agree to Settle Data Breach Lawsuits
Kaseya Ransomware Attack: 'It Could Have Been Much Worse'
Kaseya Ransomware Attack: 'This Is a Dramatic Escalation'
Republican National Committee Says Systems Weren't Breached
Gartner Offers Insights on Migrating to SASE
Zero Trust: Two Models for Implementation
Healthcare Workers Allege Amazon Alexa Violates Privacy
FIDO Alliance Update: New Guidelines, Standards Enhancements
Kaseya Raced to Patch Before Ransomware Disaster