Html Sitemap

Kaseya Announces New Service Restoration Date
Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete
Delayed Data Breach Detection: Facing the Consequences
List of Victims of Kaseya Ransomware Attack Grows
NetOps and DevOps - Bridging the Gap
ISMG Editors’ Panel: Analysis of Kaseya Attack
Government Cybersecurity Summit: A Preview
Malspam Campaign Targets Kaseya Victims
Biden's New Executive Order Looks to Address Data Privacy
CNA Discloses Breach Related to March Ransomware Attack
Interpol Calls for New Ransomware Mitigation Strategy
Add Morgan Stanley to List of Accellion FTA Hack Victims
Kaseya Says Software Fully Patched After Ransomware Attack
Ransomware Landscape: REvil Is One of Many Operators
Microsoft to Acquire RiskIQ
Prosecutors: Insider Trading Tips Sold on Darknet Sites
Defendant in Stolen EHR Data Case Sentenced
US Senate Approves Jen Easterly as CISA Director
SolarWinds Issues Patches in Wake of Zero-Day Attacks
Guess Confirms Ransomware Attack and Data Breach
2 State Cybersecurity, Data Privacy Laws Enacted
REvil's Infrastructure Goes Offline
Supply Chain Ransomware Breach Affects 1.2 Million
Microsoft Releases Patches for 4 Exploited Zero-Day Flaws
Is China's 'Cyber Capacity' Really 10 Years Behind the US?
Constant Ransomware Business Refinements Boosting Profits
Using XDR to Detect Ransomware, Supply Chain Attacks
CISA Emergency Directive: Patch 'PrintNightmare' Flaw
Dermatology Clinic Chain Breach Affects 2.4 Million
FCC Finalizes Plan to Rip and Replace Chinese Telecom Gear
A 'First Responder' Approach to Cybersecurity
SonicWall Urges Patching of Devices to Ward Off Ransomware
NortonLifeLock in Talks to Buy Antivirus Rival Avast
US Offering $10 Million Reward for Cyberthreat Information
Why It's Time to Reassess IAM in Healthcare
Facebook Disrupts Iranian APT Campaign
Realities And Risks of Moving Enterprise Applications to Cloud
ISMG Editors’ Panel: Challenges for New CISA Leader
How Mespinoza Ransomware Group Hits Targets
Israeli Firm Candiru's Spyware Used to Target Dissidents
Google to Patch 8 Chrome Flaws, Including a Zero-Day
What's Next Step for REvil Ransomware Victims?
DOD and DHS Need More Collaboration on Cybersecurity Issues
US Blacklists 6 Russian Organizations Over Security Concerns
Spyware Exposé Highlights Suspected Apple Zero-Day Flaws
Leak of 50,000 Contact Details Tied to Spyware Targeting
US: Chinese Government Waged Microsoft Exchange Attacks
US Indicts 4 Chinese Nationals for Lengthy Hacking Campaign
Health Data Breach Trends: A Mid-Year Report
Advisory Describes Chinese Attackers' Tactics
China's Cyberattacks: Sizing Up International Response
Data Analytics: 3 Critical Questions
Leak of Alleged Pegasus Target List Restokes Spyware Debate
Case Study: A REvil Ransom Negotiation
Law Firm Serving Fortune 500 Firms Hit by Ransomware
Can the US Curb China's Cyber Ambitions?
TSA Issues Cybersecurity Requirements for Pipelines
State of Incident Response 2021
Elekta Health Data Breach Victim Count Grows
Spyware Zero-Day Hits Show Apple Ecosystem's Imperfections
Microsoft Disrupts Business Email Compromise Domains
Incident Response: Why Persistence Is Vital
Cybereason, Rapid7 and Microsoft Announce Acquisitions
NIST Publishes 'Critical Software' Security Guidance
UPMC to Settle Breach Lawsuit for $2.7 Million
Senators Introduce Federal Breach Notification Bill
Third Arrest in Connection With 2020 Twitter Hack
Automation to Scale Security in the Cloud
Patch Roundup: Windows, Linux, Oracle, Juniper
Experts Testify on Cyberthreats to Water Treatment Plants
Hospital Worker Charged in COVID Relief Fraud Case
Kaseya Obtains Decryption Tool After REvil Ransomware Hit
Saudi Aramco Traces Data Leak to Attack on Supplier
ISMG Editors’ Panel: Examining the Pegasus Project
US Customs Apps Put Travelers' PII at Risk
Congress Focuses on Industrial Control System Security
Resiliency Is Key to Surviving a CDN Outage
HHS Seeking Input on Improving Security Risk Analysis Tool
IoT Security Dangers Loom as Office Workers Return
Australia Says Uber 'Interfered' With Users' Privacy
Attackers Rely on 'Exotic' Languages for Malware Creation
Lawsuits Against CaptureRx Pile Up and So Do Victim Counts
Kaseya Says It Paid No Ransom to Obtain Universal Decryptor
18 Companies to Participate in NIST 'Zero Trust' Project
What We Can Learn From Hackers
AvosLocker Ransomware Gang Recruiting Affiliates, Partners
M&A Update: Deloitte and Sophos Make Acquisitions
Pegasus Spyware: World Leaders Demand Israeli Probe
Student Health Plan Vendor Breach Raises Regulatory Issues
Congress Urged to Update Federal Laws to Combat Ransomware
Experts Testify on Pipeline Cybersecurity Measures
BlackMatter Ransomware Claims to Be Best of REvil, DarkSide
Tips on Recruiting, Retaining Cybersecurity Staff
Biden Calls for Critical Infrastructure Security Standards
Kaseya's Unitrends Technology Has Zero-Day Flaws
Profiles in Leadership: Rick Doten of Centene Corp.
UC San Diego: Phishing Leads to Account Access for Months
Measuring Success of 'No More Ransom' Project
Israeli Government Visits NSO Group Amid Spyware Claims
9 Ransomware Enablers - And Tactics for Combating Them
What Can Be Done to Enhance Electrical Grid Security?
Insurer: Size of Claims Paid for Ransomware Attacks Declines
Second Defendant Sentenced in EHR-Related Fraud Case
Senate Bill Proposes Further Restrictions on Huawei, ZTE
Wiper Malware Used in Attack Against Iran's Train System
ISMG Editors’ Panel: Ransomware Update
Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
Patching Woes: Most Frequently Exploited CVEs Listed
Researchers Find More Servers Tied to Russian-Linked Attacks
Phishing Attack: Clinic Says 450,000 May Have Been Affected
Amazon Hit With $885 Million GDPR Fine
Congress Hears Ideas for Boosting Cybersecurity Workforce
NIST Works to Create AI Risk Management Framework
SolarWinds Attackers Accessed US Attorneys' Office Emails
Ransomware Attackers Eying 'Pure Data Leakage Model'
FatalRAT Exploits Telegram to Deliver Malicious Links
NSA Reminder: Beware of Public Wi-Fi
Zoom Agrees to Settle Security Lawsuit for $85 Million
Vendor-Related PHI Breach Reports Keep Rolling In
Ransomware Actors Set Up a Call Center to Lure Victims
Words With Friends Breach: Zynga's Case Set for Arbitration
Global Incident Response: The Rise of Integrity Attacks
COVID 19: What Delta Variant Means to Business Recovery
Chinese APT Groups Targeted Asian Telecoms
Report: 7 Federal Agencies Still Lack Basic Cybersecurity
NSA, CISA Release Guidance on Kubernetes Security
Microsoft Database Engine Vulnerabilities Patched
PayPal to Hire Dozens of Cryptocurrency Security Experts
UF Health Central Florida: Cyberattack Leads to PHI Breach
Anne Neuberger on Why No Sanctions Issued Against China Yet
How to Keep Developer Secrets, Secret
Cybersecurity M&A Update: Five Firms Make Moves
Researchers Disclose 14 Flaws in NicheStack
Chinese Cyberthreats: The Impact on National Security
2 Healthcare Systems Recovering From Cyberattacks
CISA's Easterly Unveils Joint Cyber Defense Collaborative
Apple's Image Abuse Scanning Worries Privacy Experts
Cybersecurity Leadership: Risk in OT and IIoT
Is Darknet Forum Ransomware Chatter Ban Having an Impact?
ISMG Editors’ Panel: Government Cybersecurity Challenges
A Team Approach to Supply Chain Security Risk Management
Healthcare Cybersecurity: Plenty of Work to Do
Countering Cyberthreats: 2 Legislative Proposals Introduced
Hackers Target Critical Infrastructure in Southeast Asia
Leveraging Password Managers to Counter Breaches
Flaws in John Deere Systems Show Agriculture's Cyber Risk
FTC Warns: SMS Phishing Scam Impersonates State Agencies
BlackMatter Group Debuts Linux-Targeting Ransomware
Essential Steps for Battling Ransomware Attacks
10 Initial Access Broker Trends: Cybercrime Service Evolves
Risk Assessments for Mobile Devices
NIST Guidance Focuses on Creating 'Cyber Resiliency'
Conti Group Takes Advantage of Vulnerable Exchange Servers
H-ISAC: Attackers Leveraging RTLO Unicode
Senate Passes Infrastructure Bill Boosting Cyber Funding
Poly Network Says $600 Million in Cryptocurrency Stolen
Microsoft Patches 3 Zero-Day Vulnerabilities
REvil Decryption Key Posted on Cybercrime Forum
A CISO Offers Tips on IT Resiliency
Synology NAS Devices Targeted by StealthWorker Botnet
What Can Be Done to Overcome Cybersecurity Staff Shortage?
NortonLifeLock to Buy Avast for Over $8 Billion
OMB Spells Out Agencies' Cybersecurity Timelines
Accenture Hit by Apparent Ransomware Attack
Addressing IoT, OT Security Risks in Healthcare
Zero Trust and the Critical Role of Strong Authentication
Back to the Future: Notorious AlphaBay Market Reboots
Why Did a Clinic Notify All Patients, Employees of Attack?
Case Study: Carrying Out a HIPAA Corrective Action Plan
Cyberspace Solarium Commission Offers Progress Assessment
Lawmakers Want Federal Cybersecurity Leaders' Roles Clarified
ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response
Assessing AI Security Solutions: Questions to Ask
Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
Healthcare Security Risk Management: How Bad Is It?
Scripps Health Reports Financial Toll of Ransomware Attack
Poly Network Hacker Reportedly Returns Most of Stolen Funds
Cybercriminals Reportedly Created Blockchain Analytics Tool
Microsoft Details Yearlong Office 365 Phishing Campaign
T-Mobile USA Investigates Possible Data Breach
Information Blocking Rule: Understanding the Exceptions
Profiles in Leadership: Rob Hornbuckle, CISO, Allegiant
FFIEC Updates Authentication Guidance
Colonial Pipeline: Attack Exposed Personal Data
Memorial Health System in Ohio Latest to Be Hit With Attack
T-Mobile Probes Attack, Confirms Systems Were Breached
Respect in Security: A Pledge to Eliminate Harassment
Researchers Describe New DoS Attack Method
Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?
New Mexico Health Breach Affects Over 637,000
FireEye, CISA Warn of Critical IoT Device Vulnerability
T-Mobile: Attackers Stole 8.6 Million Customers' Details
The Extended Enterprise Under Threat
Massachusetts Man Pleads Guilty in SIM Swapping Case
Ransomware Hits Brazilian National Treasury
Alleged HVAC Hack Shines Spotlight on OT Risks to Healthcare
Retaining Security Workers: What Works?
Financial Services and the Zero Trust Journey
US Census Bureau Criticized for Handling of Breach
Health Data Breach Tally Update: Ransomware Persists
Nigerian Gang Asks for Insider Help to Plant Ransomware
Hacker Steals $97 Million From Crypto Exchange 'Liquid'
Ohio Man Admits to Operating Illegal Bitcoin 'Mixer' Service
Ransomware: LockBit 2.0 Borrows Ryuk and Egregor's Tricks
Profiles in Leadership: Darrell Bateman of City Bank Texas
ISMG Editors’ Panel: Fraud Trends
World Bank Launches Global Cybersecurity Fund
National Cyber Director Chris Inglis Focusing on Resiliency
Record-Setting DDoS Attack Hits Financial Service Firm
US State Department Reportedly Sustained Cyber Incident
Healthcare Organizations Mopping Up After Cyberattacks
US, Singapore Sign Cybersecurity Agreements
CISA: Patching ProxyShell Flaws in Exchange Servers Is Urgent
A CISO Describes Why 'Identity' Is Central Aspect of Security
Mozi Botnet Targeting Netgear, Huawei, ZTE Gateways
Misconfigured Microsoft Power Apps Spill Sensitive Data
Fighting Unemployment Benefits Fraud: Key Steps
Exposing Software Supply Chain Risks
Tardy Breach Notification Raises Eyebrows
Audit: USAID Needs to Enhance Data Protections
Google Removes Fake Cryptomining Apps
Identity and the New Role of Privilege
Profiles in Leadership: Nandhini Duraisamy
White House Tech Meeting: Focus on Critical Infrastructure
Researchers Demonstrate AI Can Be Fooled
Updated PRISM Backdoor Discovered
Threat Modeling: Making the Right Moves
Profile in Leadership: Laura-Lea Berna, BC Transit
Citizen Lab: Bahrain Used Pegasus to Spy on Activists
White House Unveils Supply Chain, New Security Initiatives
Board Members: Mitigating Their Security Risks
FortiGuard Labs: A 10-Fold Increase in Ransomware
Financial Execs Say Security a Top Cryptocurrency Barrier
The Evolution - and Revolution - of Access
Fin8 Using an Updated Backdoor
Modernization of Security Operations
7 Emerging Ransomware Groups Practicing Double Extortion
After Ransomware Attack, When Must Patients Be Notified?
Microsoft Issues Security Advisory on ProxyShell Flaws
Data Breach Culprits: Phishing and Ransomware Dominate
ISMG Editors’ Panel: Crypto Exchange Hacks
Azure Database Service Flaw Could Affect Thousands of Firms
US Agencies Increasing Use of Facial Recognition Tech
T-Mobile CEO Apologizes for Mega-Breach, Offers Update
FBI Issues Alert on Hive Ransomware
The New Cybercrime Landscape in Canada
Phishing Attack Used Spoofed COVID-19 Vaccination Forms
Senator Seeks Input on Securing Crypto, Blockchain
Microsoft: Beware Phishing Attacks with Open Redirect Links
Cybersecurity Investment: Trends and Misconceptions
Healthcare, Isolation and Embracing Zero Trust
IG: DoD Did Not Properly Secure Access to VIP Records
Cloud Migration and Secure Identities
SEC to Monitor Illicit Activity on DeFi Platforms
Scammers Impersonate OpenSea Customer Support
Profiles in Leadership: Conrad Bell, VP & CISO, C Spire
Uncovering the Dark Web: A Solution For Conducting Effective External Threat Protection
IronNet Goes Public by Merging With LGL Systems
Federal Departments Ordered to Improve Logging Capabilities
Crisis Management: Responding to a Disaster
OnDemand | Overcome IT/OT Convergence Challenges with Managed Services
OnDemand | What Every Water Utility Needs to Know About Cybersecurity
Open XDR-as-a-Service: A Fresh Look at Detection and Response
'ProxyToken' Bug Put Microsoft Exchange Email at Risk
CISA Warns of Holiday Ransomware Attacks
Attackers Keep Refining Business Email Compromise Schemes
Medical Group: 655,000 Affected by 'Network Outage' Breach
Bitcoin ATM Firms Seek to Shape Regulations
House Debates Breach Notification Measure
Vendors Issue Security Advisories for OpenSSL Flaws
ISMG Editors’ Panel: New and Rebranded Ransomware Groups
125,000 Coinbase Users Get False Security Alerts
LockFile Ransomware Using New Techniques to Evade Detection
CISA Offers Update on Philips Patient Monitoring Flaws
FTC Bans SpyFone Company, CEO From Surveillance Business
Facebook's WhatsApp Hit With $266 Million GDPR Fine
White House Warns Of Cyberthreats Over Labor Day Weekend
Could Lessons From Plane Hijackings Help Fight Ransomware?
Conti Ransomware Threat Rising as Group Gains Affiliates
Preventing Identity Fraud: The Road Ahead For Financial Services
OnDemand | Postmortem of a Ransomware Attack
Autodesk Says Company Was Targeted by SolarWinds Attackers
Lawsuit Alleges Security Failures at Clinic
Attackers Are Selling Their Victims’ Internet Bandwidth
Moxa Devices Prone to Vulnerabilities Affecting Railways
Atlassian Vulnerability Being Exploited in the Wild
Cisco Patches Critical Authentication Bypass Bug
Aussie Researcher Fakes Digital COVID-19 Vaccination Proof
The Difference Between Espionage and Financial Breaches
Profiles in Leadership: Bobbet Castillo, Petnet
ISACA 2021 Report: Top Trends, Improving Cyber Maturity
Alleged Trickbot Developer Arrested in South Korea
Netgear Fixes Critical Flaws Affecting Smart Switches
20 Years Later: A Cyber 9/11 Is Unlikely
2 Data Leaks Reported in Indonesia's COVID-19 Tracking Apps
Orchestration and Automation: The New 'Must-Haves'
Zero-Day Attacks Exploit MSHTML Flaw in Microsoft Windows
Modernizing IAM: 'Same Problem, New World'
Resilience CEO on White House Meeting, Cyber Insurance
8,000+ Confluence Servers Still Vulnerable to Atlassian Flaw
Lawsuit: Fertility App Maker Sent Data to Google, Facebook
White House Pushing Federal Agencies Toward 'Zero Trust'
Pro-China Operatives Push Protests, Pandemic Conspiracies
Case Study: Team Approach for Medical Device Cybersecurity
Groove Promises Maximum Profits for Ransomware Affiliates
20 Years After 9/11: How US Cybersecurity Landscape Evolved
National Cyber Director Sees Ransomware As Continuing Threat
Bitcoin Scam Run by Fake Exchange, Report Says
China-Linked Grayfly Gang Spotted Using Sidewalk Backdoor
United Nations Says Attackers Breached Its Systems
The Cost of Cloud Compromise and Shadow IT
Microsoft Alert: Serious Flaw in Azure Container Instances
ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs
Transforming an Organization's Security Culture
Reducing the Complexity of Ransomware
Ukrainian Extradited to US Faces Credential Theft Charges
SolarWinds Attack Spurring Additional Federal Investigations
HHS on Information Blocking Rule Enforcement: Stay Tuned
Department of Commerce Establishes AI Advisory Committee
Pysa Ransomware Gang Targets Linux
The 'Basics We Need to Get Right'
Olympus: 'Potential Cyber Incident' Disrupted EMEA System
House Bill Seeks to Insulate CISA Director From Politics
BitSight, Mastercard and Tenable Make Acquisitions
HHS Warns Health Sector of BlackMatter Attacks
New York Vaccine Passport App Stored Forged Credentials
Apple Patched iMessage. But Can It Be Made Safer Overall?
Profiles in Leadership: Tim Nedyalkov, Commonwealth Bank
Top Initial Attack Vectors: Passwords, Bugs, Trickery
Massachusetts Attorney General Probing T-Mobile Breach
Clinic: EHR Data Too Damaged to Recover Post-Attack
Researchers: 61M Health IoT Device User Records Exposed
OnDemand | Cyber Threats Facing Oil, Gas & Chemical Businesses
Microsoft Patches MSHTML Vulnerability
Travis CI Flaw Exposed Secrets From Public Repositories
Profiles in Leadership: Tammy Klotz, CISO, Covanta
Russia Has Taken No Action to Combat Ransomware, FBI Says
Microsoft Fully Ditches the Password
Lawsuit: Health System Failed to Heed Ransomware Warnings
House Committees Seek to Spend Millions on Cybersecurity
WHEO Foundational Concept: Threat Intelligence Sharing to Drive Predictive Security
Profiles in Leadership: Amit Basu, International Seaways
How to Secure the Code Pipeline
Super Charge Splunk With Observability Cloud
Republican Governors Association Targeted in Exchange Attacks
FTC: Health App, Device Makers Must Report Breaches
Is Grief's Threat to Wipe Decryption Key Believable?
Effective Security Programs: Keeping Pace With Threats
OnDemand Webinar | It's Time to Rethink Your AppSec Approach
Good News: REvil Ransomware Victims Get Free Decryptor
Importance of Medical Ethics in Cybersecurity
US Warns Nation-State Groups May Exploit Flaw in Zoho Tool
HHS OCR's Latest HIPAA Enforcement Action
Mirai Botnet Actively Exploiting OMIGOD Flaw
US to Unveil Sanctions on Use of Cryptocurrency for Ransoms
ISMG Editors’ Panel: Cyber Insurers and Ransomware Response
Web Hoster Epik's Breach Exposes 15 Million Email Addresses
Mēris: How to Stop the Most Powerful Botnet on Record
Post-Attack, Health Agency Notifying 'All Alaskans'
Chinese APT Data-Harvesting Campaign Analyzed
Ransomware Reportedly Hits Iowa Farm Services Cooperative
FBI Director Questioned Over Kaseya Decryption Key
How to Keep Cybercrime's Foot off the Pedal with the Auto Industry and ISO/SAE 21434
Hacking Incidents Lead to 2 Big Eye Care Provider Breaches
BlackMatter Knocks Marketron Off the Air
US Treasury Blacklists Russia-Based Crypto Exchange
Russian-Linked Group Using Secondary Backdoor Against Targets
Microsoft Analyzes Phishing-as-a-Service Operation
Russians Prevent Mēris Botnet From Hijacking 45,000 Devices
US DHS, FBI Face Ransomware Questions from Congress
Conti Ransomware Attacks Surging, US Government Warns
Establishing Cybersecurity in the Era of Resilience
Work from Everywhere, Securely
Business Resilience Through ‘Zero Trust’
Fed Chair Says Central Bank Evaluating Digital Currency
Senators Debate Cyber Rules for US Critical Infrastructure
Ransomware: A Problem of Excesses
Lawmakers Share Huawei Concerns with US State Department
The Changing Face of Ransomware
ISMG Editors’ Panel: The Rise of Quadruple Extortion Attacks
Attack Surface Management: The Problem With Cloud
CISA Director: Attackers Targeted Port of Houston
Profiles in Leadership: Hadas Cassorla of M1 Finance
Lawsuits: Negligence Led to UC San Diego Health Incident
Automation for the Modern SOC: Strategies for Smarter Security Operations
Automation for the Modern SOC: Automating Phishing Response and Threat Intel Enrichment with Splunk SOAR and TruSTAR
Automation for the Modern SOC: Protecting your Cloud Accounts in GCP, Azure, and AWS with Automation
Automation for the Modern SOC: Automating Vulnerability Management at Splunk
Critical Flaw May Affect Millions of Hikvision Devices
US Commerce Officials Seek Comment on IaaS Executive Order
Former DHS Official to Lead HHS' HIPAA Enforcement Agency
Crypto Exchange Bug Reveals North Korean Monero Laundering
Russia-Linked Nobelium Deploying New 'FoggyWeb' Malware
Ransomware, Vendor Breaches Spike on Federal Tally
Experts Slam Social Media Platforms' Data Policies
Bipartisan US Senate Bill Eyes Cryptomining Oversight
NSA, CISA Release VPN Security Guidance
Continuous Delivery Meets Continuous Security
Mental Health Clinic Notifies Patients 6 Months After Hack
Profiles in Leadership: Peter Gregory, GCI Communications
Top Russian Cybersecurity CEO Charged with Treason
VMware Discloses and Releases Fixes for 19 Bugs in Products
Microsoft Will Mitigate Brute-Force Bug in Azure AD
Apple Pay-Visa Vulnerability May Enable Payment Fraud
Securing Digital Transformation for Legacy Systems
New Legislation Eyes Both Ransom, Incident Reporting
2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise
Anonymous Leaks Epik Data - Again
California Extends Telehealth Privacy, Security Waivers
CISA Launches Insider Threat Self-Assessment Tool
Neiman Marcus Says 4.6 Million Affected by Data Breach
Fraud Transformation: Balancing Business and Customer Needs
ISMG Editors’ Panel: Protecting Active Directory from Ransomware Attacks
Lawsuit: Hospital's Ransomware Attack Led to Baby's Death
US Agencies Awarded $311 Million in Cybersecurity, IT Funds
President Biden Touts Cybersecurity Efforts
Ukraine Busts 2 Suspects Tied to Major Ransomware Group
Profiles in Leadership: Peter Van Lierde, CISO, Sibelga
Facebook, Instagram, WhatsApp Suffer Widespread Outage
Cyberattacks Disable IT Networks at 2 Indiana Hospitals
On Demand | Supercharging the IVR to Win Customers for Small to Medium-Sized Banks
How Ransomware Attackers Hit Virtual Machine Hypervisors
FDA: How to Inform Patients About Medical Device Cyber Flaws
Top US Cyber Officials Say Ransomware Is Here to Stay
Medtronic Insulin Pump Devices Recalled Due to Serious Risks
Text Messaging Routing Firm Syniverse Reveals 5-Year Breach
Understanding the Real Threat of Ransomware
Apache Fixes Zero-Day Flaw Exploited in the Wild
Video Game Streamer 'Twitch' Confirms Massive Data Breach
Patient Safety Concerns Grow Over Medical Gear Security
LANtenna Attacks Exploit Air-Gapped Networks Via Ethernet
New Bill Would Require Ransom Disclosure Within 48 Hours
Profiles in Leadership: John O'Driscoll, State of Victoria
Breach of Syniverse Reveals Yet Another Supply Chain Attack
The Anatomy of the Codecov Breach: A CyberArk Labs Webinar
HHS Warns Healthcare Sector About LockBit 2.0 Threats
US DOJ to Fine Contractors for Failure to Report Incidents
Silicon Valley VC Firm Leaked 'Deal Flow' Data
Apache Issues Another Emergency Patch for Exploited Flaws
ISMG Editors’ Panel: First Fatality Linked to Ransomware?
Analyzing the Results of the 2021 Cybersecurity Complexity Study, EU & UK
Data Breach Reports Rise as Supply Chain Attacks Surge
Ransomware Exposed: Key Learnings from Examining 3.5 Million Samples
Efforts to Incentivize Healthcare Sector Cyber Investments
Nobelium Makes Russia Leader in Cyberattacks
Implementing an Identity Security Program
How to Mitigate Socially Engineered Attacks
Google Says Russian APT Targeting Journalists, Politicians
Profiles in Leadership: Mustapha Kebbeh, CISO, Brinks
Profiles in Leadership: Dr. Frances Undelikwo, Fidelity Bank
Trend Micro: Linux Malware Targets Huawei Cloud
Democratic Lawmakers Urge Agencies to Act on Ransomware
FIN12 Ransomware Attacks Aggressively Targeting Healthcare
Ransomware: No Decline in Victims Posted to Data Leak Sites
OnDemand Webinar | For Retail : Preventing Application Fraud while Removing User Friction
OnDemand Webinar | Fraud ROI for Ecommerce: Drive More Revenue with Fewer False Positives
CISA to Access Agencies' Endpoints, Help Enhance Security
Former Executive Accessed PHI of Nearly 38,000 Individuals
Microsoft Says It Mitigated Largest-Ever DDoS Attack
Dutch Cyber Cops Tell Stresser/Booter Customers: Cut It Out
Fertility Testing Lab Says Ransomware Breach Affects 350,000
US Convenes Global Ransomware Summit Without Russia
Australia Plans Ransomware Attack Reporting Requirement
Flaws In GitHub Actions Bypass Code Review Mechanism
MITRE Launches Centers to Protect Infrastructure and Health
Osteopathic Professional Group Reports Year-Old Breach
House Lawmakers Announce Bill Targeting Tech Algorithms
Missouri Refers Coordinated Bug Disclosure to Prosecutors
BlackByte: Free Decryptor Released for Ransomware Strain
ISMG Editors' Panel: Are Our Systems Too Complex to Secure?
Ransomware Attack on Israeli Medical Center Raises Alarm
US Agencies to Water Facilities: You May Be Next Target
5 Reasons to Ditch Passwords & Make Your Employees (and IT) Happier
Analyzing the 2021 Faces of Fraud Survey
Treasury Department Tells Companies to Comply With Sanctions
MirrorBlast Campaign Targets Finance Sector Using Macros
Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk
Twitter Suspends North Korean Threat Actor Accounts
Accenture: Ransomware Attack Breached Proprietary Data
Sinclair TV Stations Targeted in Weekend Ransomware Attack
Acer Taiwan and India Hit in 2nd and 3rd Attacks of 2021
Analysis: Top Ransomware Gangs Targeting Healthcare Sector
Defending Against Today’s Sophisticated Ransomware Attacks
Evaluating and Reducing Supply Chain Risk
Profiles in Leadership: Wouter Veugelen of Oil Search Ltd
Positive Security: Inspiring Behavioral Change at Workplace
Preparing for Ransomware Attacks in the Education Sector
More Attempted Cyberattacks on Israeli Healthcare Entities
New York Tells 2 Cryptocurrency Firms to Cease and Desist
Why Reporting Security Bugs Can Be Fraught With Tension
TeamTNT Deploys Malicious Docker Image on Docker Hub
CISA Leader Backs 24-Hour Timeline for Incident Reporting
Hacker in UPMC Data Theft, Fraud Case Gets Maximum Sentences
Diversity, Equity and Inclusion Challenges in Cybersecurity
4 Bulletproof Hosting Provider Admins Getting Sentenced
Ransomware: Average Ransom Payment Stays Steady at $140,000
Dental Alliance Reports Vendor Breach Affecting 170,000
US Cracks Down on Sale of Offensive Cybersecurity Tools
House Passes Bills on Both Supply Chain, Telecom Security
REvil Revelations: Law Enforcement Behind Disruptions
ISMG Editors’ Panel: Regulators Get Tough on Crypto Firms?
Forrester Report: Key Questions to Ask XDR Vendors
Malicious Packages Disguised as JavaScript Libraries Found
FIN7 Sets Up Fake Pentesting Company Site to Recruit Talent
New Bill Would Secure Government Contractors' Use of AI
DarkSide Transfers $7 Million Worth of Bitcoin
CoinMarketCap: No Breach Despite 3.1M Email Address Leak
Effective Security Defined and Refined
Groove Operators Reportedly Ask Peers to Attack US
Report: SolarWinds Hackers Targeting IT Supply Chain
MDR and the Role of Digital Forensics
Defending Against Open-Source Supply Chain Attacks
The Need for Systems Thinking in Cybersecurity
US DOJ: Global Darknet Sting Nabs 150 Suspects
REvil's Cybercrime Reputation in Tatters - Will It Reboot?
The Evolution of SD-WAN; Emergence of Wireless WAN
Voipfone DDoS Attacks Raise Specter of Protection Racket
Vendor Partner Responsible for Fullerton Health Data Breach
US State Department to Create Dedicated Cyber Office
Insider Threat: A Guide to Detecting the Enemy Within
Cybercriminals Target Newbie Bad Actors With Phishing Sites
Lazarus Adds Supply Chain Attack to List of Capabilities
Washington Secretary of State to Head Election Security
PHI 'May Have Been Removed' in Vendor's Ransomware Attack
NRA Reportedly Hit By Russia-Linked Ransomware Attack
Microsoft Launches Cybersecurity Recruitment Campaign
Keeping the US Dollar on Top as Cryptocurrency Rises
ISMG Editors' Panel: Solving the Ransomware Problem Together
N-Day Vulnerabilities: The Critical Importance of Patching
WordPress Plug-In Bugs Put 1 Million-Plus Sites At Risk
Countries Team Up to Issue Video Teleconference Guidance
Healthcare System Phishing Breach Affects 209,000
The State of the Phish: A Look at User Awareness, Vulnerability and Resilience
Federal CISO DeRusha Named Deputy National Cyber Director
Multinational Police Force Arrests 12 Suspected Hackers
Celebrities' Data Dumped on Darknet Site After Hack
Ransomware Evolves: Affiliates Set to Wield Greater Power
Trojan Source: Invisible Vulnerabilities in Most Code
Reduce Security Risk of Healthcare Legacy Systems, Devices
CISA Begins Program to Identify Critical Infrastructure
Manufacturing IoT Security: 'Where Do We Start?'
California Clinic Network Cyber Incident Affects 656,000
US Treasury Department Says Stablecoins Must Be Regulated
7 Trends: How Ransomware Operations Continue to Evolve
Facebook Shuts Down Facial Recognition Feature
CISA Directs Federal Agencies to Patch Known Vulnerabilities
Ransomware Incidents Among Largest Breaches on Federal Tally
FBI Warns of Ransomware Actors Leveraging M&A Data
BlackMatter Claims to Shut Ops; Experts Suspect Rebranding
US Commerce Department Blacklists Israeli Spyware Firms
Feds Post $10 Million Reward for DarkSide Ransomware Actors
EDR to XDR: What It Means
Attack Surface Management: The Next Generation
ISMG Editors: CISA to Protect Critical Infrastructure
EHR Vendors' Disclosures Are Latest Security Risk Reminders
US DOJ: Continue to Expect Arrests, Ransom Payment Seizures
Digitizing and Securing Norway's Railway Network
Law Enforcement Operation Targets Clop Ransomware
NSA Reports: Espionage Group Breaches Critical Systems
Profiles in Leadership: Leon Ravenna, CISO, KAR Global
Secure the Changing Risk Landscape from BEC, Other Threats
REvil Ransomware Suspects Snared in Global Police Crackdown
Ransomware Actors May Have a New Broker on the Block
Black Shadow Group Leaks Israeli Patient Records, Data
Infrastructure Bill Features $1.9 Billion in Cyber Funding
Robinhood Reveals Data Breach and Extortion Shakedown
Lab Owner Charged in $100 Million Healthcare Fraud Case
US Treasury Blacklists Cryptocurrency Exchange Chatex
Don't Settle- Go Beyond Native Cloud Security
Risk Quantification 101: Communicate Risk in Dollars and Cents
How to Stop a Potential Ransomware Attack Before it Happens
The Evolution of Privileged User Monitoring for Mainframes
The ROI of Shift-Left Automated Testing
Dridex Banking Malware Turns Up in Mexico
Hackers Disrupt Canadian Healthcare and Steal Medical Data
Pegasus-Like Spyware Targets South Korean Citizens
Lyceum APT Group Adds ISPs to Its Target List
Breach Reporting Timelines: Tale of Two Hacking Incidents
SEC's Crenshaw: Transparency, Pseudonymity Top DeFi Issues
55 Patches, 6 Zero Days - Is There a Backlog at Microsoft?
Cybersecurity Leadership: Cut Through the Zero Trust Hype
OnDemand Webinar I Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About
OnDemand Webinar I Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement
UK Supreme Court Blocks $4.3B Class Action Against Google
NJ AG Smacks 2 Printing Firms with Hefty Fine in PHI Breach
Increase Trust In Your Connected Systems and Technologies
Flaws Allow Unlimited Purchases on Apple, Samsung, Google
VP Kamala Harris: US Will Join 80-Nation Cybersecurity Pact
Firm Held Onto Palo Alto VPN Zero-Day for 11 Months
OnDemand Webinar I Protecting Active Directory Without Privileged Access
ISMG Editors: How Sustainable Is 'Work From Anywhere'?
NSO's Troubles Extend Beyond CEO-Designate Quitting
Pace of Cybercrime Evolution Is Accelerating, Europol Warns
Using Psychology to Increase Organizational Resiliency
CISA Warns About Siemens, Philips Medical Device Flaws
US Department of Defense to Launch Zero Trust Office
Zoom Patches Multiple Vulnerabilities
Misconfigured FBI Email System Abused to Run Hoax Campaign
OnDemand Webinar I Identity Detection and Response (IDR) - Are you ready?
Mac Zero-Day Alert: Watering Hole Attacks in the Wild
Russian National Charged With Laundering Ryuk Ransoms
How To Protect Sensitive Data From Ransomware in AWS
US, Israel Expand Cyber Partnership, Announce Task Force
Researchers Spot Comeback of the Emotet Botnet
Modern Threat Detection and Response: The Challenge
Modern Threat Detection and Response: The New Advantage
Money Laundering Cryptomixer Services Market to Criminals
Exploring Top Use Cases for Network Detection and Response
EU Report Calls for More Health-Specific Incident Response
US DHS Launches New System for Hiring, Retaining Cyber Talent
MosesStaff Attacks Israeli Government, Other Organizations
Profiles in Leadership: TJ Hart, State Street
Intel Fixes 2 High-Severity Vulnerabilities
Exfiltration Breach, Ransomware Attack Affect 800,000
CISA Leader: 'We've Not Seen a Change' in Ransomware Attacks
How Behavioral Biometrics Can Tackle AML Fraud
Ransomware, Response Dominate Irish Cybercrime Conference
US, UK, Australia Issue Alert on Iranian APT Groups
Ohio Hospital Still Struggling One Week After Cyberattack
CISA Issues Incident and Vulnerability Response Playbooks
Ransomware Attackers: 'No Days Off!'
ISMG Editors: Cyberspace Solarium Commission Updates
The Evolution of Bots
Cybersecurity Awareness 2021: #BeCyberSmart about Account Takeover Attackers
Breaking Down the Cloud Firewall
Rethinking Risk in the Wake of DDoS Extortion
'The Shared Responsibility That Cyberspace Is'
North Korean APT Group Steps Up Espionage Ops in 2021
Philips, CISA Warn of Medical Device Product Security Flaws
Cloud Security: The Need for AWS Backup
A Fresh, Risk-Based Approach to SAST Application Security
Cyber Attacks: The 2022 Predictions
OnDemand Webinar I Truth or Dare of Identity Security
Utah Imaging Associates Notify Nearly 584,000 of PHI Hack
NHS Denies Data Was Exposed in Stor-a-File Hack
Report: DeFi Fraud, Theft Exceeds $10 Billion in 2021
Update: GoDaddy Breach Hits Managed WordPress Customers
Cisco Firewall Vulnerabilities Enable Denial of Service
US Cybersecurity Alert: Hackers Won't Respect Thanksgiving
COVID and the Holidays: What You Need to Know
Report: China to Target Encrypted Data as Quantum Advances
Apple Sues NSO for Product and Service Abuse
Cryptocrimes Proliferate: Ransomware, New Threat Campaigns
Ransomware: How to Win the Battle
Insider Threat Management: The New Personae and Risks
Financial Agencies Eye Existing Laws for Crypto Regulation
Profiles in Leadership: Jason Fruge, CISO, Rent-A-Center
Ransomware: Best Practices for Negotiating a Ransom Payment
UK Legislation Seeks Mandatory Security Standards for IoT
Ukraine's Secret Service Busts 5 Alleged 'Phoenix' Hackers
Analytics Based Investigation and Automated Response with AWS + Splunk Security Solutions
The State of Security 2021
How To Build an Effective Zero Trust Security Model
Enhance your Security Detections with Machine Learning
Battling the Cloud Complexity Challenges
Medical Data Exposed in Breach at True Health New Mexico
Securing Your Hybrid Workforce Using a SASE Approach
Hackers Exploit MS Browser Engine Flaw Where Unpatched
The Best Gift for the Holidays? An Incident Response Plan
Report: Israel Cuts Cyber Export List to 37 Countries
Making the Case for Centralized IAM Management Control
Darknet Markets Advertise Fake COVID-19 Vaccine Passports
Sneaky New Magecart Malware Hides in Cron Jobs
Senate Considering Several Cyber Measures in Annual NDAA
Pfizer Alleges Worker Took COVID Vaccine, Trade Secrets
Ransomware Defense: 'What Would Make a Difference?'
Forrester Predictions: Rethinking Supply Chain Management
Report: No Patch for Microsoft Privilege Escalation Zero-Day
Why Today's Security Rhetoric Is Harmful and Must Change
Japanese Electronics Giant Panasonic Discloses Data Breach
FDA Playbook Aims to Bolster Medical Device Threat Modeling
Multi-Cloud, Not Multi-Silos: Consolidate Your Security Data
DNA Test Firm: 2.1 Million Affected by Legacy Database Hack
FBI Seizes Bitcoins From Alleged REvil Ransomware Affiliate
Hackers Abuse Remote Access Tools to Steal Crypto Data
Recently Discovered 'EwDoor' Botnet Targets US AT&T Devices
HHS Slaps 5 More Entities in HIPAA 'Right of Access' Disputes
Containing (and Securing) the SaaS App Explosion
Executive Protection: What Will You Say When Asked?
Report: APTs Adopting New Phishing Methods to Drop Payload
ISMG Editors: Are We Close to Cracking Cybercrime Ecosystem?
Planned Parenthood LA Data Exfiltrated, 400,000 Affected
Cyber Officials Outline Critical Infrastructure Protections
Incident Response: Best Practices in the Age of Ransomware
Ransomware Operations Double Down on Data Leak Sites
Arrest Points to Ubiquiti Breach Being an Inside Job
Going Inside the Mind of an Ethical Hacker
Bridging Workforce Gap with Diversity, Equity & Inclusion
Deepfakes, Voice Impersonators Used in Vishing-as-a-Service
BIO-ISAC: Beware of Tardigrade Attacks on Biomanufacturers
Microsoft Teams’ New Feature Sparks Security Concerns
TSA Issues New Cybersecurity Requirements for Rail Sector
Researcher: Healthcare Staffing Database Exposed Worker PII
Guarding the Public Sector: Perspectives on Transformative Cybersecurity
Report: NSO Group Spyware Found on State Department Phones
Alert: 'Cuba' Ransomware Slams Critical Sector Organizations
What's New in Splunk Enterprise Security?
Missouri Governor's Hack Accusation Loses Steam
Cloud Security: The Real New Normal
CIAM: New Strategies to Optimize the Student Experience
Profiles in Leadership: Anahi Santiago, CISO, ChristianaCare
Mandiant: SolarWinds Attackers Continue to Innovate
Medical Workers Plead Guilty to PHI Access-Related Crimes
Kafdrop Flaw Puts Data of 'Major Global Players' at Risk
Microsoft Gets Court Order to Disrupt Chinese Cyber Ops
Attack Wipes 25 Years' Worth of Data From Local Electric Co.
Maryland Health Dept. Systems Still Affected by Incident
ISMG's King Appointed to Forbes Technology Council
Hacking the US Government - Legally
India's PDP Bill: The Cybersecurity Implications
Canada Busts Suspect Tied to 'Multiple Ransomware Attacks'
National Cybersecurity and the Broader Threat Spectrum
Profiles in Leadership: Marco Túlio, Red Ventures
Google TAG Disrupts Blockchain-Enabled Botnet
Cyber Incident Reporting Mandate Excluded From Final NDAA
HHS Launches Repository for Health Sector Cybersecurity Help
SonicWall SMA 100 Series Users Urged to Apply Latest Fix
Emotet Tactic May Presage More Rapid Ransomware Infections
What Motivates a Cyber Threat Actor?
Ransomware, Other Big Incidents Added to Breach Tally
UK High Court Reverses Extradition Ruling on Julian Assange
The State of Cyber Resilience: Faster Response Required
Australian Government Staff Data Leaked in 3rd-Party Breach
Hellman Worldwide Logistics: Operations Disrupted by Attack
New Mirai-Based Campaign Targets Unpatched TP-Link Router
ISMG Editors: Can We Finally Get Rid of the Password?
Severe Apache Log4j Vulnerability Threatens Enterprise Apps
Report Dissects Conti Ransomware Attack on Ireland's HSE
Simplified Ransomware Mitigation
Log4j: 'Vaccine' Released for Exploited Apache Zero-Day
Massive Attack Targets 1.6 Million WordPress Sites
Serious Log4j Security Flaw: Race Underway to Discern Scope
The Road to Log Management Maturity
Fraud: Shifting Landscape for State and Local Government
Profiles in Leadership: Chris Roberts, Hillbilly Hit Squad
Russian Who Aided Kelihos Botnet Receives 4-Year Sentence
US, Allies to Tighten Export Controls on Cyber Tools
COVID-19: How Does Omicron Change the Discussion?
Already Compromised by Apache Log4j? Check Before You Patch
CISA: Authentication Flaw in Certain Hillrom Cardio Products
HR Platform UKG Says Cloud Solutions Hit With Ransomware
Exploiting Log4j: 40% of Corporate Networks Targeted So Far
Ransomware Roundup: Healthcare Sector's Latest Victims
CISO Playbook: Dawn Cappelli on Mitigating Log4j Zero-Day
Virginia's Legislative Branch Hit With Ransomware Attack
Cryptocurrency Compliance Cooperative: The Road Map for 2022
Attackers Exploiting Apache Log4j: 'Everyone Is a Target'
Superior Plus is Latest Fuel Supplier Hit by Ransomware
How to Patch Log4j Now That Version 2.16 Has Been Released
Patch Tuesday: Microsoft Fixes Zero-Day Spreading Malware
Study: Attacks Can Manipulate Medical Imaging, AI Outcomes
Senate Passes $768 Billion NDAA With Cyber Provisions
White House Policy Gives Agencies 24 Hours to Report Attacks
The Path to Modern MDR
Ransomware: 'Because It's Not a Matter of If, But When'
Threatscape 2022: What Is the Outlook for Government?
Nation-State Attackers Wielding Log4j Against Targets
NJ AG Fines Cancer Center in Two Related 2019 PHI Breaches
US DHS Announces New Bug Bounty Program to Safeguard Systems
Log4j Updates: Flaw Challenges Global Security Leaders
The Challenge of Open-Source Software Security
Senators Urge Treasury Department to Address Crypto Brokers
ISMG Editors: Apache Log4j, Ransomware Updates
Log4j Flaw: Healthcare Sector Warned to Take Action
CISA to Agencies: Patch Log4j Vulnerability 'Immediately'
Apache Log4j: New Attack Vectors, Ransomware Seen
Time to Patch Log4j Again; Apache Releases 2.17 Fixing DoS
NATO's NCI Academy: Training Tomorrow's Cyber Leaders
As Ransomware Variants Shift, Incidents 'Still on the Rise'
Chinese APT Rebrands to Target Transportation Sector
500,000 Android Users Victimized by Malware-Infected App
Irish Hospital, Texas Practice Deal with Attack Aftermath
Oracle Deal to Buy Cerner: Privacy, Security Considerations
Log4j: Belgian Defense Ministry Reports It Was 'Paralyzed'
CISO Fireside Chat: OK to Click - Leveraging Technology to Keep Employees Safe
The Need to Think Differently About Cybersecurity in 2022
Entities Dealing With Email Breach, IT Systems/Phone Outage
NSO Group's Sophisticated Spyware Connected to More Cases
Attack on Kronos Causes Sainsbury's Payroll System Outage
Active Directory Bugs Enable Windows Domain Takeover
'Hack DHS' Program Expanded to Include Log4j Bug Hunters
Why We Need an Identity Data Fabric
ISMG Editors: Privacy Special
Nation-States Exploiting Critical Flaw in Zoho UEM
Ransomware's Threat to the Mainframe
Zero Trust Network Access: 'Are We There Yet?'
Study: Flaw Allowed Faked Results in COVID-19 Home Tests
Apache Log4j Meets Optiv MXDR
CISA, International Partners Advise All Orgs to Patch Log4j
Learn Your Organization's Weaknesses Before the Criminals Do
FDA, CISA Warn of Fresenius Kabi Infusion Pump Flaws
Fraud Prevention Technologies: Where to Invest?
Former Uber CSO Faces New Charge for Alleged Breach Cover-Up
Ransomware and the C-Suite: What Do Executives Want to Know?
4 Bugs Found in Microsoft Teams' Link Preview Feature
Threat Modeling: A New Strategy That Can Scale
2 Hacking Incidents Collectively Hit PHI of Nearly 750,000
Flaws in WordPress Plug-In Put 3 Million Websites at Risk
Layers of API Security and Log4j: Beyond the OWASP Top 10
Case Study: The Road to Zero Trust
Feds Recover $154 Million Allegedly Stolen by Sony Insider
Profiles in Leadership: Dennis Leber
Cyber Activity Surges as Russia Masses on Ukraine's Border
French IT Services Firm Hit by Ransomware Attack
Cybersecurity Is a Data Problem: How Are You Preparing for It?
Phishers Attempt to Steal 2FA Code of CoinSpot Users
Shutterfly Acknowledges Hit by Ransomware Attack
Azure App Service's Flaw Exposed Source Code for 4 Years
2 Vulnerabilities Discovered in Apache HTTP Server
Rook Uses Babuk's Leaked Code in Kazakh Bank Attacks
GOP Senator to Introduce 'Comprehensive' Crypto Regs Bill
Zero Trust: John Kindervag's 2022 Outlook and Predictions
Biden Signs Into Law NDAA With Several Cyber Provisions
Apache's Log4j Version 2.17.1 Addresses New Flaw
Schneider Electric Patches 7 Bugs in EVlink Products
Privacy Predictions for 2022: Laws, Flaws and Enforcement
LastPass: No User Accounts Have Been Compromised
Crypto Platform Suffers Log4j-Related Ransomware Attack
ISMG's Greatest Hits: Top Cybersecurity Stories of 2021
Ransomware Attack Forces Norway Newspaper to Shut Presses
ISMG Editors: 'Year in Review' Special
Cyber Regulation: Predictions for 2022
Polygon Bug Put $23 Billion in Cryptocurrency at Risk
Vice Society: Ransomware Gang Disrupted Spar Stores
CISA, Vendors Refine Scanners for Log4j Vulnerabilities
T-Mobile: Some Customers Affected by SIM Swap Data Breach
Cryptocurrency Cybercrime Challenge: Curbing Illicit Use
PulseTV: Over 200,000 Credit Card Details Compromised
Hospital System: Data Exfiltration Breach Hits 1.3 Million
Report: China Mining Western Social Media for Intelligence
Microsoft Exchange Fixes Disruptive 'Y2K22' Bug
Clinic Notifies 212,500 About 2020 Breach Involving Fraud
Microsoft: Log4j Exploit Attempts, Testing Remain Rampant
Morgan Stanley Agrees to $60 Million Breach Settlement
Where Are You in Your Zero Trust Journey?
ZLoader Malware Exploits Microsoft Signature Verification
Portugal's Major News Websites Remain Offline After Attacks
Tech Vendor Email Breach Affects Dozens of Health Entities
FTC Threatens Action Against Orgs Failing to Mitigate Log4j
New York Warns Credential Stuffing Hit 1 Million Accounts
Senators Seek Clarity on DHS, DOT Cybersecurity Efforts
Mainframe DevOps: What Modernization Means
Endpoint Least Privilege: A Foundational Security Control
CISO Playbook: Log4j Response - What We Did, What We Learned
Google Buys Siemplify to Bolster Security Analytics Tools
EHR Vendor Breach Lawsuit Seeks Security Improvements
New Mexico County Hit by Suspected Ransomware Attack
Suspected Cryptocurrency 'Rug Pull' Nets Actors $10 Million
Online Pharmacy Says Its AWS Portal Was Hacked
Preventing Insider Threat Incidents - What You Need to Know - Featuring Forrester Research
Get Hands-On with Closed-Loop Email Analysis and Response
Google, Facebook Fined by French Data Protection Agency
ISMG Editors: Secrets and Lies of Ransomware Operators
Russian Denied Bail in Insider Trading Hacking Case
Focusing on Risk Mitigation in 2022
Balancing Employee Privacy and Security for Remote Workers
Fertility Clinic Hacking Incident Affected Nearly 80,000
Researchers Discover H2 Database Flaw Similar to Log4Shell
Norton 360 Offering Contains Controversial Cryptominer
Log4j: Sen. Peters Revisits Incident Reporting Legislation
Hackers Exploiting Flaws in Google Docs' Comments Feature
How China's Algorithm Regulation Affects Businesses
QNAP Tells Users to Take Immediate Action to Stop Ransomware
FIN7 Targets US Enterprises Via BadUSB
Europol Ordered to Delete Data Not Tied to Investigations
CISA: Federal Response to Log4j Has Been 'Exceptional'
HHS Warns Healthcare Sector of Pysa Ransomware Threats
Profiles in Leadership: CISO Robert Hellwig
OT Cybersecurity Strategies for Executives
XDR: The Importance of Network Technology
Cybersecurity Experts Push for Sweeping FISMA Changes
Vendor: Data Breach Involved Security Product Vulnerability
US Warns of Russia-Backed Threat to Critical Infrastructure
Researcher Says Flaw Allows Remote Access to Teslas
Night Sky Ransomware Distributed via Log4j Exploits
Microsoft Patch Tuesday: An 'Unusually Large' Patch Release
Russian APTs: Why Stakes Are So High for Healthcare Sector
Report: DeFi Undermined by Centralization, Code Flaws
Proofpoint Acquires AI-Based Data Protection Startup Dathena
Ukraine Police Bust Ransomware Suspects Tied to 50 Attacks
Maryland Health Department Confirms Attack Was Ransomware
White House Hosts Open-Source Security Summit With Big Tech
The Democratization of Security
North Korean APTs Target Cryptocurrency Startups
Ukrainian Websites Defaced as Tensions With Russia Continue
18 Firefox 96 Security Fixes Include High-Risk Issues
Russia Arrests 14 Suspected REvil Ransomware Group Members
ISMG Editors: Is 2022 the Year of the SBOM?
North Korean Crypto Theft Totals $400 Million in 2021
Clinic Breach Affecting 200,000 Tied to Vendor's 2020 Attack
FCC Proposes Stricter Telecom Breach Notification Measures
OCC Chief Calls for Collaboration in Crypto Regulations
Accellion Agrees to $8.1 Million Breach Settlement
Russia Charges 8 REvil Ransomware Suspects After Raids
Destructive Malware Discovered Targeting Ukrainian Systems
Doxbin Leak Includes Criminals' Data, Could Boost Hacking
Record Number of Major Health Data Breaches in 2021
GAO: SolarWinds, Exchange Hacks Reveal Info-Sharing Gaps
JPMorgan Chase Invests $12 Billion in Security Updates
Privacy Fines: GDPR Sanctions in 2021 Exceeded $1 Billion
How the 'Great Resignation' Is Affecting Cybersecurity
HHS Issues Trusted Health Data Exchange Governance Framework
EU's Cyber Rapid Response Team on Standby for Ukraine
New Chinese Threat Group Deals in Espionage and Theft
NSO Group Spyware Reportedly Used by Israeli Police Force
European Authorities Seize VPN Service Tied to Ransomware
Update: OpenSubtitles Data Breach Affects 6.7 Million Users
Profiles in Leadership: Marcel Lehner, CISO, MM Group
Zero Trust Controls for your SaaS Applications
Log4Shell Update: VMware Horizon Targeted
2 Key Cybersecurity Lawmakers Will Not Seek Reelection
Biden Memo Orders Cybersecurity Improvements
Update: 'This Was a Targeted Attack,' Says Red Cross
UK Issues Fresh Proposals to Tackle Cyberthreats
OnDemand Webinar | How YOUR Data Can Drive Cloud Security Success at Scale
Sophos Threat Report 2022
Teardown: Fake Ransomware Targeting Ukrainian Government
Israeli Officials Deny Claims of Improper Spyware Use
HHS HC3: Healthcare Sector Remains at Risk for Log4j Attacks
Crypto.com Confirms Breach, Nearly $34 Million in Losses
Wiper Malware in Ukraine Ties to Summer 2021 Intrusions
3 Weeks, 6 Bugs: Experts Analyze, Advise on WordPress Flaws
From the Trenches: Remediating Widespread Apache Log4j Flaw
ISMG Editors: Will Ransomware Kill Cyber Insurance?
Federal Authorities, Patient Safety Experts Warn of Risks
US Federal Reserve Issues Report on Digital Dollar
Twitter: Head of Security Reportedly Fired; CISO to Leave
Multi-Cloud Environments: Securing Greater Visibility
Suspected REvil Ransomware Spinoff 'Ransom Cartel' Debuts
FBI Warns of Cybercriminals Using QR Codes to Steal Funds
NY Fines Vision Benefits Firm $600,000 for 2020 Breach
Microsoft Finds SolarWinds Vulnerability Amid Log4j Search
Report: DHS Fears Russian Cyberattack If US Acts on Ukraine
Dark Souls 3 Video Game Reportedly Has Exploitable Flaw
How Do You Detect - and Stop - Bank Identity Number Attacks?
Beyond Log4j: Improving Open-Source Software Security
'Email Security Doesn't Get the Attention It Deserves'
Drug Testing Lab Portal Incident Exposed Data for 4 Years
US, NATO Discuss Ukrainian Cyber Aid Amid Tensions
The State of Ransomware
Hacktivists Hit Belarusian Railroad to Stop Russian Troops
Ransomware Trends: Volume of Known Victims Remains Steady
US OMB Releases Zero Trust Strategy for Federal Agencies
Proposed Settlement Calls for Health Plan to Bolster Security
Kentucky Hospital Still Struggles One Week After Cyberattack
Spotting Cybersecurity Gaps, Becoming More Systems-Focused
Report: Access Broker Exploiting VMware Log4j Vulnerability
ITRC: Identity Crime Predictions for 2022
Battling Bugs: UK Government Pitches 'Scanning Made Easy'
Lawsuit: 'Negligence' Led to Memorial Health System Attack
CISA, EPA Issue 100-Day Cyber Plan for Water Utilities
Crypto Advocates Decry Bill That Could Ban Transactions
Cyberattack Spillover From Ukraine: Be Prepared, UK Warns
Flaw in Polkit's pkexec Puts Linux Users at Risk
ISMG Editors: Tough Lessons Learned From Log4j, Ransomware
Darknet Market Search Engine Operator Gets 8-Year Sentence
FCC Votes to Ban China Unicom From Operating in US
Log4j Exploitations Have Slowed, But Attack Vectors Remain
DeFi Platform Qubit Finance Hacked for $80 Million
FBI Reportedly Considered Buying NSO Spyware
Achieve Ransomware Immunity: Protect, Detect and Recover
Dark Overlord Collaborator Sentenced to Three Years
Trellix CEO Details Extended Detection and Response Moves
Lazarus Using Windows Update, GitHub to Deploy Malware
HHS HC3: BlackMatter Threat to Health Sector 'Reduced'
Report Details Russian Cyberespionage Efforts in Ukraine
Rust-Coded Malware Key Factor in BlackCat's Meteoric Rise
ITRC Data Breach Report Shows Surge in Data Compromises
US Sends Top Cyber Official to Europe Amid Ukraine Crisis
Congressman Moves to Amend Controversial Crypto Measure
Russia's Escalation in Ukraine Sounds Cyber Defense Alarms
Log4j: What Have We Learned?
DevSecOps: How to Change Old Behaviors
Log4j Puts Vulnerable Ubiquiti Network Applications at Risk
The Business Value and Benefits of Vulnerability and Asset Management, featuring Forrester
House Committee Advances FISMA Modernization Act
DOJ: Healthcare at Center of Biggest US Fraud Cases in 2021
How to Maximize Security Through Simplicity
State of the Internet/Security Report: API: The Attack Surface That Connects Us All
DDoS Defense in a Hybrid Cloud World
The Evolution of Bots
Perfis em Liderança: Allan Müller Buscarino
Wormhole Blockchain Bridge Exploited for Over $300 Million
Buying Bot-Stolen Logs: Marketplaces Make It '2easy'
US DHS Establishes Cyber Safety Review Board
Pfizer: 2 Ex-Executives Stole Drug IP to Help Their Startups
UK-Based KP Snacks Hit by Ransomware in 'Snack Attack'
Enhancing the Cyber Resilience of Critical Infrastructure
M&A Roundup: Delinea Debuts, Forescout & Check Point Expand
How to Increase Visibility Into Security Threats
Profiles in Leadership: Bradley Schaufenbuel, CISO, Paychex
Profiles in Leadership: Cara Coleman, MVB Financial Corp.
Profiles in Leadership: Jerich Beason, SVP, CISO, Epiq
ESET Fixes Privilege Escalation Bug Affecting Windows Users
Cybercrime: Darknet Markets Live On, Even as Players Change
ISMG Editors: How Russian Cyber War Could Have Ripple Effect
Increasing Adoption of Phishing Kits Puts MFA at Risk
News Corp Targeted in 'Persistent Nation-State Attack'
Court Recommends Dismissal of Practicefirst Breach Lawsuit
US Lawmakers Introduce Algorithmic Accountability Act