The operators behind the LockBit ransomware strain use automation tools and techniques that help the malware quickly spread through a compromised network and also assist in picking specific targets, according to Sophos.
As the use of telehealth continues to surge during the COVID-19 crisis, healthcare entities and their vendors must take critical steps to keep patient data private and secure, says attorney Janine Anthony Bowen.
Are you confused about how to get started with customer identity for your organization? Or have you started the journey but aren't sure what to do next? This eBook has been designed to help you, regardless of your current journey stage.
In this eBook, we define and discuss four key phases on the path to customer...
The White House are Twitter are both debunking claims by a Dutch ethical hacker that he accessed President Donald Trump's Twitter account earlier this month by guessing the password, enabling him to obtain full privileges and capture screenshots.
Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
An indictment unsealed this week demonstrates the degree to which Western intelligence agencies have apparently been able to infiltrate the Russian intelligence apparatus to trace attacks back to specific agencies - and individual operators. Shouldn't Russian spies have better operational security?
With most of the world working from home for the past few months, and many using this time to research new technologies and keep up with the ever-evolving IT and Security landscapes, many questions remain. Especially with the emergence of the Gartner-coined SASE (Secure Access Service Edge) model for doing business on...
For the second time within a week, it's been revealed that sensitive voice messages containing patients' information have been exposed on the internet. The latest discovery involves unsecured voice transcripts of patient calls to drug giant Pfizer's automated customer support system.
VMware Carbon Black is out with its latest Global Incident Response Threat Report, which describes "the perfect storm" for increasingly sophisticated attacks heading into 2021. Cybersecurity strategist Tom Kellermann discusses what that means - and how these trends should inform our defensive strategies.
U.S. officials have accused the Russian government of behaving "maliciously or irresponsibly" by taking steps such as crashing Ukraine power grids in the dead of winter and causing more than $10 billion in damages via NotPetya malware. But why make the accusations now? And how might Moscow respond?
A recent hacking incident had an unusual twist: The hacker who broke into the network of a Pennsylvania-based nonprofit entity apparently decided against injecting malware or proceeding with other malicious activities after discovering the organization serves individuals with intellectual disabilities.
This free eBook, Cybersecurity for Dummies delivers a fast, easy read that describes what everyone needs to know to defend themselves and their organizations against cyber attacks - including simple steps everyone can take to protect themselves at work and at home.
It empowers your employees to understand and...
With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it's time all cyber security stakeholders got educated.
This free, 24-page book, Privileged Account Management for Dummies, gives you, your IT staff, and business stakeholders a practical understanding...
You need to be ready for a cyber attack with a proactive, coordinated incident response plan.
Download the latest whitepaper to learn:
Steps to take before an incident occurs to make sure people are prepared to act
Indicators of compromise that help you discover a cyber attack
Actions to take during each...