Payment card data stolen last year when hackers compromised online stores that were using the Volusion checkout platform is now surfacing on dark web sites and forums, according to Gemini Advisory.
The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
The FBI has arrested a Russian national who allegedly ran an online forum that enabled cybercriminals to buy and sell stolen data and personally identifiable information.
Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems. While no attacks have been seen in the wild, no patch for the wormable flaw is yet available. A workaround exists for servers, but not clients.
Microsoft along with its partners from 35 countries has taken coordinated legal and technical action to disrupt Necurs, one of the largest botnets in the world, the company announced in a Tuesday blog post.
The U.S. is better prepared to respond to election interference and related cybersecurity issues than it was four years ago, several security professionals, including one of the FBI's top experts, tell Information Security Media Group.
As COVID-19 spreads, cybercriminals are sending more phishing emails that use the health emergency as a lure, according to security researchers. The European Central Bank is among those issuing warnings.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Just as consumers can look at a box of Twinkies and read a list of ingredients, so too should software makers provide users with a "bill of materials" explaining their composition, says Allan Friedman, director of cybersecurity initiatives at the U.S. National Telecommunications and Information Administration.
Moving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to application threat detection and response.
Two Chinese nationals have been indicted by the U.S. Justice Department for allegedly laundering $100 million in cryptocurrency stolen by North Korean hackers in 2018.
Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data and threatening to leak more unless the victim pays a ransom.
APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.