Need to get up to speed on the XDR category and what it means for your company? As a modern approach to threat detection and response, Extended Detection and Response (XDR) progresses beyond traditional EDR with a scalable cloud architecture that natively integrates endpoint, network, and cloud data to stop...
Acting CISA Director Brandon Wales, Rep. Jim Langevin and many others will discuss the government's top priorities in addressing cybersecurity challenges at ISMG's Virtual Cybersecurity Summit: Government, to be held July 13 and 14.
The Kaseya VSA ransomware attack was discussed exhaustively over the Fourth of July holiday weekend. But there's one big question that hasn’t been answered, says Tom Kellermann, head of cybersecurity strategy at VMware Carbon Black: "Who gave REvil the zero-day?"
The NSA, the FBI and other U.S. government agencies are tracking an ongoing Russian cyberespionage campaign in which attackers are using brute-force methods to access Office 365 and other cloud-based services.
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Deputy national security adviser Anne Neuberger says the White House is preparing to release additional details, including attribution, about the attacks that targeted vulnerable on-premises Microsoft Exchange email servers at government agencies and other organizations earlier this year.
SolarMarker malware operators are using "SEO poisoning" techniques to deploy the remote access Trojan to steal sensitive information, Microsoft reports.
As technical director of the Attack Investigations Team at Symantec, a division of Broadcom, Eric Chien has access to intelligence and telemetry on the latest attack trends. He shares insights on supply chain attacks and more - and discusses how defenders can raise their game in response.
In an interview with...
As enterprises adjust to the new threat landscape, how must they also adjust their approach to detection?
Download this eBook and learn:
Which threats are going undetected;
Why common visibility tools miss the mark;
The Gigamon ThreatINSIGHT approach to NDR.
The road to cybersecurity compliance has changed dramatically in recent years, with proactive efforts such as incident response, forensic investigation and threat hunting on the rise.
However, compliance standards have typically not kept pace with the need for companies to level-up their security stance in an era of...
According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
The Department of Justice announced Tuesday that it has seized two domains that were used during a recent phishing campaign that targeted a marketing firm used by the U.S. Agency for International Development - USAID - to send malicious messages to thousands of potential victims.
A Russian group that was behind the massive SolarWinds supply chain attack has returned with a fresh phishing campaign, according to Microsoft. This new campaign compromised a marketing firm used by the U.S. Agency for International Development - USAID - to send malicious messages to thousands.
SolarWinds has uncovered evidence that intruders were in its systems in January 2019, about eight months earlier than originally believed. CEO Sudhakar Ramakrishna says the company discovered the clues by analyzing terabytes of data from its virtual build systems.
Large enterprises generally have a good grasp on gathering and operationalizing threat intelligence. But when it comes to the midmarket, there are unique challenges. Neal Dennis of Cyware Labs tells how to overcome these obstacles and achieve value from a threat intel platform.
In this video interview with ISMG,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.