Html Sitemap

Forrester Report: Key Questions to Ask XDR Vendors
Malicious Packages Disguised as JavaScript Libraries Found
FIN7 Sets Up Fake Pentesting Company Site to Recruit Talent
DarkSide Transfers $7 Million Worth of Bitcoin
Groove Operators Reportedly Ask Peers to Attack US
The Geography of Cryptocurrency
Defending Against Open-Source Supply Chain Attacks
The Need for Systems Thinking in Cybersecurity
REvil's Cybercrime Reputation in Tatters - Will It Reboot?
Voipfone DDoS Attacks Raise Specter of Protection Racket
US State Department to Create Dedicated Cyber Office
Washington Secretary of State to Head Election Security
NRA Reportedly Hit By Russia-Linked Ransomware Attack
Microsoft Launches Cybersecurity Recruitment Campaign
Keeping the US Dollar on Top as Cryptocurrency Rises
ISMG Editors' Panel: Solving the Ransomware Problem Together
N-Day Vulnerabilities: The Critical Importance of Patching
Multinational Police Force Arrests 12 Suspected Hackers
Ransomware Evolves: Affiliates Set to Wield Greater Power
US Treasury Department Says Stablecoins Must Be Regulated
7 Trends: How Ransomware Operations Continue to Evolve
ISMG Editors: CISA to Protect Critical Infrastructure
US DOJ: Continue to Expect Arrests, Ransom Payment Seizures
Profiles in Leadership: Leon Ravenna
Secure the Changing Risk Landscape from BEC, Other Threats
REvil Ransomware Suspects Snared in Global Police Crackdown
Infrastructure Bill Features $1.9 Billion in Cyber Funding
US Treasury Blacklists Cryptocurrency Exchange Chatex
Payment Card Fraud Trends in South Africa
SEC's Crenshaw: Transparency, Pseudonymity Top DeFi Issues
55 Patches, 6 Zero Days - Is There a Backlog at Microsoft?
Cybersecurity Leadership: Cut Through the Zero Trust Hype
UK Supreme Court Blocks $4.3B Class Action Against Google
Flaws Allow Unlimited Purchases on Apple, Samsung, Google
VP Kamala Harris: US Will Join 80-Nation Cybersecurity Pact
ISMG Editors: How Sustainable Is 'Work From Anywhere'?
Pace of Cybercrime Evolution Is Accelerating, Europol Warns
Using Psychology to Increase Organizational Resiliency
Zoom Patches Multiple Vulnerabilities
Mac Zero-Day Alert: Watering Hole Attacks in the Wild
How To Protect Sensitive Data From Ransomware in AWS
US, Israel Expand Cyber Partnership, Announce Task Force
Money Laundering Cryptomixer Services Market to Criminals
Exploring Top Use Cases for Network Detection and Response
Profiles in Leadership: TJ Hart
How Behavioral Biometrics Can Tackle AML Fraud
Ransomware, Response Dominate Irish Cybercrime Conference
SharkBot Trojan Targets Bank and Cryptocurrency Credentials
Ransomware Attackers: 'No Days Off!'
ISMG Editors: Cyberspace Solarium Commission Updates
'The Shared Responsibility That Cyberspace Is'
Regulators: Banks Have 36 Hours to Report Cyber Incidents
Youth in $37 Million Crypto Heist; BitConnect Ponzi Payout
Update: GoDaddy Breach Hits Managed WordPress Customers
US Cybersecurity Alert: Hackers Won't Respect Thanksgiving
Cryptocrimes Proliferate: Ransomware, New Threat Campaigns
Financial Agencies Eye Existing Laws for Crypto Regulation
Profiles in Leadership: Jason Fruge
Making the Case for Centralized IAM Management Control
Sneaky New Magecart Malware Hides in Cron Jobs
Senate Considering Several Cyber Measures in Annual NDAA
Forrester Predictions: Rethinking Supply Chain Management
Report: No Patch for Microsoft Privilege Escalation Zero-Day
Why Today's Security Rhetoric Is Harmful and Must Change
Banish Sequential Numbering: How to Combat 'BIN Attacks'
FBI Seizes Bitcoins From Alleged REvil Ransomware Affiliate
Hackers Abuse Remote Access Tools to Steal Crypto Data
Report: Aberebot-2.0 Hits Banking Apps and Crypto Wallets
Recently Discovered 'EwDoor' Botnet Targets US AT&T Devices
ISMG Editors: Are We Close to Cracking Cybercrime Ecosystem?
Incident Response: Best Practices in the Age of Ransomware
Ransomware Operations Double Down on Data Leak Sites
Arrest Points to Ubiquiti Breach Being an Inside Job
Bridging Workforce Gap with Diversity, Equity & Inclusion
Deepfakes, Voice Impersonators Used in Vishing-as-a-Service
Microsoft Teams’ New Feature Sparks Security Concerns
TSA Issues New Cybersecurity Requirements for Rail Sector
Alert: 'Cuba' Ransomware Slams Critical Sector Organizations
Profiles in Leadership: Anahi Santiago
Kafdrop Flaw Puts Data of 'Major Global Players' at Risk
Nearly $200 Million Stolen in BitMart Crypto Exchange Hack
Microsoft Gets Court Order to Disrupt Chinese Cyber Ops
ISMG's King Appointed to Forbes Technology Council
Canada Busts Suspect Tied to 'Multiple Ransomware Attacks'
National Cybersecurity and the Broader Threat Spectrum
Profiles in Leadership: Marco Túlio
Google TAG Disrupts Blockchain-Enabled Botnet
SonicWall SMA 100 Series Users Urged to Apply Latest Fix
Emotet Tactic May Presage More Rapid Ransomware Infections
What Motivates a Cyber Threat Actor?
UK High Court Reverses Extradition Ruling on Julian Assange
The State of Cyber Resilience: Faster Response Required
Australian Government Staff Data Leaked in 3rd-Party Breach
New Mirai-Based Campaign Targets Unpatched TP-Link Router
ISMG Editors: Can We Finally Get Rid of the Password?
Severe Apache Log4j Vulnerability Threatens Enterprise Apps
Report Dissects Conti Ransomware Attack on Ireland's HSE
Log4j: 'Vaccine' Released for Exploited Apache Zero-Day
Massive Attack Targets 1.6 Million WordPress Sites
Profiles in Leadership: Chris Roberts
Russian Who Aided Kelihos Botnet Receives 4-Year Sentence
COVID-19: How Does Omicron Change the Discussion?
Already Compromised by Apache Log4j? Check Before You Patch
HR Platform UKG Says Cloud Solutions Hit With Ransomware
Ransomware Roundup: Healthcare Sector's Latest Victims
CISO Playbook: Dawn Cappelli on Mitigating Log4j Zero-Day
Virginia's Legislative Branch Hit With Ransomware Attack
Attackers Exploiting Apache Log4j: 'Everyone Is a Target'
Superior Plus is Latest Fuel Supplier Hit by Ransomware
How to Patch Log4j Now That Version 2.16 Has Been Released
Patch Tuesday: Microsoft Fixes Zero-Day Spreading Malware
Senate Passes $768 Billion NDAA With Cyber Provisions
White House Policy Gives Agencies 24 Hours to Report Attacks
Nation-State Attackers Wielding Log4j Against Targets
Log4j Updates: Flaw Challenges Global Security Leaders
The Challenge of Open-Source Software Security
Senators Urge Treasury Department to Address Crypto Brokers
ISMG Editors: Apache Log4j, Ransomware Updates
CISA to Agencies: Patch Log4j Vulnerability 'Immediately'
Apache Log4j: New Attack Vectors, Ransomware Seen
Time to Patch Log4j Again; Apache Releases 2.17 Fixing DoS
NATO's NCI Academy: Training Tomorrow's Cyber Leaders
As Ransomware Variants Shift, Incidents 'Still on the Rise'
500,000 Android Users Victimized by Malware-Infected App
Treasury Official Urges Congress to Regulate Stablecoins
Log4j: Belgian Defense Ministry Reports It Was 'Paralyzed'
Combating Synthetic ID Fraud in 2022
The Need to Think Differently About Cybersecurity in 2022
Attack on Kronos Causes Sainsbury's Payroll System Outage
Active Directory Bugs Enable Windows Domain Takeover
'Hack DHS' Program Expanded to Include Log4j Bug Hunters
ISMG Editors: Privacy Special
Nation-States Exploiting Critical Flaw in Zoho UEM
Ransomware's Threat to the Mainframe
CISA, International Partners Advise All Orgs to Patch Log4j
Learn Your Organization's Weaknesses Before the Criminals Do
Former Uber CSO Faces New Charge for Alleged Breach Cover-Up
Ransomware and the C-Suite: What Do Executives Want to Know?
4 Bugs Found in Microsoft Teams' Link Preview Feature
Flaws in WordPress Plug-In Put 3 Million Websites at Risk
Feds Recover $154 Million Allegedly Stolen by Sony Insider
Profiles in Leadership: Dennis Leber
French IT Services Firm Hit by Ransomware Attack
Phishers Attempt to Steal 2FA Code of CoinSpot Users
Azure App Service's Flaw Exposed Source Code for 4 Years
2 Vulnerabilities Discovered in Apache HTTP Server
GOP Senator to Introduce 'Comprehensive' Crypto Regs Bill
Zero Trust: John Kindervag's 2022 Outlook and Predictions
Biden Signs Into Law NDAA With Several Cyber Provisions
Apache's Log4j Version 2.17.1 Addresses New Flaw
Schneider Electric Patches 7 Bugs in EVlink Products
Privacy Predictions for 2022: Laws, Flaws and Enforcement
LastPass: No User Accounts Have Been Compromised
Crypto Platform Suffers Log4j-Related Ransomware Attack
ISMG's Greatest Hits: Top Cybersecurity Stories of 2021
Ransomware Attack Forces Norway Newspaper to Shut Presses
ISMG Editors: 'Year in Review' Special
Cyber Regulation: Predictions for 2022
Polygon Bug Put $23 Billion in Cryptocurrency at Risk
CISA, Vendors Refine Scanners for Log4j Vulnerabilities
Cryptocurrency Cybercrime Challenge: Curbing Illicit Use
PulseTV: Over 200,000 Credit Card Details Compromised
Indian Medical Association's Twitter Account Compromised
Israel Tracks, Seizes Cryptocurrency From Hamas-Linked Firm
Microsoft Exchange Fixes Disruptive 'Y2K22' Bug
Profiles in Leadership: Nilesh Roy
Microsoft: Log4j Exploit Attempts, Testing Remain Rampant
Morgan Stanley Agrees to $60 Million Breach Settlement
Where Are You in Your Zero Trust Journey?
ZLoader Malware Exploits Microsoft Signature Verification
Portugal's Major News Websites Remain Offline After Attacks
New York Warns Credential Stuffing Hit 1 Million Accounts
Senators Seek Clarity on DHS, DOT Cybersecurity Efforts
Mainframe DevOps: What Modernization Means
CISO Playbook: Log4j Response - What We Did, What We Learned
Google Buys Siemplify to Bolster Security Analytics Tools
New Mexico County Hit by Suspected Ransomware Attack
Suspected Cryptocurrency 'Rug Pull' Nets Actors $10 Million
CISO Playbook: Log4j Response - Hard Work, Lasting Lessons
Google, Facebook Fined by French Data Protection Agency
ISMG Editors: Secrets and Lies of Ransomware Operators
Balancing Employee Privacy and Security for Remote Workers
Researchers Discover H2 Database Flaw Similar to Log4Shell
Norton 360 Offering Contains Controversial Cryptominer
Log4j: Sen. Peters Revisits Incident Reporting Legislation
Hackers Exploiting Flaws in Google Docs' Comments Feature
How China's Algorithm Regulation Affects Businesses
QNAP Tells Users to Take Immediate Action to Stop Ransomware
FIN7 Targets US Enterprises Via BadUSB
Europol Ordered to Delete Data Not Tied to Investigations
CISA: Federal Response to Log4j Has Been 'Exceptional'
US Warns of Russia-Backed Threat to Critical Infrastructure
Night Sky Ransomware Distributed via Log4j Exploits
Microsoft Patch Tuesday: An 'Unusually Large' Patch Release
Report: DeFi Undermined by Centralization, Code Flaws
Proofpoint Acquires AI-Based Data Protection Startup Dathena
Ukraine Police Bust Ransomware Suspects Tied to 50 Attacks
White House Hosts Open-Source Security Summit With Big Tech
North Korean APTs Target Cryptocurrency Startups
Ukrainian Websites Defaced as Tensions With Russia Continue
18 Firefox 96 Security Fixes Include High-Risk Issues
ISMG Editors: Is 2022 the Year of the SBOM?
North Korean Crypto Theft Totals $400 Million in 2021
OCC Chief Calls for Collaboration in Crypto Regulations
Identity Market Likely to Consolidate in 2022
Top Scam-Fighting Tactics for Financial Services Firms
Destructive Malware Discovered Targeting Ukrainian Systems
GAO: SolarWinds, Exchange Hacks Reveal Info-Sharing Gaps
European Authorities Seize VPN Service Tied to Ransomware
Profiles in Leadership: Marcel Lehner
Log4Shell Update: VMware Horizon Targeted
2 Key Cybersecurity Lawmakers Will Not Seek Reelection
UK Issues Fresh Proposals to Tackle Cyberthreats
Teardown: Fake Ransomware Targeting Ukrainian Government
Crypto.com Confirms Breach, Nearly $34 Million in Losses
3 Weeks, 6 Bugs: Experts Analyze, Advise on WordPress Flaws
From the Trenches: Remediating Widespread Apache Log4j Flaw
ISMG Editors: Will Ransomware Kill Cyber Insurance?
US Federal Reserve Issues Report on Digital Dollar
Twitter: Head of Security Reportedly Fired; CISO to Leave
FBI Warns of Cybercriminals Using QR Codes to Steal Funds
Microsoft Finds SolarWinds Vulnerability Amid Log4j Search
Report: DHS Fears Russian Cyberattack If US Acts on Ukraine
How Do You Detect - and Stop - Bank Identity Number Attacks?
'Email Security Doesn't Get the Attention It Deserves'
Ransomware Trends: Volume of Known Victims Remains Steady
US OMB Releases Zero Trust Strategy for Federal Agencies
Spotting Cybersecurity Gaps, Becoming More Systems-Focused
SEC Chair Seeks to 'Modernize' Cybersecurity Regulations
Report: Access Broker Exploiting VMware Log4j Vulnerability
ITRC: Identity Crime Predictions for 2022
Crypto Advocates Decry Bill That Could Ban Transactions
Cyberattack Spillover From Ukraine: Be Prepared, UK Warns
Flaw in Polkit's pkexec Puts Linux Users at Risk
ISMG Editors: Tough Lessons Learned From Log4j, Ransomware
Log4j Exploitations Have Slowed, But Attack Vectors Remain
DeFi Platform Qubit Finance Hacked for $80 Million
Trellix CEO Details Extended Detection and Response Moves
Lazarus Using Windows Update, GitHub to Deploy Malware
Report Details Russian Cyberespionage Efforts in Ukraine
Rust-Coded Malware Key Factor in BlackCat's Meteoric Rise
ITRC Data Breach Report Shows Surge in Data Compromises
Congressman Moves to Amend Controversial Crypto Measure
How Data Analytics Helps Fight Financial Crime
Russia's Escalation in Ukraine Sounds Cyber Defense Alarms
Log4j Puts Vulnerable Ubiquiti Network Applications at Risk
Perfis em Liderança: Allan Müller Buscarino
Wormhole Blockchain Bridge Exploited for Over $300 Million
India’s Annual Budget Calls for 30% Tax on Cryptocurrency
Buying Bot-Stolen Logs: Marketplaces Make It '2easy'
US DHS Establishes Cyber Safety Review Board
Enhancing the Cyber Resilience of Critical Infrastructure
M&A Roundup: Delinea Debuts, Forescout & Check Point Expand
Profiles in Leadership: Bradley Schaufenbuel
Profiles in Leadership: Cara Coleman
Profiles in Leadership: Jerich Beason
Eset Fixes Privilege Escalation Bug Affecting Windows Users
Cybercrime: Darknet Markets Live on, Even as Players Change
ISMG Editors: How Russian Cyber War Could Have Ripple Effect
Increasing Adoption of Phishing Kits Puts MFA at Risk
Cyberattack Cripples European Oil Port Terminals
$4.4 Million Stolen From Crypto Firm: Multi-Bridge Exploited
How Fraudsters Changed Their Synthetic Fraud Tactics
SecurityScorecard and LIFARS CEOs Discuss New Merger
Patch Tuesday: 51 MS Flaws Fixed - Important, Not Critical
HHS Warns Health Sector About LockBit 2.0 Threats - Again
Report: European Central Bank Warns Against Russian Hacking
Profiles in Leadership: Marene Allison
CERTs Urge Patching of Google Chrome, Android Flaws
US SEC Proposes 48-Hour Incident Reporting Requirement
US Lawmakers Continue Push for Stablecoin Regulations
Why It Was Important for IRS to Remove Facial Recognition
Cyber Agencies Warn: Ransomware Attacks Are Worse Than Ever
Sound Off: What Does the OMB Zero Trust Strategy Get Right?
ISMG Editors: Has Ransomware Group BlackMatter Rebooted?
How to Translate Business Challenges Into Tech Solutions
Russia Shutters 3 Carding Markets, Including Trump's Dumps
The Security Implications of Coinbase's Super Bowl Ad
BlockFi to Pay SEC, State Regulators $100M in Penalties
Crypto Exchange KLAYswap Loses $1.9M After BGP Hijack
9 Ransomware Trends: More Leaks, Higher Ransom Payments
Unpatched Zoho Bug Exploited in Red Cross Attack
The Curious Case of the Fake Ukrainian Ransomware Attack
Cloud Data Security - Why Now?
Inside Look at an Ugly Alleged Insider Data Breach Dispute
EU Privacy Watchdog Calls for Ban of NSO Group's Spyware
ACFE: Budget Constraints Stand in the Way of Data Analytics
ISMG Editors: Ransomware Trends - The Bad and the Ugly
Data Breach Trends: Global Count of Known Victims Increases
First National Cryptocurrency Enforcement Team Director Named
How Chinese, Russian Threat Actors Changed Tactics in 2021
Patched Adobe Commerce, Magento Last Week? Patch Again
Cybercrime Moves: Conti Ransomware Absorbs TrickBot Malware
Proof of Concept: Is the New Age of Cyber War Here?
Sound Off: A Post-Mortem on the Colonial Pipeline Attack
Russia Finalizes Draft of Digital Currency Laws
'Market-Nuking' Coinbase API Bug Halted New Trading Orders
EU Activates Cyber Rapid Response Team Amid Ukraine Crisis
Cryptocurrency Wallets Targeted by Alien Malware Variant
5 Held in Ukraine Over Phishing Scam With 70,000 Victims
Report: Ukrainian Government Prepared to Wipe Servers
Cyberattack Hits Ukrainian Government, Banking Websites
Why You Need Digital Trust to Enable Zero Trust
Cybersecurity: Think Critically and See the Whole System
New Malware in Russia-Linked Sandworm's Portfolio
Update: Asustor - How to Eliminate Deadbolt From NAS Devices
White House Denies Mulling Cyber Strikes on Russia
Russia-Ukraine Updates: Cybersecurity News Amid Conflict
Wiper Malware Attacks Have Not Escaped Ukrainian Networks
Sound Off: How Can Banks Prepare for Russia-Ukraine Crisis?
ISMG Editors: Government Special
Ukraine Reportedly Calls for Volunteer Cyberwarriors
Ukraine Invasion: What If US Strikes Back Against Russia?
Feds Advise 'Shields Up' as Russian Cyberattack Defense
How to Better Secure IoT Devices and Tech
Update: Cyber Hacktivists Target Belarus for Supporting Russia
Anonymous Extends Its Russian Cyberwar to State-Run Media
US Officials Tracking Russian Cyberattack Escalation Risk
US Senate Passes Incident Reporting, FISMA Update Bill
Russia-Ukraine Cryptocurrency Scams Detected by Researchers
Conti Gang Members Fretted Over Putin's Ukraine Invasion
US Senators Express Concern Over Russian Use of Crypto
Russia Lists 17,576 IPs Used in DDoS Attacks
US Officials Push Collaboration, AML Controls for Crypto
ISMG Editors: Are Hacktivists the New Resistance Fighters?
Perfis em Liderança: Claudio Benavente
How a Global Pandemic Changed the Fraud Landscape
Reports: White House Set to Issue Executive Order on Crypto
How Lapsus$ Uses Stolen Source Code to Disguise Malware
President Joe Biden Signs Executive Order on Cryptocurrency
Cryptocurrency Executive Order: 'It's a Clarion Call'
Proof of Concept: What's the Reality of Passwordless?
ISMG Editors: Cryptocurrency Special
US Nabs Alleged Ransomware Operators - One Tied to Kaseya
Sound Off: What's in OMB's Latest Cybersecurity Guidance?
Cybersecurity Picture Inside Russia Grows More Complicated
Building Threat Intelligence Capabilities in Wartime
Profiles in Leadership: Sunder Krishnan
US Congress Passes Cyber Incident Reporting Mandate
Anonymous Reportedly Hacks Russian Censorship Agency
Iranian APT: New Methods to Target Turkey, Arabian Peninsula
Russia's War Further Complicates Cybercrime Ransom Payments
Senators Request Briefing on Infrastructure Cybersecurity
Upcoming Executive Order on ID Theft: Key Points to Consider
Ukrainian Cyber Official Offers Update on 'IT Army'
Inside SentinelOne's Bid for Defense Firm Attivo Networks
ISMG Editors: Russia's War Changes Ransomware Landscape
Russia Says It's Seen 'Unprecedented' Level of Cyberattacks
Securing Industry 4.0: Insights From New Research
How Has COVID-19 Changed CISO Approach to Data Security?
Ransomware Alert: AvosLocker Hits Critical Infrastructure
Sound Off: What Gaps Must ID Theft Executive Order Address?
Illicit Crypto Activity Detected By US Treasury Department
Ukrainian IT Official: Russian Cyberattacks Have Continued
US Indicts Russian Behind Popular Carding Marketplace
Increased Enterprise Use of iOS, Mac Means More Malware
ISMG Editors: Russia-Ukraine War Cyber Escalation Fallout?
US, EU Agree to a New Data-Sharing Framework
Bill Touts CISA, HHS Teamwork to Aid Health Sector Security
Okta Breach Timeline, Attack Method Analyzed
Leading Teams to Understand Creative and Critical Thinking
Using Russian Security Software? UK Says Risks Have Changed
Ukraine Experiences Internet Outage - and Russia May, Too
Update: Crypto Hackers Exploit Ronin Network for $615 Million
Cybercrime-as-a-Service: The High Cost of Digital Transformation on Fraud
Update: Globant Says System Accessed by Unauthorized Actor
Viasat Traces Outage to Exploit of VPN Misconfiguration
Hackers Target Russian Federal Air Transport Agency
Survey: State of Security Automation in Financial Services
SpringShell, Spring Cloud Function Bugs Need Urgent Patching
ISMG Editors: Lessons to Learn From Okta's Breach Response
Profiles in Leadership: CIO Davanathan 'Devan' Naidoo
PCI SSC Releases Data Security Standard Version 4.0
Lazarus Using Trojanized DeFi App to Deliver Malware
Targeted Mailchimp Breach Affects Trezor Crypto Customers
Germany Shutters Russian Darknet Marketplace Hydra
Behind the Scenes of One of the Largest US Forfeiture Actions
Chinese APT Targets Global Firms in Monthslong Attack
How Identity Fraud Affects Financial Institutions
US Sanctions Darknet Market Hydra, Crypto Exchange Garantex
Tufin to Be Bought by PE Firm Turn/River Capital for $570M
$960K NFT Scam Affects Nearly 1,200 Victims
Identity Vendor BeyondTrust Promotes Janine Seebeck to CEO
DOJ Disrupts Russia-Linked APT's Malware, 'Cyclops Blink'
Proof of Concept: Dealing With the Regulation 'Tsunami'
Cash App Warns 8.2 Million Customers of Insider Breach
CrowdStrike, Microsoft, Trend Micro Top EDR Forrester Wave
New Fraud on the Block Causes Bank Losses to Rise
No Log4j, But Spring4Shell Exploitation Attempts Increase
ISMG Editors: Building Cybersecurity Defenses in Wartime
SEC Breach Disclosure Rule Makes CISOs Assess Damage Sooner
How to Maximize Application Intelligence
YouTube Scammers Made $1.6 Million in Fake Crypto Giveaway
Card-Not-Present Fraud and Scams: What Concerns Banks?
Identity Firm SailPoint to Be Bought by Thoma Bravo: $6.9B
Patch Tuesday to End; Microsoft Announces Windows Autopatch
Update: What's BlackCat Ransomware Been Up to Recently?
US Bank Regulator Weighs Stablecoin Risks and Benefits
Panasonic Breached Again; Conti Takes Responsibility
Joint Law Enforcement Operation Dismantles RaidForums
KKR Buys Barracuda from Thoma Bravo to Fuel XDR, SASE Growth
Trends in ISACA's Global State of Cybersecurity 2022 Report
Strategies to Modernize Ransomware Response
Patch Tues: Microsoft Releases Fixes for 145 Vulnerabilities
New Cobalt CEO Chris Manton-Jones Pursues Enterprise Clients
Premium Hikes Spur Improved US Cyber Insurance Loss Ratios
Feds Offer $5 Million to Help Disrupt North Korean Hackers
Observability Vendor Gigamon Promotes Shane Buckley to CEO
Profiles in Leadership: Octavia Howell
Okta: Hackers Accessed Just 2 Customer Tenants in Breach
Stablecoin Protocol Beanstalk Loses Millions in Attack
Crypto Firm Currency.com Mitigates DDoS Attack
Modern Bank Heists 5.0: 'The Escalation'
The Current OT/ICS Threat Landscape - Dragos' Annual Report
Who's Behind Attempt to Reboot REvil Ransomware Operation?
Leaks Fail to Dent Conti's Successful Ransomware Operation
ISMG Editors: The Complications of Regulating Spyware
Sophos Buys Startup SOC.OS to Spot Attacker Activity Sooner
Atlassian Patches Critical Jira Authentication Bypass Bug
FBI Alert: Have You Been Bitten by BlackCat Ransomware?
Synopsys, Checkmarx Top Gartner MQ for App Security Testing
SonarSource Raises $412M on $4.7B Valuation to Grow in Asia
Panel Discussion: Mapping the Zero Trust Journey
Ransom Payments: Monero Promises Privacy; Bitcoin Dominates
Emotet Returns With New Tricks Up Its Sleeve
Mandiant: Attackers' Median Dwell Time Drops to 3 Weeks
Why Are Fraud Executives Most Concerned About Synthetic ID Fraud?
Profiles in Leadership: Bruce Phillips
Feds Offer $10 Million Reward for Russia's Sandworm Hackers
Check Point Pursues More Business Outside Network Security
Understanding and Improving the SOC Analyst Experience
Cybercrime: Ransomware Attacks Surging Once Again
Minimizing Damage From Ransomware Attacks Requires Planning
ISMG Editors: Bitcoin or Monero - What Do Criminals Prefer?
Ukraine and Romania Suffer Large-Scale DDoS Attacks
Case Study: Where to Begin Your Zero Trust Journey
Update: KCC Resumes Operations Post-Ransomware Attack
Phisher Jailed After Tricking Pentagon Out of $24 Million
A $10 Million 'Bounty' for an $80 Million DeFi Attack
Is the Breach You Expect the Breach You're Going to Get?
Spain Says Top Government Officials Hit by Pegasus Spyware
NortonLifeLock Told to Pay Columbia $185M for Patent Theft
Mosyle Raises $196M to Strengthen Apple Security Platform
SEC Doubles Cyber Unit Staff to Protect Crypto Users
Tackling 2022's Emerging Social Engineering & Fraud Scams Plaguing Financial Services
Chinese APT Group Winnti Is Stealing Intellectual Property
Stock Sell-Off: Cloudflare, Rapid7, SentinelOne Hardest-Hit
Zero Trust, Cloud Adoption Drive Demand for Authorization
US Passes Law Requiring Better Cybercrime Data Collection
NIST Updates Guidance for Supply Chain Risk Management
ISMG Editors: Zero Trust Special
EU Grants Europol Supervised Data Processing Powers
Microsoft Unveils Services to Simplify Threat Hunting, XDR
First US Sanction of a Virtual Currency Mixer: Blender.io
Apple, Google, Microsoft Unite to Make Passwordless Easier
Feds Post $10 Million Reward for Conti Ransomware Actors
CERT-In's 6-Hour Mandate: How Practical Is It?
Mass Distribution of Self-Destructing Malware in Ukraine
Exploits Created for Critical Flaw in F5 Networks' BIG-IP
Beg, Borrow, Steal: Conti Leaks Reveal Ransomware Crossover
Abnormal Security Raises $210M to Push Beyond Email Defense
New LookingGlass CEO Bryan Ware to Diversify Customer Base
Hybrid War: 'It's Going to Get a Lot Worse'
Russia-Ukraine War: 7 Cybersecurity Lessons Learned
UK Proposes Regulations to Curb Illicit Use of Crypto
Material Security Raises $100M to Protect Sensitive Content
ISMG Editors: What Have We Learned From the Conti Leaks?
Post-Exploitation Framework Targets Microsoft Servers
Proof of Concept: Apple/Microsoft/Google Back Passwordless
EU Parliament, Council Agree on Cybersecurity Risk Framework
Google Unveils Service to Secure Open-Source Dependencies
Feds Say 'Multi-Tasking Doctor' Built Thanos Ransomware
Conti Claims It Has 'Insiders' in Costa Rican Government
CISA Removes Windows Flaw From Exploited Catalog List
Profiles in Leadership: Richard Rushing
Cryptocurrency-Stealing 'Cryware' Malware Attacks Surge
Five Eyes Alliance Advises on Top 10 Initial Attack Vectors
North Korean IT Workers Using US Salaries to Fund Nukes
Palo Alto CEO: Vendor Consolidation Is Fueling Our Growth
What Is Behind the Increase in Crypto Fraud?
Ransomware: What's Changed Since Colonial Pipeline Got Hit?
ISMG Editors: The Case of the 'Dr. Evil' of Ransomware
Tackling the Identity Verification Challenge
Proof of Concept: How Can We Improve Industry Collaboration?
Increase in Account Opening Fraud, Payment Scams Continues
Lacework Announces Layoffs 6 Months After Raising $1.3B
Broadcom Beefs Up Security Business With $61B VMware Buy
Twitter Fined $150M for Misusing Private Data to Sell Ads
Black Basta Claims Responsibility for AGCO Attack
Suspected Business Email Compromise Ringleader Busted
FBI: Russian Forums Sell Higher Education Credentials
CISA Adds 75 Flaws to Known Vulnerability Catalog in 3 Days
What Defenders Can Learn From History - and Martial Arts
Making Metrics More Meaningful for the Board
2022 Verizon Breach Report: Alarming Rise in Ransomware
Lookout Buys SaferPass to Help Carriers Manage Passwords
ISMG Editors: What's Hot at RSA Conference This Year?
FluBot Malware Strain Taken Down in Multi-Agency Effort
Unpatched Atlassian Confluence 0-Day Exploited in the Wild
US Government Warns Against Paying Ransom to Karakurt Group
Devo Raises $100M on $2B Valuation to Pursue Additional M&A
Atlassian Issues Patch for Critical Confluence Zero-Day
Government Agencies Seize Domains Used to Sell Credentials
Forescout to Buy Threat Detection and Response Vendor Cysiv
Attackers Use Clipminer Cryptominer to Rake in $1.7M
Cyber Threat Alliance at 5: Information Sharing Expands
Art Coviello on Market Trends, Emerging Tech
Difficulties in Sharing Risks with the Board
Demystifying Managed Detection and Response Services
Zero Trust: 'What Are You Trying to Protect?'
Cyberwarfare Strategy and How It Applies to Businesses
Why Adversaries Like Going After APIs - and How to Stop Them
Defending Against Major Nation-State Cyberattacks
Assessing Crypto and Third-Party Risks
The Path to a More Inclusive, Diverse Cyber Workforce
Profiles in Leadership: Caleb Sima
The Ever-Increasing Pressure to Develop Secure Code
Nikesh Arora on the Palo Alto Networks Growth Strategy
Profiles in Leadership: Rich Lindberg
Why CISO Is the Most Challenging Role in Cybersecurity
Profiles in Leadership: Chris Holden
What Cybersecurity Leaders Wish They Knew Before a Breach
Profiles in Leadership: Jeff Farinich
Overcoming Digital Challenges of OT Security
How to Mitigate and Manage Supply Chain Risks
Attracting and Training OT Professionals
Addressing the Talent Shortage
Maximizing Opportunities to Stop Ransomware Attacks
Alberto Yepez of Forgepoint Capital Shares 2022 Market View
Cybersecurity Education: The Imperative to Rethink Delivery
The Top 5 Security Practices With the Best Outcomes
Profiles in Leadership: Sean Mack
Assessing Threats Outside the Perimeter
Darknet Market Selling Social Security Numbers Is Shut Down
Security and User Experience: Critical Considerations
Expanding Beyond Cybersecurity to Take on Digital Trust
The Switzerland of Security: Why Being Independent Matters
Ransomware, Devices and the Impact in Healthcare
Watch Out for Cyber Insurance Caveats
Boosting Security Resilience and Defending the IT Ecosystem
Profiles in Leadership: Rob Hornbuckle
How Zero Trust Keeps Users, Applications and Data Protected
How Cloud Security Has Changed in the Age of COVID-19
The Biggest Security Threat to Company Data: Your Employees
Legal and Litigation Trends in 2022
How Can We Simplify Cyber Defense?
Challenges of Building a Global Security Program
Essential Steps for Building a Risk Management Program
Cuba Ransomware Is Back - With New Infection Techniques
Getting Ready for Software Bills of Material
Attack Paths: Just 4 Steps Can Compromise 94% of Assets
The Critical Role of Private-Public Cyber Collaboration
Profiles in Leadership: Ankit Patel
Visibility Into Distributed Cloud Environments
What Should Security Leaders Be Preparing for Now?
Looking Beyond Silicon Valley for Cybersecurity Talent
How Can We Fill the Cybersecurity Education Gap?
Are We on the Verge of Getting to Passwordless?
Despite Fervor for the Cloud, Here's Why Hybrid Is Forever
Envisioning a New Model for Information Sharing
Using Cyberthreat Intelligence to Keep Ahead of Adversaries
The Security Testing Imperative
4 Emerging Attack Techniques Cyber Adversaries Are Using
How CISOs Are Dealing With a Growing Digital Attack Surface
The Cybersecurity Dilemma for SMEs
How the Healthcare Sector Is Battling Top Threats
The Makings of a Million-Dollar Facebook Phishing Campaign
No Patch Yet For Follina And DogWalk Windows 0-Days
Partnering to Secure Industrial Infrastructure
Where Collaboration Works - and Where It Doesn't
OneTrust Lays Off 950 Due To 'Capital Markets Sentiment'
Rapid Cybersecurity Changes Demand Agile Education
How to Keep Business Flowing During a Ransomware Attack
RSA CEO Rohit Ghai: 'Disruptions Catalyze Transformation'
Cybercrime Deep Dive: Hydra Marketplace Takeaways
Russia Warns of Military Action If US Attacks Infrastructure
'When, Not If': Crafting Cyber Resilience Plans That Work
How to Ditch the Silo and Safeguard Medical Devices
How to Defend Critical Infrastructure Against New Threats
How Companies Can Defend a Rapidly Expanding SaaS Footprint
BlackCat Attacks University of Pisa, Demands $4.5M Ransom
Social Media and the Threat to Cybersecurity
Why Blockchain Is a Double-Edged Sword for Criminals
Ransomware Response Essential: Fixing Initial Access Vector
Tracking the Convergence of IT and OT in the Energy Sector
Cybersecurity Retention: Don't Forget the Fun Factor
How to Distinguish True Zero Trust From Imposters
Harnessing the Power of Open Source to Protect Networks
Move From a Reactive to a Proactive State With Intelligence
Responding to Federal Directives on Critical Infrastructure
BlackCat Extortion Technique: Public Access to Breached Data
Late Fix for Follina on Microsoft Patch Tuesday
Why Implementing Security Technology Is Such a Challenge
The Importance of Business-Critical Application Security
Cybersecurity Ethics: Artificial Intelligence Imperatives
What's Needed for Firms to Bring SASE and Zero Trust to Life
Russia's Cyber Offensive Against Ukraine Continues Nonstop
Conti Ransomware Group Explores Post-Encryption Future
Total Business Email Compromise Losses Trump Ransomware
Cyber Risk Quantification: The Quest for Transparency
Battling Ransomware: 'We're Targeting the Entire Ecosystem'
Threat Watch: Russia-Ukraine War Remains Top CISO Risk
Calling Cyber-Experienced Attorneys: Uncle Sam Needs You
Profiles in Leadership: John McClure
Hydra Darknet Market: Threat Intelligence Lessons Learned
Russia's Lie: It's Hardly Hitting Ukraine With Cyberattacks
Why Supply Chain Attackers Love Managed Service Providers
Unexpected Pairings: Wine Tasting and Threat Intelligence
Safeguarding the Enterprise Across Multiple Public Clouds
Rising Fraud in the Digital Age: Detect, Prevent and Respond
Hackers Clone Crypto Wallets to Steal Users' Funds
Why the Physical Russia-Ukraine War Might Become a Cyberwar
ISMG Editors: Are We Closing in on a Federal Privacy Law?
Why Zero-Day Attacks on Open-Source Libraries Are Surging
How Modern Tech Is Changing Vulnerabilities and Responses
How XDR Is Fulfilling the Promise That SIEM Never Did
The Evolution of Phishing From Email to SMS and Voice Hacks
The Push on Capitol Hill for Passwordless Authentication
Proposed SEC Rules Will Force Boards to Double Down on Cyber
Does Zero Trust Feel Too Overwhelming? Here's How to Start
New Android Trojan Targets Financial Institutions, Customers
The Future of Authentication Is Biometrics and Passwordless
Why Diversity Is the Defender's Greatest Weapon
Securing Digital Payments in the Future
The Criticality of Reporting Cybercrimes
Proof of Concept: The Corporate Risk of Using Social Media
Techniques to Improve Supply Chain Confidence
The State of Phishing and Email Security
How to Mitigate Emerging Security Threats Against the Cloud
How Security Risks Might Halt the Use of AI in Applications
How Ransomware Has Changed the Nature of Risk
Preparing for Retaliatory Attacks From Russia
Ping Identity Debuts $50M Venture Fund to Back IAM Startups
Russian Cyberattacks on Ukraine Underscored By Microsoft
ISMG Editors: When an Insider Threat Costs Millions
After Conti Ransomware Brand Retires, Spinoffs Carry On
Aura Lays Off 70 Staff After Raising $350M Over Past Year
Attackers Use Log4Shell to Hack Unpatched VMware Products
How to Implement PAM Across Multiple Companies
Horizon Offers $1M Bounty to Hackers Who Stole $100M
Latest Blow Falls on the 'Scourge of Passwords'
The Future of Corporate Network Security on the Internet
IronNet Lays Off 17% of Staff 10 Months After Going Public
Bridging the Divide Between Digitization and Cybersecurity
Strategies for Reskilling and Filling Cybersecurity Jobs
Mitigating the Impact of Ransomware With Data Science
Iranian Steelmaker Halts Production Following Cyberattack
Ransomware-as-a-Service Gang LockBit Has Bug Bounty Program
XM Cyber Buys Cyber Observer to Better Spot Cyber Exposures
Italian Watchdog Says Google Analytics a Privacy Violation
Bank of the West Customers Hit by ATM Skimmer Attack
How UK Cyber Security Council Is Addressing Cyber Skills Gap
FBI: Deepfake Fraudsters Applying for Remote Employment
CyGlass Separates From Nominet, Pursues XDR Partnerships
Russian Cyberattack on Ukrainian TV Channels Blocked
The Right Way to Change Your Identity Service Providers
Ukrainian Cops Arrest Phishing Gang That Stole $3.4 Million
Token Snags Ex-OneSpan Revenue Leader John Gunn as New CEO
North Korea Behind $100M Harmony Theft, Say Researchers
OpenSea Customer Emails Exposed in Third-Party Breach
Constant Vigilance Demanded - Cyber 'Not Just Another Risk'
Malware Disrupts Multiple US State Unemployment Websites
Okta to Spend $1M Helping Nonprofits Improve Their Security
Indian Stock Exchanges Have 6 Hours to Report Cyber Incident
US DOJ Targets Baller Ape Rug Pull and Other Crypto Fraud
Evilnum Hacking Group Updates TTPs Targeting Fintech
British Army's Twitter and YouTube Accounts Hijacked
Russian Hackers Target Private Ukrainian Energy Firm
Unknown Hacker Steals Data of 1 Billion Chinese Citizens
US, Israel Initiate Cybersecurity Collaboration Program
Profiles in Leadership: Deborah Haworth
Django Software Foundation Patches High-Severity Bug
US Government Picks Quantum-Resistant Encryption Algorithms
RSA Conference 2022 Compendium: 150+ Interviews and More
Swimlane Raises $70M to Grow Security Automation Outside US
Marriott Confirms Data Breach, Says Core Network Unaffected
Feds Warn Healthcare Sector of 'Maui' Ransomware Threats
IBM Buys Startup Databand.ai to Address Data Quality Issues
Pentagon Looking for a Few Good Hackers
Profiles in Leadership: Don Gibson
How the Threat Landscape Is Evolving
Security Awareness and Behavioral Change: What's Realistic?
FBI and MI5 Chiefs Issue Warning on China IP Theft
Apple Lockdown Mode Aims to Prevent State-Sponsored Spyware
SHI Malware Attack Knocks Website, Email Offline for Days
ISMG Editors: What's the Status of the SBOM?
Customer.io Email Data Breach Larger Than Just OpenSea
Ransomware Locks Indian Flood Monitors During Monsoon Season
Coalition Raises $250M on $5B Valuation to Fuel UK Expansion
Biden Order Seeks to Protect Reproductive Data Privacy
CEO Charged for Selling Fake Cisco Networking Equipment
Crema Finance Issues Recovery Plans After $8.8M Crypto Hack
Aerojet Rocketdyne Pays $9M to Settle Cybersecurity Lawsuit
Recorded Future Buys Hatching for More Malware Visibility
Puerto Rico Commits $7.6M to Boost Cybersecurity
Predatory Sparrow's Hacks: There's Smoke, There's Fire
India Calls for Stricter Actions Against Cybercriminals
Privitar Acquires Regulatory Intelligence Provider Kormoon
Fake Google Update Delivering HavanaCrypt Ransomware
Lithuanian Energy Firm Experiences DDoS
$8M of Crypto Stolen by Phishing From Uniswap Liquidity Pool
Search Here: Ransomware Groups Refine High-Pressure Tactics
July Patch Tuesday Fixes 1 Zero-Day, 84 Flaws
Deakin Uni Students Suffer Smishing Attack, Data Breach
Ex-CIA Employee Convicted in Theft of Covert Hacking Info
Microsoft Says Phishing Campaign Skirted MFA to Access Email
CyberArk Execs: 9 Bets on What's Next in Identity Security
At Half-Year Mark, Ransomware, Vendor Breaches Dominate
Synthetic ID Fraud: Continuous Monitoring Is the Key
ISMG Editors: Analyzing the Predatory Sparrow Attack
Navigating the Great Zero Trust Debate
Log4j Flaw Is 'Endemic,' Says Cyber Safety Review Board
Bishop Fox Raises $75M to Fortify Offensive Security Muscle
H0lyGh0st Ransomware Linked to North Korean Hackers
BlackCat Adds Brute Ratel Pentest Tool to Attack Arsenal
The Real-World Impact of Cyberattacks on Enterprises
Cyberattack Affects Albanian Government E-Services: Report
FCC Faces $3B Shortfall in Huawei Rip-and-Replace Program
Proof of Concept: A New Era for Digital Identity?
Hackers Steal $421K From Premint NFT Platform (UPDATE)
How Can We Get Better Visibility Into Data Breaches?
Thales Buys OneWelcome for $101.6M to Enter CIAM Market
US Cybersecurity Agency to Set Up Attache Office in London
Sophos X-Ops Debuts to Thwart Complex Cyberattacks
Online Travel Booking Website Probes 'Security Anomaly'
Major Takeaways: Cyber Operations During Russia-Ukraine War
DOJ Seizes $500,000 From North Korean Attacks on Healthcare
ePlus Acquires Future Com to Strengthen Security Operations
GPS Tracker Made in China Conduit for Vehicle Hacking
How Zero Trust Can Simplify Your Security Infrastructure
The Crucial Ingredients of a Good Cyber Resilience Program
Compromised Credentials Persist as Data Breaches' Root Cause
Romanian Who Allegedly Sold Malware Hosting Extradited to US
Latest HHS HIPAA Actions Spotlight 'Right of Access' - Again
State Elections Official Touts Bug Bounties for Voting Systems
Atlassian Fixes Critical Hard-Coded Credential Bug
Huntress Buys Security Training Provider Curricula for $22M
Settlements Reached In 2 Large Healthcare Hack Lawsuits
Blockchain Security Firm Halborn Raises $90M to Guard Crypto
US Cyber Command Says Malware Indicators Targeting Ukraine
Premint Fingers Open Source Flaw For NFT Hack
ISMG Editors: FBI Claws Back Crypto Ransoms to North Koreans
Cryptocurrency Insider Trading, Fraud in Feds' Crosshairs
Feds Warn Healthcare Sector of Web Application Attacks
Platform Security Firm SonicWall Promotes Sales Guru to CEO
Malware Attacks and Disinformation Campaigns Target Ukraine
$350 Million Settlement of T-Mobile Breach Lawsuits Proposed
MedusaLocker Server Likely Spotted in the Wild
Uber Admits Covering Up 2016 Data Breach, Avoids Prosecution
Early-Stage Startups Pump Brakes on Growth as Downturn Looms
TSA Issues New Cybersecurity Directive for Oil Pipelines
NIST Maps Cybersecurity Framework to HIPAA Security Rule
Thief Steals $6M Tokens From Audius, Sells Them for $1M
US Credit Unions to Come Under Cyber Incident Reporting Rule
Cyber Incident Cost $100 Million, Tenet Healthcare Reports
Titanium Blockchain CEO Convicted of $21 Million Fraud
Kaspersky Researchers Dissect Bootup Rootkit
Feds Double Reward for Tips on North Korean-Backed Actors
Human to Merge with PerimeterX to Thwart Bot Attacks, Fraud
Tech Alone Won't Defeat Advanced Spyware, US Congress Told
Keys to LockBit's Success: Self-Promotion, Technical Acumen
Profiles in Leadership: Fred Kwong
Profiles in Leadership: Shefali Mookencherry
Microsoft Denounces Advanced Spyware in Bid to Defuse It
Phishing-as-a-Service Platform Offers Cut-Rate Prices
ISMG Editors: Privacy Special With Lisa Sotto
Ukraine, US Sign Cybersecurity Pact
CyberArk, Delinea, One Identity Top Gartner MQ for PAM
Justice Department Probing 2020 Federal Court System Breach
Should US Banks Do More to Reduce APP Fraud?
Maintaining Momentum in Your Security Strategy
Weary Cybercriminals Turn to Cryptojacking Banks: Report
Check Point Execs: Supply Chain Woes Will Persist Into 2023
2 Vendor Hacks Affect Nearly 1.5 Million and Counting
New Survey Shows 6 Ways to Secure OT Systems
Crypto Bridge Nomad Loses $190M in Free-For-All Attack
Profiles in Leadership: John Rouffas
Profiles in Leadership: Ivan Milenkovic
New York Nabs $30M From Robinhood Crypto in Regulatory Fine
Netskope Expands Into Cloud Networking With Infiot Purchase
Big Clinic Breach Tied to Vendor's 2021 Ransomware Attack
Aetna Reports 326,000 Affected by Mailing Vendor Hack
OCC's Hsu Urges Multifactor Authentication
Hackers Steal $8M in Ongoing Attack on Solana Hot Wallets
Nomad Recovers $11M of $190M Stolen in Frenzied Attack
Proof of Concept: China's Threat to National Security
Dental Care Alliance Settles Breach Lawsuit for $3 Million
Pro-China Disinformation Campaign Traced to PR Firm
Fortinet Looks to Address Rising Costs With Price Increases
Seed Phrase Compromise May Have Caused Solana Wallets Drain
Neuro Practice Tells 363,000 That PHI Was Posted on Dark Web
Iranian Group Likely Behind Albanian Government Attack
India Government Withdraws Data Protection Bill
More Mobile Devices, More Problems, Security Survey Finds
ISMG Editors: Ransomware Groups Aiming for Smaller Targets
Nomad Entices Thieves of $190M Hack With Offer to Keep 10%
HHS HC3 Warns Healthcare of IoT Device, Open Web App Risks
Europe Gets a New DDoS Attack Record
James Foster on Taking ZeroFox Public in Hard Economic Times
Reports: NHS Dealing With IT Outages Due to Cyber Incident
FFIEC Solicits Comments on Cybersecurity Assessment Tool
US Gets Russian Accused of Crypto Laundering Extradited
How To Reduce Authorized Payment Fraud
Hatem Naguib on Charting Barracuda's New Course Under KKR
US Treasury Sanctions Tornado Cash, Freezes Its Assets
Beyond Security: Forrester's Bot Management Q2 Trends
Cyberattack on NHS Vendor Already Offering Critical Lessons
Sophos' Kris Hagerman on Powering Cybersecurity as a Service
Ransomware Leak Site Listings Invite Follow-On Attacks
Fresh Guilty Plea Follows Crackdown on BitMEX Exchange
OneTrust's Blake Brannon on Unifying Privacy and Governance
North Korean Cryptocurrency Hacking Poised to Get Even Worse
Ken Xie on Why Fortinet Is Leaning Into SD-WAN, OT Security
Aparna Rayasam on How Trellix Plans to Boost XDR Protection
Lacework's Kate MacLean on Securing Users Across Many Clouds
Patch Alert: Exploit Code Publicly Released for VMware Flaws
Black Hat 2022 Opens Today With Focus on Emerging Threats
Microsoft Patches 'DogWalk' Zero-Day in August Patch Tuesday
Hardware MFA Stops Attack on Cloudflare
Cisco Hacked: Firm Traces Intrusion to Initial Access Broker
Zero Trust: Incorporate Critical, Systems, Design Thinking
FTC Initiates Privacy and Data Security Rule-Making
Ransomware Attack Caused NHS IT Outage, Says Vendor
FTC Probes BitMart After $200M Theft at Crypto Exchange
Alleged Business Email Compromise Fraudsters Extradited
Ex-Twitter Employee Found Guilty of Spying for Saudi Arabia
ISMG Editors: Analyzing the Twilio Breach
Ransomware Groups Refine Shakedown and Monetization Models
Feds Warn Healthcare Entities of 'Evernote' Phishing Scheme
Lawmakers Request 'Urgent' Cyber Briefing With HHS Leaders
Lax Security Courts Liability, Says US CFPB
Updated Android Trojan Features Ransomware Capabilities
Suspected Tornado Cash Developer Accused of Money Laundering
Building Resilience in a Multi-Cloud Environment
ENISA Report: Threat Landscape for Ransomware Attacks
Finding the Balance to Tackle Business ID Theft
1,900 Signal Customers' Data Exposed in Twilio Hack
Thoma Bravo Eyes Darktrace Acquisition in Take-Private Spree
Are You Spending Too Much or Too Little on Security?
DigitalOcean Suspects Mailchimp Hack in Account Takeover
New SonicWall CEO Bob VanKirk on XDR, SASE & Going Upmarket
Cyber Standoff: 51 Groups Tied to Russia-Ukraine War Attacks
Ryuk-Linked Russian Pleads Not Guilty in US Court
Malwarebytes Cuts 14% of Staff to Narrow Focus on SMB
ISMG Editors: Plot Thickens for Crypto Mixer Tornado Cash
Social Media Account Hijacking Surge Tied to Banking Fraud
The Use of Cyber Power in Conflict
Mēris Botnet Likely Strikes Again in Attack Google Stopped
Scammers Piggyback on AWS to Phish Victims
Spanish-Language Trojan Targets Many Industry Verticals
Russia's APT29 Targeting Microsoft 365 Users
Zero Day in Bitcoin ATMs Exploited in a Crypto Heist
HHS HC3 Warns of Vishing, Other Social Engineering Scams
Proof of Concept: Key Steps for Improving OT Security
Twitter's Ex-Security Chief Files Whistleblower Complaint
How Criminals Are Weaponizing Leaked Ransomware Data
US CISA Warns of Bug in Palo Alto's Firewall Software
Hospitals in US, France Dealing With Cyber Extortionists
Vulnerable Hikvision Cameras Exposed Online
Ragnar Locker Likely Behind Attack on Greek Gas Operator
Iranian APT Group Charming Kitten Updates Malware Arsenal
Twilio and Mailchimp Breaches Tie to Massive Phishing Effort
Scripting Attacks on E-Commerce Sites Hit Ally Bank Accounts
As Attacks on Healthcare Continue, Feds Warn of New Threats
Block Faces Class Action Lawsuit over Data Breach
ISMG Editors: Implications of the Russia-Ukraine Hybrid War
Hacker Steals Source Code, Proprietary Data From LastPass
Malware Found In India Supreme Court Snooping Investigation
New MagicWeb AD Exploit Shows Value of Cloud, Zero Trust
Coinbase Faces Class Action Over Alleged Security Lapses
Ethereum Offers Up To $1M Bounty for Critical Bug Reports
Okta Customer Data Exposed via Phishing Attack on Twilio
FTC Sues Firm That Collects, Sells Sensitive Location Data
VMware Doubles Down on Multi-Cloud, Lateral Movement Defense
Printing Vendor's Breach Tally Soars to Nearly 2.7 Million
Chinese Phishing Campaign Targets Victims in South China Sea
Defining a New Vision for CREST
Survey: Cyber Professionals Want Remote Work Options
Cuba Ransomware Gang Takes Credit for Attacking Montenegro
CISA's Kiersten Todt on Heading Off Russia-Ukraine Fallout
Kurt Sanger on Using Laws and Norms to Govern Cyber Conflict
Feds Warn of Evil Corp Threats Facing Healthcare Sector
Russian Streaming Platform Start Suffers Data Breach
Business Email Compromise: Secret Service on How to Respond
Russia-Ukraine War: Role of Hacktivists Vastly Overestimated
Fortify Healthcare: Scaling Defenses in Age of Globalization
Profiles in Leadership: Errol Weiss
Evolving Your Security Strategy for the Challenges of 2022
Tenable CEO on What's New in Cyber Exposure Management
Profiles in Leadership: Anand Atre
Ex-Employee Alleges Health Entity Neglected Security
US House Democrats Push Meta On Sharing Abortion Data
How to Spot the Latest Tactics in Business ID Scams
OneCoin Cryptocurrency Scam Suspect Faces Extradition to US
The Network Pillar: Accelerating Zero Trust Adoption
Mastercard CSO on Partnerships and Workforce Development
Sound Off: Will Tornado Cash Sanctions Shake the DeFi World?
Proof of Concept: Twitter Security and Election Integrity
Clearwater Acquires CynergisTek to Protect Healthcare Firms
Report: Organ Transplant Data Security Needs Strengthening
Bill Bans Silicon Valley From Sharing Abortion Data
For Hire: Ex-Ubiquiti Developer Charged With Extortion
Courts May Decide If Lloyd's Must Cover Nation-State Attacks
Why Hacktivists Got Bored With the Russia-Ukraine Cyberwar
Chile Consumer Protection Agency Hit by Ransomware Attack
HelpSystems Buys Red-Teaming Firm for Offensive Security
San Francisco 49ers Cybersecurity Incident Affected 20,000
New SharkBot Trojan Spread Via Mobile Security Apps
Los Angeles School District Hit by Ransomware Attack
Mark McClain on What Thoma Bravo's Buy Means for SailPoint
China Accuses NSA of Spying on State Aeronautics University
Cymulate Raises $70M to Strengthen Security Posture Testing
CISA Warns of Contec Patient Monitoring Device Flaws
Smart Contract Auditing Firm Suffers Smart Contract Exploit
Iranian Threat Group Befriends Victims
Rubrik's Bipul Sinha on Surpassing $400M in Subscription ARR
Online Attack Disrupts InterContinental Hotels Group
Increasing Your Cyber Maturity Level on a Limited Budget
Bitwarden Raises $100M to Go Passwordless, Defend Developers
Albania Cuts Diplomatic Ties With Iran After Cyberattack
How 8 Countries Are Tackling Authorized Payment Fraud
Former Members of Conti Are Targeting Ukraine, Google Says
Tufin's Ruvi Kitov on What the Turn/River Capital Deal Means
Coinbase Bankrolls Lawsuit Fighting Tornado Cash Sanctions
Thoma Bravo, Darktrace Ax Deal Over Disagreement on Terms
US Law Enforcement Shutters Carder Marketplace
North Korea Avoids Tornado Cash After US Imposes Sanctions
Thief Steals $370,000 in Avalanche-Linked Flash Loan Attack
VMware's Tom Gillis on Preventing East-West Hacker Movement
ISMG Editors: Kicking the Criminals Out of Cryptocurrency
US Sanctions Iranian Spooks for Albania Cyberattack
Akamai, Cloudflare, Imperva Top App & API Defense Gartner MQ
$1.3 Million Stolen From New Free Dao in Flash Loan Attack
Latest Lazarus Campaign Targets Energy Companies
John Watters on Why Google and Mandiant Are Better Together
Google, Mandiant Begin Life Together After $5.4B Deal Closes
Albania Recovers From Second Iranian Cyberattack
NortonLifeLock-Avast Deal Done, Forming $3.5B Consumer Titan
Netskope CEO Sanjay Beri on Pushing Into SD-WAN, IoT Defense
California Prison System Says 236,000 Affected by Hack
Tesla Hack Could Allow Car Theft, Security Researchers Warn
Strike Force: Why Ransomware Groups Feel the Need for Speed
Ex-Twitter Security Honcho Peiter Zatko Faces Senate Panel
How to Create an Identity Strategy - Part 1
Feds Get 1st Guilty Plea in Coinbase Insider Trading Case
Hitachi Sells Identity Management Business to Volaris Group
How to Create an Identity Strategy - Part Two
How to Create an Identity Strategy - Part 3
Assessing the Security Risks of Emerging Tech in Healthcare
Apple Patches Zero-Day, Rolls Out iOS 16
US Indicts, Sanctions 3 Iranian Nationals for Ransomware
Fortanix Raises $90M in Goldman-Backed Funds to Secure Data
White House Fortifies Tech Vendor Security Requirements
FBI Warns of Cyberthreats to Legacy Medical Devices
Microsoft Fixes Actively Exploited Zero-Day, 63 Other Bugs
Global Open Internet Under Chinese Threat, US Lawmakers Hear
Sound Off: How Is SoftPOS Changing the Payments Landscape?
Pentagon Backs Call for Internet Routing Security Fixes
Check Point CEO Gil Shwed on Why Prevention Beats Detection
Sumo Logic CEO on Using Data to Improve Security Posture
Chinese State Hackers Unleash Linux Backdoor
EO Stresses Cybersec, Data Protection in Foreign Deal Review
IronNet Headed for Crash Amid Layoffs and Co-CEO Exit
Texas Hospital Still Struggling Through Ransomware Attack
Senators Seek HIPAA Changes to Protect Reproductive Info
CISA Plans Grants, Info-Sharing for Small OT Security Shops
LockerGoga Victims Get Free Decryptor; Police Recovered Keys
Biden Administration Vows Crackdown on Illicit Crypto
ISMG Editors: Ransomware Gangs Are Using Partial Encryption
How the FTC Is Sharpening Its Health Data Privacy Focus
SandboxAQ Buys Cryptosense to Fuel Post-Quantum Cryptography
Hacker Accessed LastPass Internal System for 4 Days
Ransomware-as-a-Service Gang LockBit Pays First $50K Bounty
Vista Equity Bids to Take KnowBe4 Private at $4.2B Valuation
Harassment Site Kiwi Farms Breached
FBI Warns Healthcare Sector of Surge in Payment Scams
What to Do Based on 2022: Expert Analysis of TPSRM Survey
The Growing Number of Use Cases for Verifiable Credentials
Proof of Concept: What CISOs Can Learn From Twitter and Uber
CrowdStrike to Buy Reposify to Secure Attack Surface, Assets
Uber Says Lapsus$ Hacker Breached Its Internal Systems
Hacker Plunders $160M From Crypto Market Maker Wintermute
HHS Slaps 3 Dental Practices With 'Right of Access' Fines
Deep Instinct Snags Former Palo Alto, Zscaler Exec as CEO
Digital Bank Revolut Confirms Customer Data Breach
Online Attack Disrupts Michigan School District for 2nd Day
SentinelOne's $100M Venture Capital Fund Seeks Data Startups
Medtronic Recalls Certain Insulin Pumps Due to Cyber Flaw
Wintermute CEO Renews Plea for Hacker to Return Stolen Funds
Public Water Systems at Cybersecurity Risk, Lawmakers Hear
Universities Urged to Defend Sensitive Research From Hackers
Darktrace's Nicole Eagan on How AI Predicts, Prevents Hacks
Iranian Hackers Accessed Albania's Network for 14 Months
Capital One Moves Past 2019 Hacking Incident
Hacks Spotlight PHI Risks For Ambulance Cos., Vendors
Malwarebytes Gets $100M Weeks After Laying Off 14% of Staff
Portuguese Airline Vows Defiance Against Extortion Hackers
Fortinet, VMware, Cisco Drive SD-WAN Gartner Magic Quadrant
ISMG Editors: How a Teen's Hack of Uber Adds to MFA Crisis
Sweepstakes Spam Hackers Used Microsoft Infrastructure