News

  • Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict

    The Russian invasion of Ukraine represents a new type of warfare, including extensive cyber and information operations Read More

    Read More

  • Rash of hacktivism incidents accompany Russia’s invasion of Ukraine

    In keeping with the hybrid nature of Russia’s invasion of Ukraine, several hacktivist groups and hackers have joined the fight in the embattled nation, including some hacktivists encouraged by the government of Ukraine itself. Although the hacktivists have been waging their version of cyber warfare mostly against Russian organizations, hacktivists sympathetic to Russia are also…

    Read More

  • Decrypting Hive Ransomware Data

    Nice piece of research: Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As data recovery is impossible if the encryption key is not obtained, some companies suffer from considerable damage, such as the payment of huge amounts of money…

    Read More

  • Why client-side web application security is critical to protecting from Magecart and other similar attacks

    What can’t you buy on the internet? Last-minute birthday gifts. Check. A new refrigerator. Check. An engagement ring. Check. Groceries. Check. Travel to foreign lands. Check. Internet-driven consumerism is a critical component of our economy. But it has its dark side filled with demons. And the demons—more commonly known as cybercriminals—who live in the murky,…

    Read More

  • 12 risk-based authentication tools compared

    Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and account takeovers have blossomed under the pandemic, RBA can become a key technology to protect corporate assets, particularly as remote work is more the rule than the exception. What is…

    Read More

  • 7 mistakes CISOs make when presenting to the board

    Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. This gives security leaders an opportunity to help senior business stakeholders better understand security’s value and makes them more likely to support and strengthen security strategies. However, talking to the board about cybersecurity in a way that is productive can be…

    Read More

  • Conti Encrypts Karma Ransom Note in Same Victim Network

    Two groups attacked same healthcare organization Read More

    Read More

  • Euro Police Bust Gang Linked to Migrant Smugglers

    Group was involved in disseminating counterfeit IDs, says Europol Read More

    Read More

  • Toyota Halts Production Across Japan After Ransomware Attack

    Outage hit key supplier, forcing carmaker to pull the plug Read More

    Read More

  • Indian enterprises struggle to hire IT workers for privacy roles

    Indian businesses are finding it difficult to hire the privacy professionals they need, not only in legal and compliance roles, but also in technical roles, according to a survey by ISACA, an association for IT audit, governance, risk, and information security professionals. ISACA found that 31% of Indian enterprises surveyed were understaffed for legal and…

    Read More