News
-
Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict
The Russian invasion of Ukraine represents a new type of warfare, including extensive cyber and information operations Read More
-
Rash of hacktivism incidents accompany Russia’s invasion of Ukraine
In keeping with the hybrid nature of Russia’s invasion of Ukraine, several hacktivist groups and hackers have joined the fight in the embattled nation, including some hacktivists encouraged by the government of Ukraine itself. Although the hacktivists have been waging their version of cyber warfare mostly against Russian organizations, hacktivists sympathetic to Russia are also…
-
Decrypting Hive Ransomware Data
Nice piece of research: Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As data recovery is impossible if the encryption key is not obtained, some companies suffer from considerable damage, such as the payment of huge amounts of money…
-
Why client-side web application security is critical to protecting from Magecart and other similar attacks
What can’t you buy on the internet? Last-minute birthday gifts. Check. A new refrigerator. Check. An engagement ring. Check. Groceries. Check. Travel to foreign lands. Check. Internet-driven consumerism is a critical component of our economy. But it has its dark side filled with demons. And the demons—more commonly known as cybercriminals—who live in the murky,…
-
12 risk-based authentication tools compared
Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and account takeovers have blossomed under the pandemic, RBA can become a key technology to protect corporate assets, particularly as remote work is more the rule than the exception. What is…
-
7 mistakes CISOs make when presenting to the board
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. This gives security leaders an opportunity to help senior business stakeholders better understand security’s value and makes them more likely to support and strengthen security strategies. However, talking to the board about cybersecurity in a way that is productive can be…
-
Conti Encrypts Karma Ransom Note in Same Victim Network
Two groups attacked same healthcare organization Read More
-
Euro Police Bust Gang Linked to Migrant Smugglers
Group was involved in disseminating counterfeit IDs, says Europol Read More
-
Toyota Halts Production Across Japan After Ransomware Attack
Outage hit key supplier, forcing carmaker to pull the plug Read More
-
Indian enterprises struggle to hire IT workers for privacy roles
Indian businesses are finding it difficult to hire the privacy professionals they need, not only in legal and compliance roles, but also in technical roles, according to a survey by ISACA, an association for IT audit, governance, risk, and information security professionals. ISACA found that 31% of Indian enterprises surveyed were understaffed for legal and…