Html Sitemap

Network Intrusion, Suspected Ransomware Attack at Fujifilm
Ransomware Industry Sees Three New Entrants
Scripps Health Attackers Stole PHI of 147,000 Patients
White House Urges Cybersecurity Boost: Business Reaction
White House Urges Businesses: Improve Ransomware Defenses
ISMG's Editors' Panel: US Election Security Lessons Learned
Where's the Beef? Ransomware Hit Highlights Cyber Problems
Cox Media Group Affiliates Go Offline
Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'
US Prosecutors Charge Latvian Woman in Trickbot Gang Case
Hospital Pays Ransom in Exchange for Promised Data Destruction
$2.3 Million of Colonial Pipeline Ransom Payment Recovered
Verizon Breach Report: Ransomware, Phishing and Top Trends
NCSC Warns of Surge in Ransomware Attacks Against Schools
CISA Expanding Mandatory Vulnerability Disclosure Program
Proposed Settlement in Nebraska Medicine Data Breach Lawsuit
Colonial CEO at Senate Hearing Details Ransomware Attack
House Probes Specifics of Colonial Ransomware Attack
Biden's Nominees Face Questions Over Cybersecurity Concerns
Groups Urge Biden, Congress to Bolster Health Sector Cyber
ISMG Editors' Panel: The FBI's Global Cryptophone Sting
How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?
House Oversight Committee Probing JBS Ransomware Payment
UK Plans for Enhanced Cybersecurity Role
Will Ransomware Attacks Push Congress to Enact Regs?
Fujifilm Reportedly Refused to Pay Ransom
The Best of Virtual RSA Conference 2021
NATO Endorses Cybersecurity Defense Policy
Ukraine Arrests 6 Clop Ransomware Operation Suspects
DHS Preparing More Cybersecurity Requirements for Pipelines
Analysis: The Cyber Impact of Biden/Putin Summit Meeting
ISMG Editors’ Panel: NATO's Cybersecurity Policy and More
Senate Approves Chris Inglis as National Cyber Director
Ransomware Operations 'Based on a Culture of Mistrust'
Ransomware: Strategies for Faster Detection and Response
Why Criminals Love Ransomware: In Their Own Words
Security Meets 'Work from Anywhere'
Senators Draft a Federal Breach Notification Bill
Fake DarkSide Ransomware Gang Targets Energy, Food Sectors
Ransomware Attack Compromises Fertility Patients' Records
Lawmakers Unveil Cybersecurity Legislation
Australia Considers Mandating Ransom Payment Reporting
EU Proposes Joint Cybersecurity Unit
Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity
Irish Ransomware Attack Recovery Cost Estimate: $600 Million
Repurposed REvil Ransomware Used in Attacks
Ransomware Attack on Eye Clinic Chain Affects 500,000
FBI Seeks Extra Funds to Fight Ransomware, Other Threats
Tulsa: Ransomware Attackers Leaked 18,000 Files
Binance Says It Helped With Clop Money Laundering Bust
DarkSide Created a Linux Version of Its Ransomware
Sizing Up the Security Features Slated for Windows 11
Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack
GAO: HHS Needs to Improve Cybersecurity Info-Sharing Efforts
Multinational Police Raid Seizes DoubleVPN Servers
ISMG Editors’ Panel: FBI Assessment of Cybersecurity Trends
REvil Target: University Medical Center of Southern Nevada
CISA Tool Helps Measure Readiness to Thwart Ransomware
REvil's Ransomware Success Formula: Constant Innovation
Hades Ransomware Has Targeted 7 Large Companies
The Executive Perspective Series featuring the White House Executive Order and More
CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices
Senate Bill Proposes Cyber Training for Federal Employees
Biden Orders Investigation of Kaseya Ransomware Attack
Kaseya Attack: REvil Offers $70 Million 'Universal Decryptor'
Kaseya: Up to 1,500 Organizations Hit in Ransomware Attack
Kaseya Sees Service Restoration Delay After Ransomware Hit
Kaseya Ransomware Attack: 'It Could Have Been Much Worse'
Kaseya Ransomware Attack: 'This Is a Dramatic Escalation'
Kaseya Raced to Patch Before Ransomware Disaster
Biden Faces Russian Ransomware Curtailment Challenge
Kaseya Announces New Service Restoration Date
List of Victims of Kaseya Ransomware Attack Grows
ISMG Editors’ Panel: Analysis of Kaseya Attack
Government Cybersecurity Summit: A Preview
Malspam Campaign Targets Kaseya Victims
CNA Discloses Breach Related to March Ransomware Attack
Interpol Calls for New Ransomware Mitigation Strategy
Kaseya Says Software Fully Patched After Ransomware Attack
Ransomware Landscape: REvil Is One of Many Operators
New 'Ransomwhere' Site Tracks Ransom Payments
US Senate Approves Jen Easterly as CISA Director
Guess Confirms Ransomware Attack and Data Breach
REvil's Infrastructure Goes Offline
Supply Chain Ransomware Breach Affects 1.2 Million
Constant Ransomware Business Refinements Boosting Profits
Dermatology Clinic Chain Breach Affects 2.4 Million
A 'First Responder' Approach to Cybersecurity
SonicWall Urges Patching of Devices to Ward Off Ransomware
ISMG Editors’ Panel: Challenges for New CISA Leader
How Mespinoza Ransomware Group Hits Targets
What's Next Step for REvil Ransomware Victims?
DOD and DHS Need More Collaboration on Cybersecurity Issues
US Blacklists 6 Russian Organizations Over Security Concerns
US: Chinese Government Waged Microsoft Exchange Attacks
Case Study: A REvil Ransom Negotiation
Law Firm Serving Fortune 500 Firms Hit by Ransomware
Can the US Curb China's Cyber Ambitions?
TSA Issues Cybersecurity Requirements for Pipelines
Incident Response: Why Persistence Is Vital
Senators Introduce Federal Breach Notification Bill
Kaseya Obtains Decryption Tool After REvil Ransomware Hit
Saudi Aramco Traces Data Leak to Attack on Supplier
ISMG Editors’ Panel: Examining the Pegasus Project
Kaseya Says It Paid No Ransom to Obtain Universal Decryptor
AvosLocker Ransomware Gang Recruiting Affiliates, Partners
Congress Urged to Update Federal Laws to Combat Ransomware
BlackMatter Ransomware Claims to Be Best of REvil, DarkSide
Measuring Success of 'No More Ransom' Project
9 Ransomware Enablers - And Tactics for Combating Them
Insurer: Size of Claims Paid for Ransomware Attacks Declines
ISMG Editors’ Panel: Ransomware Update
Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
Fighting Ransomware With ‘Zero Trust’ Model
Ransomware Attackers Eying 'Pure Data Leakage Model'
Ransomware Actors Set Up a Call Center to Lure Victims
Global Incident Response: The Rise of Integrity Attacks
UF Health Central Florida: Cyberattack Leads to PHI Breach
How to Keep Developer Secrets, Secret
2 Healthcare Systems Recovering From Cyberattacks
CISA's Easterly Unveils Joint Cyber Defense Collaborative
Is Darknet Forum Ransomware Chatter Ban Having an Impact?
ISMG Editors’ Panel: Government Cybersecurity Challenges
Countering Cyberthreats: 2 Legislative Proposals Introduced
Hackers Target Critical Infrastructure in Southeast Asia
BlackMatter Group Debuts Linux-Targeting Ransomware
Essential Steps for Battling Ransomware Attacks
10 Initial Access Broker Trends: Cybercrime Service Evolves
NIST Guidance Focuses on Creating 'Cyber Resiliency'
Conti Group Takes Advantage of Vulnerable Exchange Servers
REvil Decryption Key Posted on Cybercrime Forum
Accenture Hit by Apparent Ransomware Attack
'Chaos' Malware Builder Rapidly Evolving
Cyberspace Solarium Commission Offers Progress Assessment
Taiwan's Gigabyte Ransomware Attackers Threaten Data Leak
ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response
Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
Scripps Health Reports Financial Toll of Ransomware Attack
Cybercriminals Reportedly Created Blockchain Analytics Tool
Colonial Pipeline: Attack Exposed Personal Data
Memorial Health System in Ohio Latest to Be Hit With Attack
Ransomware Hits Brazilian National Treasury
Health Data Breach Tally Update: Ransomware Persists
Nigerian Gang Asks for Insider Help to Plant Ransomware
Ransomware: LockBit 2.0 Borrows Ryuk and Egregor's Tricks
ISMG Editors’ Panel: Fraud Trends
Insurer Tokio Marine Hit by Ransomware
Healthcare Organizations Mopping Up After Cyberattacks
CISA: Patching ProxyShell Flaws in Exchange Servers Is Urgent
Exposing Software Supply Chain Risks
ALTDOS Group Wages Attacks in Singapore
White House Tech Meeting: Focus on Critical Infrastructure
Profile in Leadership: Laura-Lea Berna, BC Transit
White House Unveils Supply Chain, New Security Initiatives
7 Emerging Ransomware Groups Practicing Double Extortion
After Ransomware Attack, When Must Patients Be Notified?
FBI Issues Alert on Hive Ransomware
Senator Seeks Input on Securing Crypto, Blockchain
Ransomware Attack on Swiss City Exposed Citizens' Data
Bangkok Airways Execs Apologize for Data Breach
CISA Warns of Holiday Ransomware Attacks
Attackers Keep Refining Business Email Compromise Schemes
Medical Group: 655,000 Affected by 'Network Outage' Breach
ISMG Editors’ Panel: New and Rebranded Ransomware Groups
LockFile Ransomware Using New Techniques to Evade Detection
White House Warns Of Cyberthreats Over Labor Day Weekend
Could Lessons From Plane Hijackings Help Fight Ransomware?
Conti Ransomware Threat Rising as Group Gains Affiliates
Irish Police 'Significantly Disrupt' Attackers' Operations
The Difference Between Espionage and Financial Breaches
Alleged Trickbot Developer Arrested in South Korea
Howard University Hit With Ransomware Attack
Resilience CEO on White House Meeting, Cyber Insurance
White House Pushing Federal Agencies Toward 'Zero Trust'
Groove Promises Maximum Profits for Ransomware Affiliates
National Cyber Director Sees Ransomware As Continuing Threat
Bitcoin Scam Run by Fake Exchange, Report Says
ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs
Pysa Ransomware Gang Targets Linux
Olympus: 'Potential Cyber Incident' Disrupted EMEA System
House Bill Seeks to Insulate CISA Director From Politics
HHS Warns Health Sector of BlackMatter Attacks
Top Initial Attack Vectors: Passwords, Bugs, Trickery
Clinic: EHR Data Too Damaged to Recover Post-Attack
Russia Has Taken No Action to Combat Ransomware, FBI Says
Lawsuit: Health System Failed to Heed Ransomware Warnings
WHEO Foundational Concept: Threat Intelligence Sharing to Drive Predictive Security
Profiles in Leadership: Amit Basu
Is Grief's Threat to Wipe Decryption Key Believable?
Effective Security Programs: Keeping Pace With Threats
Good News: REvil Ransomware Victims Get Free Decryptor
US Warns Nation-State Groups May Exploit Flaw in Zoho Tool
US to Unveil Sanctions on Use of Cryptocurrency for Ransoms
ISMG Editors’ Panel: Cyber Insurers and Ransomware Response
Mēris: How to Stop the Most Powerful Botnet on Record
CISA Must Update Critical Infrastructure Protection Plans
Ransomware Reportedly Hits Iowa Farm Services Cooperative
FBI Director Questioned Over Kaseya Decryption Key
How to Keep Cybercrime's Foot off the Pedal with the Auto Industry and ISO/SAE 21434
BlackMatter Knocks Marketron Off the Air
US Treasury Blacklists Russia-Based Crypto Exchange
US DHS, FBI Face Ransomware Questions from Congress
Conti Ransomware Attacks Surging, US Government Warns
Establishing Cybersecurity in the Era of Resilience
Work from Everywhere, Securely
Business Resilience Through ‘Zero Trust’
Ransomware: A Problem of Excesses
The Changing Face of Ransomware
Tamil Nadu Ransomware Attack Raises Resiliency Questions
ISMG Editors’ Panel: The Rise of Quadruple Extortion Attacks
Profiles in Leadership: Hadas Cassorla
Ransomware Attack Reportedly Cripples European Call Center
US Commerce Officials Seek Comment on IaaS Executive Order
Former DHS Official to Lead HHS' HIPAA Enforcement Agency
Ransomware, Vendor Breaches Spike on Federal Tally
Continuous Delivery Meets Continuous Security
Profiles in Leadership: Peter Gregory
Top Russian Cybersecurity CEO Charged with Treason
Securing Digital Transformation for Legacy Systems
New Legislation Eyes Both Ransom, Incident Reporting
Fraud Transformation: Balancing Business and Customer Needs
ISMG Editors’ Panel: Protecting Active Directory from Ransomware Attacks
Lawsuit: Hospital's Ransomware Attack Led to Baby's Death
President Biden Touts Cybersecurity Efforts
Ukraine Busts 2 Suspects Tied to Major Ransomware Group
Cyberattacks Disable IT Networks at 2 Indiana Hospitals
How Ransomware Attackers Hit Virtual Machine Hypervisors
Top US Cyber Officials Say Ransomware Is Here to Stay
Understanding the Real Threat of Ransomware
New Bill Would Require Ransom Disclosure Within 48 Hours
HHS Warns Healthcare Sector About LockBit 2.0 Threats
US DOJ to Fine Contractors for Failure to Report Incidents
ISMG Editors’ Panel: First Fatality Linked to Ransomware?
Analyzing the Results of the 2021 Cybersecurity Complexity Study, EU & UK
Nobelium Makes Russia Leader in Cyberattacks
Profiles in Leadership: Mustapha Kebbeh
Ransomware Attack Hits Engineering Giant Weir Group
Profiles in Leadership: Dr. Frances Undelikwo
Democratic Lawmakers Urge Agencies to Act on Ransomware
FIN12 Ransomware Attacks Aggressively Targeting Healthcare
Ransomware: No Decline in Victims Posted to Data Leak Sites
Fertility Testing Lab Says Ransomware Breach Affects 350,000
US Convenes Global Ransomware Summit Without Russia
BlackByte: Free Decryptor Released for Ransomware Strain
ISMG Editors' Panel: Are Our Systems Too Complex to Secure?
Ransomware Attack on Israeli Medical Center Raises Alarm
Treasury Department Tells Companies to Comply With Sanctions
Accenture: Ransomware Attack Breached Proprietary Data
Sinclair TV Stations Targeted in Weekend Ransomware Attack
Acer Taiwan and India Hit in 2nd and 3rd Attacks of 2021
Analysis: Top Ransomware Gangs Targeting Healthcare Sector
Positive Security: Inspiring Behavioral Change at Workplace
Preparing for Ransomware Attacks in the Education Sector
New Business Model: White Labeling of Ransomware
More Attempted Cyberattacks on Israeli Healthcare Entities
CISA Leader Backs 24-Hour Timeline for Incident Reporting
Ransomware: Average Ransom Payment Stays Steady at $140,000
House Passes Bills on Both Supply Chain, Telecom Security
REvil Revelations: Law Enforcement Behind Disruptions
FIN7 Sets Up Fake Pentesting Company Site to Recruit Talent
DarkSide Transfers $7 Million Worth of Bitcoin
Groove Operators Reportedly Ask Peers to Attack US
Defending Against Open-Source Supply Chain Attacks
The Need for Systems Thinking in Cybersecurity
REvil's Cybercrime Reputation in Tatters - Will It Reboot?
US State Department to Create Dedicated Cyber Office
PHI 'May Have Been Removed' in Vendor's Ransomware Attack
NRA Reportedly Hit By Russia-Linked Ransomware Attack
Keeping the US Dollar on Top as Cryptocurrency Rises
ISMG Editors' Panel: Solving the Ransomware Problem Together
Celebrities' Data Dumped on Darknet Site After Hack
Ransomware Evolves: Affiliates Set to Wield Greater Power
Reduce Security Risk of Healthcare Legacy Systems, Devices
CISA Begins Program to Identify Critical Infrastructure
California Clinic Network Cyber Incident Affects 656,000
US Treasury Department Says Stablecoins Must Be Regulated
7 Trends: How Ransomware Operations Continue to Evolve
Ransomware Incidents Among Largest Breaches on Federal Tally
FBI Warns of Ransomware Actors Leveraging M&A Data
BlackMatter Claims to Shut Ops; Experts Suspect Rebranding
ISMG Editors: CISA to Protect Critical Infrastructure
US DOJ: Continue to Expect Arrests, Ransom Payment Seizures
Law Enforcement Operation Targets Clop Ransomware
Secure the Changing Risk Landscape from BEC, Other Threats
REvil Ransomware Suspects Snared in Global Police Crackdown
Ransomware Actors May Have a New Broker on the Block
Black Shadow Group Leaks Israeli Patient Records, Data
Infrastructure Bill Features $1.9 Billion in Cyber Funding
Hive Threat Group Attacks MediaMarktSaturn, Demands Ransom
US Treasury Blacklists Cryptocurrency Exchange Chatex
Risk Quantification 101: Communicate Risk in Dollars and Cents
How to Stop a Potential Ransomware Attack Before it Happens
The Evolution of Privileged User Monitoring for Mainframes
The ROI of Shift-Left Automated Testing
Hackers Disrupt Canadian Healthcare and Steal Medical Data
Cybersecurity Leadership: Cut Through the Zero Trust Hype
OnDemand Webinar I Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About
VP Kamala Harris: US Will Join 80-Nation Cybersecurity Pact
Pace of Cybercrime Evolution Is Accelerating, Europol Warns
Russian National Charged With Laundering Ryuk Ransoms
How To Protect Sensitive Data From Ransomware in AWS
US, Israel Expand Cyber Partnership, Announce Task Force
Modern Threat Detection and Response: The Challenge
Money Laundering Cryptomixer Services Market to Criminals
Exploring Top Use Cases for Network Detection and Response
Exfiltration Breach, Ransomware Attack Affect 800,000
CISA Leader: 'We've Not Seen a Change' in Ransomware Attacks
How Behavioral Biometrics Can Tackle AML Fraud
Ransomware, Response Dominate Irish Cybercrime Conference
US, UK, Australia Issue Alert on Iranian APT Groups
Ransomware Attackers: 'No Days Off!'
ISMG Editors: Cyberspace Solarium Commission Updates
The Evolution of Bots
Cybersecurity Awareness 2021: #BeCyberSmart about Account Takeover Attackers
Breaking Down the Cloud Firewall
Rethinking Risk in the Wake of DDoS Extortion
Regulators: Banks Have 36 Hours to Report Cyber Incidents
NHS Denies Data Was Exposed in Stor-a-File Hack
US Cybersecurity Alert: Hackers Won't Respect Thanksgiving
Cryptocrimes Proliferate: Ransomware, New Threat Campaigns
Ransomware: How to Win the Battle
Ransomware: Best Practices for Negotiating a Ransom Payment
The Best Gift for the Holidays? An Incident Response Plan
Senate Considering Several Cyber Measures in Annual NDAA
FBI Seizes Bitcoins From Alleged REvil Ransomware Affiliate
ISMG Editors: Are We Close to Cracking Cybercrime Ecosystem?
Planned Parenthood LA Data Exfiltrated, 400,000 Affected
Incident Response: Best Practices in the Age of Ransomware
Ransomware Operations Double Down on Data Leak Sites
Arrest Points to Ubiquiti Breach Being an Inside Job
Going Inside the Mind of an Ethical Hacker
BIO-ISAC: Beware of Tardigrade Attacks on Biomanufacturers
TSA Issues New Cybersecurity Requirements for Rail Sector
Alert: 'Cuba' Ransomware Slams Critical Sector Organizations
CIAM: New Strategies to Optimize the Student Experience
Attack Wipes 25 Years' Worth of Data From Local Electric Co.
Maryland Health Dept. Systems Still Affected by Incident
ISMG's King Appointed to Forbes Technology Council
Nordic Choice Hotels, SPAR Stores Are Latest Attack Victims
Cyber Incident Reporting Mandate Excluded From Final NDAA
Emotet Tactic May Presage More Rapid Ransomware Infections
What Motivates a Cyber Threat Actor?
Ransomware, Other Big Incidents Added to Breach Tally
The State of Cyber Resilience: Faster Response Required
Australian Government Staff Data Leaked in 3rd-Party Breach
Hellman Worldwide Logistics: Operations Disrupted by Attack
Severe Apache Log4j Vulnerability Threatens Enterprise Apps
Report Dissects Conti Ransomware Attack on Ireland's HSE
Log4j: 'Vaccine' Released for Exploited Apache Zero-Day
Fraud: Shifting Landscape for State and Local Government
Already Compromised by Apache Log4j? Check Before You Patch
HR Platform UKG Says Cloud Solutions Hit With Ransomware
Virginia's Legislative Branch Hit With Ransomware Attack
Attackers Exploiting Apache Log4j: 'Everyone Is a Target'
Superior Plus is Latest Fuel Supplier Hit by Ransomware
How to Patch Log4j Now That Version 2.16 Has Been Released
Patch Tuesday: Microsoft Fixes Zero-Day Spreading Malware
Senate Passes $768 Billion NDAA With Cyber Provisions
White House Policy Gives Agencies 24 Hours to Report Attacks
Nation-State Attackers Wielding Log4j Against Targets
Log4j Updates: Flaw Challenges Global Security Leaders
The Challenge of Open-Source Software Security
ISMG Editors: Apache Log4j, Ransomware Updates
Apache Log4j: New Attack Vectors, Ransomware Seen
Time to Patch Log4j Again; Apache Releases 2.17 Fixing DoS
As Ransomware Variants Shift, Incidents 'Still on the Rise'
Irish Hospital, Texas Practice Deal with Attack Aftermath
Treasury Official Urges Congress to Regulate Stablecoins
Log4j: Belgian Defense Ministry Reports It Was 'Paralyzed'
The Need to Think Differently About Cybersecurity in 2022
Attack on Kronos Causes Sainsbury's Payroll System Outage
'Hack DHS' Program Expanded to Include Log4j Bug Hunters
Why We Need an Identity Data Fabric
ISMG Editors: Privacy Special
Ransomware's Threat to the Mainframe
CISA, International Partners Advise All Orgs to Patch Log4j
Learn Your Organization's Weaknesses Before the Criminals Do
Ransomware and the C-Suite: What Do Executives Want to Know?
Flaws in WordPress Plug-In Put 3 Million Websites at Risk
Layers of API Security and Log4j: Beyond the OWASP Top 10
Case Study: The Road to Zero Trust
Profiles in Leadership: Dennis Leber
French IT Services Firm Hit by Ransomware Attack
Shutterfly Acknowledges Hit by Ransomware Attack
Rook Uses Babuk's Leaked Code in Kazakh Bank Attacks
Zero Trust: John Kindervag's 2022 Outlook and Predictions
Biden Signs Into Law NDAA With Several Cyber Provisions
Apache's Log4j Version 2.17.1 Addresses New Flaw
Privacy Predictions for 2022: Laws, Flaws and Enforcement
Crypto Platform Suffers Log4j-Related Ransomware Attack
ISMG's Greatest Hits: Top Cybersecurity Stories of 2021
Ransomware Attack Forces Norway Newspaper to Shut Presses
ISMG Editors: 'Year in Review' Special
Cyber Regulation: Predictions for 2022
Vice Society: Ransomware Gang Disrupted Spar Stores
CISA, Vendors Refine Scanners for Log4j Vulnerabilities
Cryptocurrency Cybercrime Challenge: Curbing Illicit Use
Microsoft Exchange Fixes Disruptive 'Y2K22' Bug
Profiles in Leadership: Nilesh Roy
Microsoft: Log4j Exploit Attempts, Testing Remain Rampant
Where Are You in Your Zero Trust Journey?
Portugal's Major News Websites Remain Offline After Attacks
Senators Seek Clarity on DHS, DOT Cybersecurity Efforts
Mainframe DevOps: What Modernization Means
CISO Playbook: Log4j Response - What We Did, What We Learned
Google Buys Siemplify to Bolster Security Analytics Tools
EHR Vendor Breach Lawsuit Seeks Security Improvements
New Mexico County Hit by Suspected Ransomware Attack
Suspected Cryptocurrency 'Rug Pull' Nets Actors $10 Million
CISO Playbook: Log4j Response - Hard Work, Lasting Lessons
ISMG Editors: Secrets and Lies of Ransomware Operators
Balancing Employee Privacy and Security for Remote Workers
Researchers Discover H2 Database Flaw Similar to Log4Shell
Log4j: Sen. Peters Revisits Incident Reporting Legislation
QNAP Tells Users to Take Immediate Action to Stop Ransomware
Europol Ordered to Delete Data Not Tied to Investigations
CISA: Federal Response to Log4j Has Been 'Exceptional'
HHS Warns Healthcare Sector of Pysa Ransomware Threats
Lapsus$ Attacks Localiza, Redirects Users to Porn Site
Vendor: Data Breach Involved Security Product Vulnerability
US Warns of Russia-Backed Threat to Critical Infrastructure
Night Sky Ransomware Distributed via Log4j Exploits
Microsoft Patch Tuesday: An 'Unusually Large' Patch Release
Russian APTs: Why Stakes Are So High for Healthcare Sector
Report: DeFi Undermined by Centralization, Code Flaws
Ukraine Police Bust Ransomware Suspects Tied to 50 Attacks
Maryland Health Department Confirms Attack Was Ransomware
White House Hosts Open-Source Security Summit With Big Tech
Ukrainian Websites Defaced as Tensions With Russia Continue
Russia Arrests 14 Suspected REvil Ransomware Group Members
ISMG Editors: Is 2022 the Year of the SBOM?
Clinic Breach Affecting 200,000 Tied to Vendor's 2020 Attack
FCC Proposes Stricter Telecom Breach Notification Measures
Russia Charges 8 REvil Ransomware Suspects After Raids
Record Number of Major Health Data Breaches in 2021
Indian Fashion Retailer Data Leaked on Darknet Marketplace
EU's Cyber Rapid Response Team on Standby for Ukraine
New Chinese Threat Group Deals in Espionage and Theft
European Authorities Seize VPN Service Tied to Ransomware
Log4Shell Update: VMware Horizon Targeted
2 Key Cybersecurity Lawmakers Will Not Seek Reelection
UK Issues Fresh Proposals to Tackle Cyberthreats
Teardown: Fake Ransomware Targeting Ukrainian Government
HHS HC3: Healthcare Sector Remains at Risk for Log4j Attacks
From the Trenches: Remediating Widespread Apache Log4j Flaw
ISMG Editors: Will Ransomware Kill Cyber Insurance?
Federal Authorities, Patient Safety Experts Warn of Risks
Suspected REvil Ransomware Spinoff 'Ransom Cartel' Debuts
Microsoft Finds SolarWinds Vulnerability Amid Log4j Search
Report: DHS Fears Russian Cyberattack If US Acts on Ukraine
'Email Security Doesn't Get the Attention It Deserves'
US, NATO Discuss Ukrainian Cyber Aid Amid Tensions
Ransomware Trends: Volume of Known Victims Remains Steady
US OMB Releases Zero Trust Strategy for Federal Agencies
Kentucky Hospital Still Struggles One Week After Cyberattack
Spotting Cybersecurity Gaps, Becoming More Systems-Focused
Report: Access Broker Exploiting VMware Log4j Vulnerability
ITRC: Identity Crime Predictions for 2022
Lawsuit: 'Negligence' Led to Memorial Health System Attack
Crypto Advocates Decry Bill That Could Ban Transactions
Cyberattack Spillover From Ukraine: Be Prepared, UK Warns
ISMG Editors: Tough Lessons Learned From Log4j, Ransomware
New Ransomware Deadbolt Targets QNAP Devices
Log4j Exploitations Have Slowed, But Attack Vectors Remain
Trellix CEO Details Extended Detection and Response Moves
HHS HC3: BlackMatter Threat to Health Sector 'Reduced'
Report Details Russian Cyberespionage Efforts in Ukraine
Rust-Coded Malware Key Factor in BlackCat's Meteoric Rise
ITRC Data Breach Report Shows Surge in Data Compromises
EU Proposes a Joint Cyber Incident Coordination Framework
Russia's Escalation in Ukraine Sounds Cyber Defense Alarms
Log4j Puts Vulnerable Ubiquiti Network Applications at Risk
House Committee Advances FISMA Modernization Act
DOJ: Healthcare at Center of Biggest US Fraud Cases in 2021
Wormhole Blockchain Bridge Exploited for Over $300 Million
Buying Bot-Stolen Logs: Marketplaces Make It '2easy'
US DHS Establishes Cyber Safety Review Board
UK-Based KP Snacks Hit by Ransomware in 'Snack Attack'
Enhancing the Cyber Resilience of Critical Infrastructure
M&A Roundup: Delinea Debuts, Forescout & Check Point Expand
Profiles in Leadership: Bradley Schaufenbuel
Profiles in Leadership: Cara Coleman
Profiles in Leadership: Jerich Beason
Cybercrime: Darknet Markets Live on, Even as Players Change
ISMG Editors: How Russian Cyber War Could Have Ripple Effect
Court Recommends Dismissal of Practicefirst Breach Lawsuit
Cyberattack Cripples European Oil Port Terminals
Ransomware Attack on Swissport Is Contained, Company Says
Hospital, Health Department Still Recovering From Attacks
SecurityScorecard and LIFARS CEOs Discuss New Merger
HHS Warns Health Sector About LockBit 2.0 Threats - Again
Report: European Central Bank Warns Against Russian Hacking
Profiles in Leadership: Marene Allison
US SEC Proposes 48-Hour Incident Reporting Requirement
Cyber Agencies Warn: Ransomware Attacks Are Worse Than Ever
Sound Off: What Does the OMB Zero Trust Strategy Get Right?
ISMG Editors: Has Ransomware Group BlackMatter Rebooted?
How to Translate Business Challenges Into Tech Solutions
Russia Shutters 3 Carding Markets, Including Trump's Dumps
Why Ransomware Groups Such as BlackCat Are Turning to Rust
BlackByte Ransomware Hits San Francisco 49ers' IT Systems
CISA Warns Orgs to Prep for Potential Russian Cyberattacks
9 Ransomware Trends: More Leaks, Higher Ransom Payments
The Curious Case of the Fake Ukrainian Ransomware Attack
Analyzing the Popularity of Malware-Free Cyberattacks
Aviation Attacks Tied To Single APT - TA2541
Experts Outline Chinese Cyberwarfare Tactics, Motivations
2 Vendor Hacking Incidents Affect Over 600,000 Individuals
ISMG Editors: Ransomware Trends - The Bad and the Ugly
Data Breach Trends: Global Count of Known Victims Increases
HHS Warns of Threats to Electronic Health Records
Ransomware: 3 Key Tactics for Defense, Detection, Response
How Chinese, Russian Threat Actors Changed Tactics in 2021
Cybercrime Moves: Conti Ransomware Absorbs TrickBot Malware
Proof of Concept: Is the New Age of Cyber War Here?
Sound Off: A Post-Mortem on the Colonial Pipeline Attack
Hacks Causing Most Big Health Data Breaches So Far in 2022
Why You Need Digital Trust to Enable Zero Trust
Cybersecurity: Think Critically and See the Whole System
Update: Asustor - How to Eliminate Deadbolt From NAS Devices
Ransomware Attack: Ireland's Cleanup Costs Hit $48 Million
White House Denies Mulling Cyber Strikes on Russia
Russia-Ukraine War: Threats Facing the Healthcare Sector
Russia-Ukraine Updates: Cybersecurity News Amid Conflict
Wiper Malware Attacks Have Not Escaped Ukrainian Networks
Sound Off: How Can Banks Prepare for Russia-Ukraine Crisis?
ISMG Editors: Government Special
Ukraine Reportedly Calls for Volunteer Cyberwarriors
Ukraine Invasion: What If US Strikes Back Against Russia?
Feds Advise 'Shields Up' as Russian Cyberattack Defense
How to Better Secure IoT Devices and Tech
Update: Cyber Hacktivists Target Belarus for Supporting Russia
Anonymous Extends Its Russian Cyberwar to State-Run Media
How Lapsus$ Data Leak May Affect Nvidia and Its Customers
US Officials Tracking Russian Cyberattack Escalation Risk
HHS OCR Outlines Top HIPAA Enforcement, Rule-Making Plans
Feds Warn Health Sector of Russia-Ukraine Conflict Threats
Ransomware & Cryptojacking: Predictions for Year Ahead
US Senate Passes Incident Reporting, FISMA Update Bill
Mon Health Reports Breach Soon After Phishing Incident
Conti Gang Members Fretted Over Putin's Ukraine Invasion
How the Senate's Cyber Bill Could Affect Health Sector
Russia Lists 17,576 IPs Used in DDoS Attacks
ISMG Editors: Are Hacktivists the New Resistance Fighters?
Update: Samsung Confirms Source Code Stolen in Breach
Dayslong DDoS Attack With Embedded Ransom Note Mitigated
Federal Report Offers Healthcare Cyberattack Trend Insights
Perfis em Liderança: Claudio Benavente
How a Global Pandemic Changed the Fraud Landscape
Ransomware Groups Target Global Critical Infrastructure
How Lapsus$ Uses Stolen Source Code to Disguise Malware
President Joe Biden Signs Executive Order on Cryptocurrency
2 Healthcare Hacking Incidents Affect 310,000 Patients
Cryptocurrency Executive Order: 'It's a Clarion Call'
Proof of Concept: What's the Reality of Passwordless?
ISMG Editors: Cryptocurrency Special
US Nabs Alleged Ransomware Operators - One Tied to Kaseya
Sound Off: What's in OMB's Latest Cybersecurity Guidance?
Cybersecurity Picture Inside Russia Grows More Complicated
Building Threat Intelligence Capabilities in Wartime
Profiles in Leadership: Sunder Krishnan
Why Identity and Access Management Is Weak in Healthcare
US Congress Passes Cyber Incident Reporting Mandate
Anonymous Reportedly Hacks Russian Censorship Agency
Iranian APT: New Methods to Target Turkey, Arabian Peninsula
Russia's War Further Complicates Cybercrime Ransom Payments
Toyota Parts Supplier Denso Confirms Ransomware Attack
Top Cyber Officials Say Russians May Yet Escalate Cyberwar
Tennessee Pediatric Hospital Responding to Cyber Incident
Ukrainian Cyber Official Offers Update on 'IT Army'
Critical Steps: Applying Threat Modeling to Medical Devices
COVID-19: Battling Changing Healthcare Cyberthreats
2022 Proofpoint State of the Phish
ISMG Editors: Russia's War Changes Ransomware Landscape
Bank on Seeing More Targeted Attacks on Financial Services
HHS: Health Sector Should Prepare for Russia-Ukraine Threats
Russia Says It's Seen 'Unprecedented' Level of Cyberattacks
Google Exposes Initial Access Broker Ties to Ransomware
Securing Industry 4.0: Insights From New Research
How Has COVID-19 Changed CISO Approach to Data Security?
Ransomware Alert: AvosLocker Hits Critical Infrastructure
Sound Off: What Gaps Must ID Theft Executive Order Address?
NRA Finally Confirms Ransomware Attack From 2021
'Official Dentist' of NBA Team Says Hack Affected 1 Million
Okta, Microsoft Confirm Breaches Connected to Lapsus$ Hack
RansomEXX Disrupts Scottish Association for Mental Health
Ransomware Attack Disrupts Greek Postal Services
2 Latest Health Data Hacks Affect Over 200,000 Individuals
Ukrainian IT Official: Russian Cyberattacks Have Continued
HHS OCR Tally Analysis: Breaches, Affected Individuals Surge
Increased Enterprise Use of iOS, Mac Means More Malware
ISMG Editors: Russia-Ukraine War Cyber Escalation Fallout?
US, EU Agree to a New Data-Sharing Framework
Estonian Ransomware Operator Gets 66-Month Sentence
FCC Adds Kaspersky, Chinese Telecoms to High-Risk Companies
Bill Touts CISA, HHS Teamwork to Aid Health Sector Security
Okta Breach Timeline, Attack Method Analyzed
Leading Teams to Understand Creative and Critical Thinking
Using Russian Security Software? UK Says Risks Have Changed
Ukraine Experiences Internet Outage - and Russia May, Too
Update: Globant Says System Accessed by Unauthorized Actor
Viasat Traces Outage to Exploit of VPN Misconfiguration
Partnership HealthPlan of California IT Systems Still Down
Hackers Target Russian Federal Air Transport Agency
Survey: State of Security Automation in Financial Services
State-Sponsored Actors Using Russia-Ukraine War for Phishing
SpringShell, Spring Cloud Function Bugs Need Urgent Patching
Breach Reports Show Diversity of Healthcare Cyber Targets
ISMG Editors: Lessons to Learn From Okta's Breach Response
Profiles in Leadership: CIO Davanathan 'Devan' Naidoo
US Sanctions Darknet Market Hydra, Crypto Exchange Garantex
Identity Vendor BeyondTrust Promotes Janine Seebeck to CEO
Proof of Concept: Dealing With the Regulation 'Tsunami'
No Log4j, But Spring4Shell Exploitation Attempts Increase
ISMG Editors: Building Cybersecurity Defenses in Wartime
Big Hacks: 5 Health Data Breaches Affect 1.2 Million
SEC Breach Disclosure Rule Makes CISOs Assess Damage Sooner
The Power and Scale of XDR
How to Maximize Application Intelligence
Patch Tuesday to End; Microsoft Announces Windows Autopatch
Update: What's BlackCat Ransomware Been Up to Recently?
HHS HC3: Beware of Lapsus$, Email Marketing-Related Threats
Panasonic Breached Again; Conti Takes Responsibility
Russia-Linked Sandworm Attacks Ukrainian Energy Facility
KKR Buys Barracuda from Thoma Bravo to Fuel XDR, SASE Growth
Trends in ISACA's Global State of Cybersecurity 2022 Report
Strategies to Modernize Ransomware Response
Patch Tues: Microsoft Releases Fixes for 145 Vulnerabilities
New Cobalt CEO Chris Manton-Jones Pursues Enterprise Clients
Microsoft Disrupts ZLoader Botnet in Global Operation
Premium Hikes Spur Improved US Cyber Insurance Loss Ratios
Feds Offer $5 Million to Help Disrupt North Korean Hackers
Conti Claims Responsibility for Nordex Breach
Observability Vendor Gigamon Promotes Shane Buckley to CEO
Profiles in Leadership: Octavia Howell
HHS HC3 Warns Healthcare Sector of Hive Threats
Modern Bank Heists 5.0: 'The Escalation'
The Current OT/ICS Threat Landscape - Dragos' Annual Report
Who's Behind Attempt to Reboot REvil Ransomware Operation?
Leaks Fail to Dent Conti's Successful Ransomware Operation
Conti Ransomware Targets Costa Rican Government Entities
Five Eyes Warns of Russian Hacks on Critical Infrastructure
ISMG Editors: The Complications of Regulating Spyware
LemonDuck Malware Evolves Into Major Cryptomining Botnet
Sophos Buys Startup SOC.OS to Spot Attacker Activity Sooner
FBI Alert: Have You Been Bitten by BlackCat Ransomware?
Synopsys, Checkmarx Top Gartner MQ for App Security Testing
SonarSource Raises $412M on $4.7B Valuation to Grow in Asia
Panel Discussion: Mapping the Zero Trust Journey
Ransom Payments: Monero Promises Privacy; Bitcoin Dominates
Emotet Returns With New Tricks Up Its Sleeve
Mandiant: Attackers' Median Dwell Time Drops to 3 Weeks
Coca-Cola Investigating Data Breach Claim
Feds Offer $10 Million Reward for Russia's Sandworm Hackers
American Dental Association Hit by Disruptive Cyber Incident
Check Point Pursues More Business Outside Network Security
Understanding and Improving the SOC Analyst Experience
Cybercrime: Ransomware Attacks Surging Once Again
More Major Hacking Incidents Added to HHS Breach Tally
Battling Ransomware in Healthcare
Minimizing Damage From Ransomware Attacks Requires Planning
ISMG Editors: Bitcoin or Monero - What Do Criminals Prefer?
India to Set 6-Hour Breach Reporting Requirement
Latest Attacks Target Entities Handling Sensitive Data
New US Breach Reporting Rules for Banks Take Effect May 1
Ukraine and Romania Suffer Large-Scale DDoS Attacks
Case Study: Where to Begin Your Zero Trust Journey
Update: KCC Resumes Operations Post-Ransomware Attack
How Russia-Ukraine Is Intensifying Healthcare Cyber Worries
Is the Breach You Expect the Breach You're Going to Get?
NortonLifeLock Told to Pay Columbia $185M for Patent Theft
Mosyle Raises $196M to Strengthen Apple Security Platform
Chinese APT Group Winnti Is Stealing Intellectual Property
Stock Sell-Off: Cloudflare, Rapid7, SentinelOne Hardest-Hit
US Passes Law Requiring Better Cybercrime Data Collection
NIST Updates Guidance for Supply Chain Risk Management
ISMG Editors: Zero Trust Special
EU Grants Europol Supervised Data Processing Powers
Strategies to Build Long-Term Cyber Resilience
The Evolving Ransomware Trends in the Healthcare Sector
Microsoft Unveils Services to Simplify Threat Hunting, XDR
First US Sanction of a Virtual Currency Mixer: Blender.io
Apple, Google, Microsoft Unite to Make Passwordless Easier
Feds Post $10 Million Reward for Conti Ransomware Actors
CERT-In's 6-Hour Mandate: How Practical Is It?
Mass Distribution of Self-Destructing Malware in Ukraine
Exploits Created for Critical Flaw in F5 Networks' BIG-IP
Beg, Borrow, Steal: Conti Leaks Reveal Ransomware Crossover
Abnormal Security Raises $210M to Push Beyond Email Defense
UK Intelligence Chief Details Cybercrime Disruption Efforts
Colonial Pipeline May Have to Pay Fine of Nearly $1 Million
College Shuts Down Due to Cost of Ransomware Attack
New LookingGlass CEO Bryan Ware to Diversify Customer Base
Hybrid War: 'It's Going to Get a Lot Worse'
Russia-Ukraine War: 7 Cybersecurity Lessons Learned
Vendor's Ransomware Attack Is Latest Supply Chain Warning
UK Proposes Regulations to Curb Illicit Use of Crypto
Material Security Raises $100M to Protect Sensitive Content
Cloud-Based EHR Vendor Hack Affects Eye Care Practices
Proof of Concept: Crypto - A New National Security Threat
ISMG Editors: What Have We Learned From the Conti Leaks?
Proof of Concept: Apple/Microsoft/Google Back Passwordless
EU Parliament, Council Agree on Cybersecurity Risk Framework
Closing the Gaps in Ransomware Prevention Strategies
AvosLocker Claims Data Theft From Another Healthcare Entity
Google Unveils Service to Secure Open-Source Dependencies
Feds Say 'Multi-Tasking Doctor' Built Thanos Ransomware
Conti Claims It Has 'Insiders' in Costa Rican Government
Profiles in Leadership: Richard Rushing
Cryptocurrency-Stealing 'Cryware' Malware Attacks Surge
Five Eyes Alliance Advises on Top 10 Initial Attack Vectors
North Korean IT Workers Using US Salaries to Fund Nukes
Ransomware Attack Vectors: RDP and Phishing Still Dominate
2 Health Plans Report Major Breaches Following Attacks
Palo Alto CEO: Vendor Consolidation Is Fueling Our Growth
Ransomware: What's Changed Since Colonial Pipeline Got Hit?
ISMG Editors: The Case of the 'Dr. Evil' of Ransomware
Feds Warn Health Sector of Top Russia-Backed APT Groups
Tackling the Identity Verification Challenge
Proof of Concept: How Can We Improve Industry Collaboration?
US Sets Up Multiagency Initiatives to Curb Ransomware
Attempted Ransomware Attack Grounds SpiceJet Flights
13% Spike in Ransomware Is Biggest in 5 Years
Lacework Announces Layoffs 6 Months After Raising $1.3B
Broadcom Beefs Up Security Business With $61B VMware Buy
Black Basta Claims Responsibility for AGCO Attack
Ransomware Costs City of Quincy, Illinois, $650,000
ISMG Editors: London Summit Highlights
FBI: Russian Forums Sell Higher Education Credentials
CISA Adds 75 Flaws to Known Vulnerability Catalog in 3 Days
Ransomware Gang Demands $5M From Austrian State Carinthia
Held to Ransom: 1,200 Unsecured Elasticsearch Databases
What Defenders Can Learn From History - and Martial Arts
Making Metrics More Meaningful for the Board
Carinthia, Austria Approves Ransomware Recovery Plans
2022 Verizon Breach Report: Alarming Rise in Ransomware
Lookout Buys SaferPass to Help Carriers Manage Passwords
ISMG Editors: What's Hot at RSA Conference This Year?
Unpatched Atlassian Confluence 0-Day Exploited in the Wild
US Government Warns Against Paying Ransom to Karakurt Group
Atlassian Issues Patch for Critical Confluence Zero-Day
Forescout to Buy Threat Detection and Response Vendor Cysiv
Hackers Claim Drug Data Theft as Reports Warn Health Sector
Cyber Threat Alliance at 5: Information Sharing Expands
Art Coviello on Market Trends, Emerging Tech
Demystifying Managed Detection and Response Services
Zero Trust: 'What Are You Trying to Protect?'
Cyberwarfare Strategy and How It Applies to Businesses
Why Adversaries Like Going After APIs - and How to Stop Them
Defending Against Major Nation-State Cyberattacks
The Path to a More Inclusive, Diverse Cyber Workforce
Profiles in Leadership: Caleb Sima
Palermo Municipality Cyberattack Still Affecting Citizens
The Ever-Increasing Pressure to Develop Secure Code
Nikesh Arora on the Palo Alto Networks Growth Strategy
Profiles in Leadership: Rich Lindberg
Why CISO Is the Most Challenging Role in Cybersecurity
Profiles in Leadership: Chris Holden
What Cybersecurity Leaders Wish They Knew Before a Breach
Profiles in Leadership: Jeff Farinich
Addressing the Talent Shortage
Maximizing Opportunities to Stop Ransomware Attacks
Alberto Yepez of Forgepoint Capital Shares 2022 Market View
Cybersecurity Education: The Imperative to Rethink Delivery
The Top 5 Security Practices With the Best Outcomes
Profiles in Leadership: Sean Mack
Assessing Threats Outside the Perimeter
Darknet Market Selling Social Security Numbers Is Shut Down
Security and User Experience: Critical Considerations
Expanding Beyond Cybersecurity to Take on Digital Trust
The Switzerland of Security: Why Being Independent Matters
Ransomware, Devices and the Impact in Healthcare
Watch Out for Cyber Insurance Caveats
Boosting Security Resilience and Defending the IT Ecosystem
Profiles in Leadership: Rob Hornbuckle
How Zero Trust Keeps Users, Applications and Data Protected
How Cloud Security Has Changed in the Age of COVID-19
The Biggest Security Threat to Company Data: Your Employees
Legal and Litigation Trends in 2022
How Can We Simplify Cyber Defense?
Challenges of Building a Global Security Program
Essential Steps for Building a Risk Management Program
Cuba Ransomware Is Back - With New Infection Techniques
Getting Ready for Software Bills of Material
Attack Paths: Just 4 Steps Can Compromise 94% of Assets
The Critical Role of Private-Public Cyber Collaboration
Profiles in Leadership: Ankit Patel
Visibility Into Distributed Cloud Environments
What Should Security Leaders Be Preparing for Now?
Looking Beyond Silicon Valley for Cybersecurity Talent
How Can We Fill the Cybersecurity Education Gap?
Are We on the Verge of Getting to Passwordless?
Despite Fervor for the Cloud, Here's Why Hybrid Is Forever
Envisioning a New Model for Information Sharing
Using Cyberthreat Intelligence to Keep Ahead of Adversaries
The Security Testing Imperative
4 Emerging Attack Techniques Cyber Adversaries Are Using
How CISOs Are Dealing With a Growing Digital Attack Surface
The Cybersecurity Dilemma for SMEs
How the Healthcare Sector Is Battling Top Threats
No Patch Yet For Follina And DogWalk Windows 0-Days
Partnering to Secure Industrial Infrastructure
Where Collaboration Works - and Where It Doesn't
OneTrust Lays Off 950 Due To 'Capital Markets Sentiment'
Rapid Cybersecurity Changes Demand Agile Education
How to Keep Business Flowing During a Ransomware Attack
RSA CEO Rohit Ghai: 'Disruptions Catalyze Transformation'
Cybercrime Deep Dive: Hydra Marketplace Takeaways
Russia Warns of Military Action If US Attacks Infrastructure
'When, Not If': Crafting Cyber Resilience Plans That Work
How to Ditch the Silo and Safeguard Medical Devices
How to Defend Critical Infrastructure Against New Threats
How Companies Can Defend a Rapidly Expanding SaaS Footprint
Medical Center Ransomware Attack Affects 700,000
BlackCat Attacks University of Pisa, Demands $4.5M Ransom
Social Media and the Threat to Cybersecurity
Why Blockchain Is a Double-Edged Sword for Criminals
Ransomware Response Essential: Fixing Initial Access Vector
Tracking the Convergence of IT and OT in the Energy Sector
Cybercrime Chatter: US Critical Infrastructure Off-Limits?
Cybersecurity Retention: Don't Forget the Fun Factor
How to Distinguish True Zero Trust From Imposters
Harnessing the Power of Open Source to Protect Networks
Move From a Reactive to a Proactive State With Intelligence
Responding to Federal Directives on Critical Infrastructure
BlackCat Extortion Technique: Public Access to Breached Data
Late Fix for Follina on Microsoft Patch Tuesday
Why Implementing Security Technology Is Such a Challenge
The Importance of Business-Critical Application Security
Cybersecurity Ethics: Artificial Intelligence Imperatives
What's Needed for Firms to Bring SASE and Zero Trust to Life
Russia's Cyber Offensive Against Ukraine Continues Nonstop
Conti Ransomware Group Explores Post-Encryption Future
Total Business Email Compromise Losses Trump Ransomware
Cyber Risk Quantification: The Quest for Transparency
Ransomware Defenses: Cyber Insurer Details Best Practices
Battling Ransomware: 'We're Targeting the Entire Ecosystem'
Threat Watch: Russia-Ukraine War Remains Top CISO Risk
Calling Cyber-Experienced Attorneys: Uncle Sam Needs You
Profiles in Leadership: John McClure
Hydra Darknet Market: Threat Intelligence Lessons Learned
Russia's Lie: It's Hardly Hitting Ukraine With Cyberattacks
Why Supply Chain Attackers Love Managed Service Providers
Unexpected Pairings: Wine Tasting and Threat Intelligence
Safeguarding the Enterprise Across Multiple Public Clouds
Ransomware Groups Pursue Fresh Monetization Strategies
Rising Fraud in the Digital Age: Detect, Prevent and Respond
Why the Physical Russia-Ukraine War Might Become a Cyberwar
ISMG Editors: Are We Closing in on a Federal Privacy Law?
Why Zero-Day Attacks on Open-Source Libraries Are Surging
How Modern Tech Is Changing Vulnerabilities and Responses
How XDR Is Fulfilling the Promise That SIEM Never Did
The Evolution of Phishing From Email to SMS and Voice Hacks
The Push on Capitol Hill for Passwordless Authentication
Proposed SEC Rules Will Force Boards to Double Down on Cyber
Does Zero Trust Feel Too Overwhelming? Here's How to Start
The Future of Authentication Is Biometrics and Passwordless
Why Diversity Is the Defender's Greatest Weapon
Securing Digital Payments in the Future
Techniques to Improve Supply Chain Confidence
The State of Phishing and Email Security
How to Mitigate Emerging Security Threats Against the Cloud
How Security Risks Might Halt the Use of AI in Applications
How Ransomware Has Changed the Nature of Risk
Preparing for Retaliatory Attacks From Russia
Ping Identity Debuts $50M Venture Fund to Back IAM Startups
Russian Cyberattacks on Ukraine Underscored By Microsoft
ISMG Editors: When an Insider Threat Costs Millions
Horizon Offers $1M Bounty to Hackers Who Stole $100M
Latest Blow Falls on the 'Scourge of Passwords'
The Future of Corporate Network Security on the Internet
IronNet Lays Off 17% of Staff 10 Months After Going Public
Bridging the Divide Between Digitization and Cybersecurity
Strategies for Reskilling and Filling Cybersecurity Jobs
Mitigating the Impact of Ransomware With Data Science
Ransomware-as-a-Service Gang LockBit Has Bug Bounty Program
XM Cyber Buys Cyber Observer to Better Spot Cyber Exposures
Token Snags Ex-OneSpan Revenue Leader John Gunn as New CEO
North Korea Behind $100M Harmony Theft, Say Researchers
Constant Vigilance Demanded - Cyber 'Not Just Another Risk'
Malware Disrupts Multiple US State Unemployment Websites
US DOJ Targets Baller Ape Rug Pull and Other Crypto Fraud
British Army's Twitter and YouTube Accounts Hijacked
Russian Hackers Target Private Ukrainian Energy Firm
Unknown Hacker Steals Data of 1 Billion Chinese Citizens
US, Israel Initiate Cybersecurity Collaboration Program
Vendor's Ransomware Attack Hits Over 600 Healthcare Clients
RSA Conference 2022 Compendium: 150+ Interviews and More
Swimlane Raises $70M to Grow Security Automation Outside US
Marriott Confirms Data Breach, Says Core Network Unaffected
Feds Warn Healthcare Sector of 'Maui' Ransomware Threats
Security Awareness and Behavioral Change: What's Realistic?
FBI and MI5 Chiefs Issue Warning on China IP Theft
Apple Lockdown Mode Aims to Prevent State-Sponsored Spyware
SHI Malware Attack Knocks Website, Email Offline for Days
ISMG Editors: What's the Status of the SBOM?
Customer.io Email Data Breach Larger Than Just OpenSea
Ransomware Locks Indian Flood Monitors During Monsoon Season
Coalition Raises $250M on $5B Valuation to Fuel UK Expansion
Biden Order Seeks to Protect Reproductive Data Privacy
Aerojet Rocketdyne Pays $9M to Settle Cybersecurity Lawsuit
Puerto Rico Commits $7.6M to Boost Cybersecurity
Predatory Sparrow's Hacks: There's Smoke, There's Fire
India Calls for Stricter Actions Against Cybercriminals
Privitar Acquires Regulatory Intelligence Provider Kormoon
Fake Google Update Delivering HavanaCrypt Ransomware
Lithuanian Energy Firm Experiences DDoS
Search Here: Ransomware Groups Refine High-Pressure Tactics
July Patch Tuesday Fixes 1 Zero-Day, 84 Flaws
Ex-CIA Employee Convicted in Theft of Covert Hacking Info
Microsoft Says Phishing Campaign Skirted MFA to Access Email
CyberArk Execs: 9 Bets on What's Next in Identity Security
At Half-Year Mark, Ransomware, Vendor Breaches Dominate
Synthetic ID Fraud: Continuous Monitoring Is the Key
ISMG Editors: Analyzing the Predatory Sparrow Attack
Navigating the Great Zero Trust Debate
Log4j Flaw Is 'Endemic,' Says Cyber Safety Review Board
Bishop Fox Raises $75M to Fortify Offensive Security Muscle
H0lyGh0st Ransomware Linked to North Korean Hackers
BlackCat Adds Brute Ratel Pentest Tool to Attack Arsenal
The Real-World Impact of Cyberattacks on Enterprises
Cyberattack Affects Albanian Government E-Services: Report
FCC Faces $3B Shortfall in Huawei Rip-and-Replace Program
Proof of Concept: A New Era for Digital Identity?
Hackers Steal $421K From Premint NFT Platform (UPDATE)
How Can We Get Better Visibility Into Data Breaches?
US Cybersecurity Agency to Set Up Attache Office in London
Sophos X-Ops Debuts to Thwart Complex Cyberattacks
Online Travel Booking Website Probes 'Security Anomaly'
Major Takeaways: Cyber Operations During Russia-Ukraine War
DOJ Seizes $500,000 From North Korean Attacks on Healthcare
ePlus Acquires Future Com to Strengthen Security Operations
GPS Tracker Made in China Conduit for Vehicle Hacking
How Zero Trust Can Simplify Your Security Infrastructure
The Crucial Ingredients of a Good Cyber Resilience Program
Compromised Credentials Persist as Data Breaches' Root Cause
Romanian Who Allegedly Sold Malware Hosting Extradited to US
Latest HHS HIPAA Actions Spotlight 'Right of Access' - Again
State Elections Official Touts Bug Bounties for Voting Systems
Atlassian Fixes Critical Hard-Coded Credential Bug
Huntress Buys Security Training Provider Curricula for $22M
Settlements Reached In 2 Large Healthcare Hack Lawsuits
Blockchain Security Firm Halborn Raises $90M to Guard Crypto
US Cyber Command Says Malware Indicators Targeting Ukraine
Premint Fingers Open Source Flaw For NFT Hack
ISMG Editors: FBI Claws Back Crypto Ransoms to North Koreans
Cryptocurrency Insider Trading, Fraud in Feds' Crosshairs
Feds Warn Healthcare Sector of Web Application Attacks
Platform Security Firm SonicWall Promotes Sales Guru to CEO
Malware Attacks and Disinformation Campaigns Target Ukraine
MedusaLocker Server Likely Spotted in the Wild
Uber Admits Covering Up 2016 Data Breach, Avoids Prosecution
Early-Stage Startups Pump Brakes on Growth as Downturn Looms
One Identity Snags Ex-LogRhythm CEO Mark Logan as New Leader
TSA Issues New Cybersecurity Directive for Oil Pipelines
NIST Maps Cybersecurity Framework to HIPAA Security Rule
Thief Steals $6M Tokens From Audius, Sells Them for $1M
US Credit Unions to Come Under Cyber Incident Reporting Rule
Cyber Incident Cost $100 Million, Tenet Healthcare Reports
Titanium Blockchain CEO Convicted of $21 Million Fraud
Kaspersky Researchers Dissect Bootup Rootkit
Feds Double Reward for Tips on North Korean-Backed Actors
Human to Merge with PerimeterX to Thwart Bot Attacks, Fraud
Tech Alone Won't Defeat Advanced Spyware, US Congress Told
Keys to LockBit's Success: Self-Promotion, Technical Acumen
Profiles in Leadership: Fred Kwong
Profiles in Leadership: Shefali Mookencherry
Microsoft Denounces Advanced Spyware in Bid to Defuse It
ISMG Editors: Privacy Special With Lisa Sotto
Ukraine, US Sign Cybersecurity Pact
CyberArk, Delinea, One Identity Top Gartner MQ for PAM
Justice Department Probing 2020 Federal Court System Breach
Should US Banks Do More to Reduce APP Fraud?
Maintaining Momentum in Your Security Strategy
Weary Cybercriminals Turn to Cryptojacking Banks: Report
Check Point Execs: Supply Chain Woes Will Persist Into 2023
2 Vendor Hacks Affect Nearly 1.5 Million and Counting
New Survey Shows 6 Ways to Secure OT Systems
Crypto Bridge Nomad Loses $190M in Free-For-All Attack
Profiles in Leadership: John Rouffas
Profiles in Leadership: Ivan Milenkovic
New York Nabs $30M From Robinhood Crypto in Regulatory Fine
Netskope Expands Into Cloud Networking With Infiot Purchase
Big Clinic Breach Tied to Vendor's 2021 Ransomware Attack
Aetna Reports 326,000 Affected by Mailing Vendor Hack
Ping Identity to Go Private in $2.8B Thoma Bravo Acquisition
OCC's Hsu Urges Multifactor Authentication
Hackers Steal $8M in Ongoing Attack on Solana Hot Wallets
Nomad Recovers $11M of $190M Stolen in Frenzied Attack
Talon Cyber Security Raises $100M to Enhance Secure Browser
Proof of Concept: China's Threat to National Security
Dental Care Alliance Settles Breach Lawsuit for $3 Million
Fortinet Looks to Address Rising Costs With Price Increases
Seed Phrase Compromise May Have Caused Solana Wallets Drain
Neuro Practice Tells 363,000 That PHI Was Posted on Dark Web
Iranian Group Likely Behind Albanian Government Attack
India Government Withdraws Data Protection Bill
More Mobile Devices, More Problems, Security Survey Finds
ISMG Editors: Ransomware Groups Aiming for Smaller Targets
Nomad Entices Thieves of $190M Hack With Offer to Keep 10%