More bad ransomware news: Following in the footsteps of Maze, now even more cybercrime gangs are threatening to not only crypto-lock systems but also leak stolen data. Such moves come following a banner year for ransomware operators, who are continuing to bring more advanced tactics to bear.
With the declaration of COVID-19 as a pandemic, and the global shift to work from home, Tom Kellermann of VMware Carbon Black sees a corresponding increase in hacking and espionage attempts against U.S. agencies, businesses and citizens. He says add "digital distancing" to your precautions.
As cybercriminals and nation-states take advantage of the COVID-19 pandemic to further their own aims, authorities are calling on victims to report online attacks as quickly as possible to help them better disrupt such activity.
Attackers are continuing to use concerns over COVID-19 to distribute ransomware and malware, including for smartphones. The healthcare sector is perhaps at the greatest risk from these attacks because it's serving as the front-line defense against the disease.
As the COVID-19 pandemic intensifies, public health efforts are being complicated by ransomware attacks continuing to hit healthcare facilities that are not only handling cases but also running frontline virus-testing labs.
With a threat landscape constantly in flux, it isn't just CIOs, CISOs and CSOs who need reliable insights into cyber risk. The rest of the C-suite and board must factor in cybersecurity data as a key risk metric - or expose the business to the everyday reality of cyberattacks.
If you're looking to drive C-suite and...
Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems. While no attacks have been seen in the wild, no patch for the wormable flaw is yet available. A workaround exists for servers, but not clients.
Account Takeover is now a ubiquitous term, and ATO prevention has become a high priority for cybersecurity leaders. But most of the effort is put toward thwarting high-volume, automated credential stuffing. Less understood are "targeted ATO attacks." Highly effective and difficult to detect, they cause huge damage to...
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
Customers put their trust in companies to deliver on promises of security. The quickest way to lose customers is to betray that confidence, especially when it comes to their personal information.
Hackers understand that, too. They quickly adapt tools and techniques to disrupt that delicate balance. To truly...
Hackers and cybercriminals have reached a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a dramatic increase in attack frequency, complexity and size.
Although these threats constitute a clear and present danger to organizations worldwide, knowledge is power. This Hacker's...
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
In discussions around the future of AI and cyber-threats, we often wonder when we can expect to see malicious or offensive AI attacks in the wild. While we have not yet seen conclusive evidence of execution, we
can anticipate that AI-driven cyber-attacks are not years away, but a very real possibility in the...
Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data and threatening to leak more unless the victim pays a ransom.
How much do you know about the supply chain that takes a vulnerability and turns it into an exploit?
In this new report, Tenable Research explores the lifecycle of exploits - from discovery to utilization in a breach. Their analysis of cybercrime economics will help you better protect your organization.