The U.S. government on Wednesday issued its most direct and technically detailed advisory about North Korea's hacking activity to date, warning that the country continues to target U.S. media, aerospace, financial and critical infrastructure sectors.
Victims of Jaff and EncrypTile ransomware can take advantage of two new free tools from security firms that exploit weaknesses in the malware crypto to forcibly crack encrypted files on demand - no potential ransom-payment required.
Microsoft fears that nation-state actors may unleash viral code that could devastate users. On Tuesday, it released software fixes again for its older operating systems in hopes of averting a repeat of last month's infection of tens of thousands of computers with ransomware.
Social engineering is not a new concept, but it is an enduring one that is steadily growing, with no end in sight.
One of the most common social engineering schemes is phishing, which is defined as "the use of social engineering and technical subterfuge to defraud an online account holder of their financial...
Synthetic ID fraud is a fast-growing, multibillion dollar issue. Often misclassified as a credit loss, synthetic ID fraud is now affecting an expanding list of entities. Also, unless extremely large, this "victimless" crime often does not get the full attention of law enforcement. From the LexisNexis data labs, learn...
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
The Internet-of-Things poses tremendous cybercrime challenges with crafting a meaningful risk-based financial crime management strategy. In this session, we'll cover the meaning of cybersecurity in the context of fraud and customer trust, an understanding on the meaning and purpose of a cyber threat intelligence...
This session reviews research into Pawn Storm (a.k.a., APT28, Fancy Bear, Strontium, etc.), which exposes the scope and scale of the cyber espionage attacks and the cyber tradecraft of those who wage these attacks. Trend Micro's researchers have observed activity dating back to 2004, with attacks that have been...
HHS has issued a checklist and other materials to aid healthcare organizations and their vendors in their "quick response" to cyberattacks. The move comes as Congress scrutinizes HHS' efforts to help the healthcare sector improve its cybersecurity capabilities.
A discussion that explores the predicament many information security managers face when deciding which security technologies to buy in a glutted market leads the latest edition of the ISMG Security Report. Also: An update on cyber flaws in connected vehicles and the latest from Infosecurity Europe.
Russian anti-virus vendor Kaspersky Lab has filed two antitrust complaints against Microsoft in Europe, contending that the company has engineered Windows 10 to favor its preinstalled malware-fighting program, Windows Defender.
The WannaCry Ransomware is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally.
Download this eBook to learn how to be prepared to quickly address the growing threat of ransomware and limit your company's exposure to future...
It's a growing epidemic: Ransomware, advanced persistent threats and phishing attacks are responsible for hundreds of millions of dollars in damage due to lost productivity, tainted credibility and worse - lost revenue. As attackers plan increasingly more sophisticated attacks, your organization needs to know how best...
Two researchers who launched a crowdsourced effort to subscribe to the Shadow Brokers' monthly leak of stolen Equation Group exploits - on behalf of the entire information security community - have dropped their effort, citing legal concerns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.