Are you a fraudster craving an easy way to generate Microsoft Office documents with embedded malicious macros designed to serve as droppers that install banking Trojans onto a victim's PC? Say hello to a toolkit that debuted in February called Rubella Macro Builder.
An attack spoofed internet routing information, resulting in anyone who visited MyEtherWallet.com - a free, open source web app for storing and sending ether-based tokens - instead being routed to an attacker-controlled site, leading to an estimated $320,000 in losses.
Navigating the complexities of GDPR compliance is a challenge, but you can take one huge threat off the table by building an
effective defense against ransomware. When enforcement goes into effect for GDPR on May 25, 2018, personal data breaches will be costly for organizations, both financially and procedurally....
The General Data Protection Regulation (GDPR) came into effect on May 25, 2018 to protect the privacy rights of people from the European Union (EU). The new regulatory regime governs how businesses and government institutions must handle the sensitive personal data of EU citizens, and levies substantial fines on...
Now that your organization is faced with the realities of GDPR, it's time to clear up any lingering questions you still have regarding the new regulations and how they're impacting your organization's policies.
Download this FAQ to learn more about:
What exactly GDPR regulates;
The extent of the effect that...
Now that your organization is faced with the realities of GDPR, it's time to clear up any lingering questions you still have regarding the new regulations and how they're impacting your organization's security policies.
Download this FAQ to learn more about:
What exactly GDPR regulates;
The extent of the effect...
Now that your organization is faced with the realities of GDPR, it's time to clear up any lingering questions you still have regarding the new regulations and how they're impacting your organization's security policies.
Download this FAQ to learn more about:
What exactly GDPR regulates;
The extent of the effect...
Now that your organization is faced with the realities of GDPR, it's time to clear up any lingering questions you still have regarding the new regulations and how they're impacting your organization's security policies.
Download this FAQ to learn more about:
What exactly GDPR regulates;
The extent of the effect...
The city of Atlanta's ransomware outbreak cleanup and response tab has hit $2.6 million after a March attack froze corporate servers, employees' PCs and resident-facing portals. Some security experts say the breach response funds would have been put to better use preventing the outbreak in the first place.
Attackers rarely bother with technical sophistication when easy social engineering schemes, such as "hacking" a victim's social network and using it against them, can give them what they want, says Markus Jakobsson, chief scientist at the cybersecurity firm Agari.
Malware is a pervasive problem that is constantly evolving, says Christopher Kruegel, CEO of the security firm Lastline, who shares key findings from new research.
Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview about the activities of a hacker group the company has dubbed "Orangeworm."
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
It's not just that threat actors are multiplying - it's that they have evolved to unleash a fifth generation of cyberattacks, says Peter Alexander of Check Point Software Technologies. And most enterprises are ill prepared to detect or respond to these attacks.
Centurylink is out with its 2018 Threat Report, and it contains curious insights into connected devices and the botnets that can leverage them for crime. Peter Brecl of CenturyLink shares highlights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.