A case before the U.S. Supreme Court may limit federal prosecutors' ability to bring charges of aggravated identity theft. A Texas man convicted of overbilling Medicaid argued Monday he's not also guilty of identity theft since he had a patient's permission to submit the bill.
A leader of an international crime network that attempted to launder more than $25 million in fraudulently obtained funds, including through business email compromise, received a sentence of more than a decade in prison. Valentine Iro, 34, pleaded guilty to conspiracy to engage in money laundering.
A Chinese law requiring mandatory disclosure to the government of vulnerability reports appears to be paying dividends for state-connected hacking. "The Chinese government is up-leveling their capabilities," says Adam Meyers, senior vice president of intelligence at CrowdStrike.
A lack of visibility makes it nearly impossible to protect an organization against attack. If you can't see what's lurking in the dark corners of your environment, all you can do is react instead of actively identifying and mitigating risks. But some technologies can help with threat visibility.
The Australian government says it will centralize its approach to securing federal agencies by appointing a coordinator to head the new National Office for Cyber Security within the Department of Home Affairs. The appointment comes after back-to-back major data breaches.
A top U.S. government official urged industry to become more conscientious over cybersecurity by preventing vulnerabilities from accumulating before products ship. CISA head Jen Easterly called for a more assertive role for government and an industrywide shift to memory-safe programming languages.
A campaign targeting government entities in the Asia-Pacific and North America regions with an info stealer hosted on a Discord server shares infrastructure with a campaign that used Microsoft OneNote to deliver malware. Menlo Security says the unknown threat actor doesn’t seem to be a major player.
Healthcare last year was the most attacked sector within critical infrastructure, David Scott, deputy assistant director of the FBI Cyber Division, told a Scottish cybersecurity conference. The bureau in 2022 received 870 complaints showing indicators of a critical infrastructure ransomware attack.
The European Commission has directed employees to remove the ByteDance-owned, short-form video app TikTok from their phones and corporate devices, citing security concerns. The decision follows similar bans in the U.S. and other countries, driven by fears of Chinese hacking and influence.
The Asia-Pacific region had the dubious distinction of being the global region that faced the most cyberattacks during 2022, as observed by IBM's threat intelligence platform. IBM says the region accounted for 31% of all incidents monitored during 2022.
Federal authorities are urging the healthcare sector to ratchet up defenses against potential assaults by Russian-linked Clop on the heels of the ransomware-as-a-service group's recent alleged mass attacks exploiting a vulnerability in vendor Fortra's secure file transfer software GoAnyWhere MFT.
Russian hackers breached and modified several Ukrainian state websites on Thursday morning using a backdoor planted nearly two years ago. Ukraine identified the hackers as belonging to a group tracked as UAC-0056, also known as SaintBear, UNC2589 and TA471.
The United States is warning domestic and European organizations to be extra vigilant about their presence in cyberspace on the one-year anniversary of Russia's 2022 invasion of Ukraine. Friday marks 12 months since Moscow initiated a war of conquest against its European neighbor.
One year after Russia intensified its invasion of Ukraine, the cyberwar many feared Moscow might unleash hasn't come to pass. In fact, while cyber operations have been a component of Russia's war - and cybersecurity a necessity of Ukraine's defense - cyber operations remain no silver bullet.
Tools such as image analysis are of little help to banks dealing with check fraud since, most of the time, checks that are deposited are legitimate, says Karen Boyer, senior vice president for financial crimes at M&T Bank. She says the best way to deal with this fraud is to closely monitor accounts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.