The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
A week after a distributed denial-of-service attack on the Ukrainian Ministry of Defense, a DDoS attack has reportedly struck Ukranian government and bank websites - including the Ukrainian Ministry of Foreign Affairs, the Cabinet of Ministers and Verkhovna Rada, according to an early report.
Two years of accelerated cloud migration have brought great services and efficiencies to enterprises. But they also have expanded and exposed a growing risk: Cloud data security. Laminar CMO Andy Smith discusses the urgency of the challenge and how to address it.
In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.
As Russia's invasion of Ukraine continues, what will happen next remains unclear. Accordingly, cybersecurity experts are again calling on organizations globally to focus on what they can control, including their cybersecurity defenses and business resiliency preparedness.
Xenomorph, a new banking Trojan that appears to be linked to the nasty Alien malware family and has been downloaded more than 50,000 times in the Google Play Store, has been targeting European banks. But ThreatFabric research shows that overlay attacks more frequently target cryptocurrency wallets.
Hacking incidents still dominate the major health data breaches being reported to the U.S. Department of Health and Human Services in the first months of 2022 by far, with only one other type of breach appearing on the federal tally so far this year. Are organizations missing other breaches?
The EU confirmed that it will activate its elite cybersecurity team to assist Ukrainians if Russian cyberattacks occur. The news follows rapid escalation in the Russia-Ukraine border conflict, where Russia has amassed over 100,000 troops and is reportedly considering full-scale invasion.
Security researchers have spotted a Mac coinminer using personalized open-source apps to augment its malicious routine. A departure from other malwares that use Tor, this effective malware leverages i2pd to hide its network traffic from the untrained eye.
Cryptocurrency exchange Coinbase briefly halted its services Feb. 11 after a security researcher uncovered a critical vulnerability affecting its Retail Advanced Trading platform, allowing malicious users to sell BTC without owning any. The researcher who found the flaw got a $250,000 bug bounty.
On this week's "Sound Off," attorney Lisa Sotto demonstrates how Colonial Pipeline did "a lot right" in its response to the DarkSide ransomware attack that led the firm to shut down operations for nearly a week last May. She shares best practices for enterprises to improve incident response plans.
The Conti ransomware group has a new trick up its sleeve: hiring "multiple elite developers and managers" to essentially acquire the venerable TrickBot malware operation, which it has been using for the past year to better distribute its ransomware, says threat intelligence firm Advanced Intelligence.
After Russian President Putin's doubled down on the claim that Ukraine has always been a part of Russia, federal and state-level agencies prepare for cyberattacks that could be on the horizon if the situation escalates. CISA and other agencies recommend keeping rapid communication systems in place.
A Seattle, Washington-based community health center operator is facing a class action lawsuit in the aftermath of a data exfiltration incident reported last year as affecting more than 650,000 individuals. The breach also involved data allegedly found posted for sale on the Marketo data leak site.
On Feb. 13, Adobe patched a critical vulnerability that affected its Commerce and Magento platforms, which customers use to manage their businesses' e-commerce. But a proof-of-concept exploit for the latest patch has resulted in yet another out-of-band patch update from Adobe for CVE-2022-24087.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.