UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know
In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of […]
Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud
Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […]
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […]
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already […]
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement […]
Directed Analytics – The Future of Data Management
By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a quote from philosopher George Santayana: “Those who cannot remember the past are […]
Data Security Must Be a Priority as Employees Quit in Record Numbers
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5 […]
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic, […]
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity […]
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately […]
Cyber (In)Secure: Business Sentiment on Cyber Security Challenges
By James Edgar, Senior Vice President and Chief Information Security Officer, FLEETCOR Undoubtedly the last two years have been incredibly challenging for businesses, as many companies grappled with the health […]
It’s About Time: The Unappreciated Fundamental Metric for Security
By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of […]
December 2021: Cyber Deception Month
How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Which I shortened for you… https://tinyurl.com/CDMG-DEC-2021 (you can trust me, I’m […]
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting that increased mobility helps businesses enhance their operations and efficiency. Verizon’s 2021 […]
Iran-linked APT groups continue to evolve
The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian threat actors. The Microsoft Threat Intelligence Center (MSTIC) shared the results of […]
Why The Integration of Netops And Secops Is Here To Stay
By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance on cloud services, VPNs, and other solutions designed to support remote work. […]
Ransomware attack disrupted store operations in the Netherlands and Germany
Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail giant MediaMarkt was a victim of a ransomware attack that forced […]
New Magecart group uses an e-Skimmer that avoids VMs and sandboxes
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have spotted a new Magecart group that uses a browser script […]
You’ve Been Attacked by Ransomware. How Will You Respond?
By Steve Schwartz, director of security, ECI Earlier this year, a ransomware attack on the Colonial Pipeline led to a shutdown of 45% of the East Coast’s fuel supply, 12,000 […]
Guntrader Data Breach: Victims Concerned Over Impact
By Aman Johal, Lawyer and Director, Your Lawyers In July 2021, the details of over 111,000 Guntrader users – which included registered firearm owners – were leaked online after a […]
Russia-linked Nobelium APT targets orgs in the global IT supply chain
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The SolarWinds security breach was not isolated, Russia-linked Nobelium APT group has […]
Forensic Collections From a Mac: Challenges & Solutions
INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS, and […]
Trickbot spreads malware through new distribution channels
TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the infamous TrickBot (ITG23 and Wizard Spider) malware have resurfaced with new distribution […]
Twitch data breach updates: login credentials or card numbers not exposed
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous 4chan user has published […]
Intercepting data traffic via iPhone
Intercepting data traffic via iPhone By Jordan Marcus Bonagura Introduction This article aims to demonstrate in a simplified way different approach for capturing and intercepting network traffic data originating from […]
Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability […]
New SOVA Android Banking trojan is rapidly growing
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain. Researchers from cybersecurity firm ThreatFabric have spotted in the […]
Combatting Industry Burnout by Building Resilient Security Teams
By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. Catalyzed by the shift to an anywhere-work environment during COVID-19, attack surfaces […]
Understanding The Importance of Designing for Security
By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary […]