Ransomware has become a huge cyber security challenge for organisations. It is growing in numbers as well as in sophistication. The cost of financial and reputational losses to organizations is also on the rise. In 2019, average remediation costs for a company that had incurred a ransomware attack were over $761,000....
The Biden administration unveiled a package of supply chain and critical infrastructure security initiatives following a meeting at the White House with tech executives and others. Companies such as Google and Microsoft also promised billions in spending on cybersecurity over the next several years.
The Biden administration is hosting a White House meeting Wednesday with technology, banking, insurance and education executives to focus on cybersecurity and national security issues, such as protecting critical infrastructure from attacks and how to hire more security professionals to meet demand.
Security researchers at AT&T Alien Labs say they've discovered a cluster of Linux ELF executables, identified as modifications of the open-source PRISM backdoor, that attackers have been using in several campaigns for more than three years.
Mastercard says that starting in 2024, banks and other institutions that issue its credit and debit cards will no longer need to include a magnetic stripe on the back, and that by 2033, m
agnetic stripes will be extinct. Given magnetic stripes' many security downsides, what's taken so long?
As digital transformation accelerates at an unprecedented rate, strategic initiatives such as revenue collection, customer loyalty, and brand awareness are now primarily online. And they’re increasingly being hijacked by hackers, leading to account takeover (ATO), fraud losses, and damaged brands. Any business that...
Security firm Cloudflare says it detected and mitigated a 17.2 million request-per-second distributed denial-of-service attack, almost three times larger than any previously reported HTTP DDoS attack.
As ransomware-as-a-service operations continue to compete for affiliates, the operators behind LockBit have unveiled a new version of their crypto-locking malware boasting fresh features, some borrowed from rivals. Separately, a relatively unsophisticated newcomer called Hive has debuted.
The latest edition of the ISMG Security Report features an analysis of the cybercrime-as-a-service model and how law enforcement could potentially disrupt it. Also featured: T-Mobile probes a massive data breach; tackling abuse in the workplace.
The 2020 Vulnerability and Threat Trends Report elaborates on how ransomware has seen a whopping 72% increase in new samples in just the first half of the year. Along with leveraging technological progress, cyber criminals are known to exploit global circumstances to their advantage. COVID-19 has changed the...
Researchers at the security firm Cisco Talos have spotted an ongoing campaign using an updated variant of the "Neurevt" Trojan to target customers of financial institutions in Mexico.
T-Mobile USA has confirmed that its systems were breached and that details for 7.8 million current T-Mobile postpaid customers and 850,000 prepaid customers as well as records for 40 million individuals who applied for credit were stolen.
A Massachusetts man who used SIM swapping and other account takeover techniques to target business executives and steal more than $530,000 worth of cryptocurrency has pleaded guilty to several federal charges.
T-Mobile USA has confirmed that attackers accessed its computer systems, but the mobile communications provider is still investigating whether customers' personal data was exposed. Cybercrime experts say the attackers apparently involved have been tied to previous crimes targeting telecommunications since at least...
CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a
unique role in the IT security industry. Other surveys do a great
job of collecting statistics on cyberattacks and data breaches
and exploring the techniques of cybercriminals and other bad
actors. Our mission is to provide deep insight into the minds...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.