The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
A new ransomware group called BlackMatter has debuted, claiming to offer the best features of REvil and DarkSide - both apparently defunct - as well as LockBit. A new attack using REvil's code has also been spotted, but a security expert says it's likely the work of a former affiliate.
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
Identity verification helps a fast-growing payments provider scale with confidence.
PSI-Pay is a fast-growing, UK-based financial services company that provides payment solutions to individuals and businesses around the world. Taking pride in delivering transparent, efficient and clear solutions to its customers,...
A global payments company verifies international clients instantly.
As a global remittances and payments provider, Nium offers innovative solutions to send, spend and collect money in fast, convenient ways in multiple markets, providing individual and enterprise users with a seamless digital payments and money...
With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
A bipartisan group of senators is pushing a bill that would require CISA to identify and respond to vulnerabilities and threats that target industrial control systems. The House has already passed a similar measure.
Cyber attacks on critical infrastructure are on the rise. A recent survey found that 9 out of 10 OT organizations experienced at least one intrusion in the past year.
Read the solution brief to learn:
Why operational technology endpoints are vulnerable
How FortiEDR addresses challenges of OT environments
The...
Zero trust has become a dominant security model for the changes brought by mobility, consumerization of IT and cloud applications. And while the term zero trust continues to infiltrate IT security conversations, it raises an important question: how do we get there?
In this guide, we examine the three pillars of zero...
Organizations of all sizes struggle to manage endpoints that need access to corporate applications and data. They often have limited visibility into their fleets of devices. Additionally, policy enforcement is complex and achieving regulatory compliance can be a headache. In this guide, you’ll learn about the...
As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.
This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.
With traditional endpoint security solutions, it’s not a matter of if a security breach happens, but when. These EDR solutions not only lack the ability to keep pace with modern threats, but come with hidden costs that drain budgets and slow operations.
In the world of operational technology (OT), one small change or networking issue can have a significant effect on production, automation systems and even safety. Staying on top of what’s happening in the control network is mission critical – but one can’t monitor and manage what you can’t see.
Check this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.