This week, the Zeus leader pleaded guilty, Prudential detected hackers, U.S. telecoms have to report breaches, Microsoft patched zero-days, researchers said Chinese threat intel is faulty, ransomware hit Romanian healthcare entities, Juniper was breached and Poland allegedly previously used Pegasus.
In this 30-minute session, experts from CyberArk’s field technology office explain how to maximize risk reduction by seamlessly managing and securing all identities.
Russia continues to focus on running cyber operations and espionage that target Ukraine's military, government and civil society in support of its ground campaign, researchers at Google said, warning that the information operations will likely soon be brought to bear on Western elections.
The U.S. federal government says it disrupted a criminal botnet that Russian military intelligence had converted into a platform for global cyberespionage. The malware targets Linux-based IoT devices - in this case, routers made by New York manufacturer Ubiquiti.
This week, the U.S. Treasury reported on crypto in crime, Changpeng Zhao's sentencing was rescheduled, PlayDapp was hacked, the UN probed North Korean hacking, suspicious crypto transactions increased in South Korea, the U.K. blocked fraud sites and Hong Kong warned about crypto phishing sites.
A Chinese-speaking cybercrime group with the codename GoldFactory has built a new Android and iOS banking Trojan, GoldPickaxe, that can harvest and steal personal details, including biometric face profiles, that attackers use to create AI-driven deepfakes to fool bank defenses, researchers warn.
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
Discover the transformative power of risk quantification with insights from Netflix's Tony Martin-Vegue, and learn why modernizing your approach could be the game-changer your risk analysis needs.
An Oklahoma-based healthcare system is notifying 2.4 million individuals that their sensitive information was potentially compromised in an exfiltration incident last year. Cybercriminals have been attempting to extort ransom payments directly from some of those affected patients - including kids.
A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
The French Ministry for Europe and Foreign Affairs accused Russia of running a disinformation campaign targeting Kyiv's Western allies ahead of the second anniversary of Moscow's invasion of Ukraine. The Russian approach to propaganda is a "firehose of falsehood," the Rand Corporation said.
The South Korean President's Office told local media Tuesday that suspected North Korean hackers had targeted the private email account of an official in November ahead of the president's state visits to the U.K. and France. Local reports suggest the hackers accessed the details of scheduled events.
Venture-capital owned Armis, a firm that touts its ability to prepare companies for attacks before they materialize, acquired cybersecurity startup CTCI in a transaction approaching $20 million. Armis will merge CTCI employees and technology over the next 30 days.
While overall ransomware profits might remain high, many of the remaining or rebooted top-tier groups are "really struggling" with scarce talent, trauma from the Russia-Ukraine war and repeated disruptions by law enforcement, say researchers from threat intelligence firm RedSense.
Likely due to operational security concerns, Hamas didn’t appear to deploy any unusual cyber operations or surge ahead of militants storming from the Gaza Strip into nearby Israeli towns last October, researchers report. But since then, some other regional actors haven't held back.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.