The CEO of the company that crippled WannaCry's ransomware component explains to Congress how the worm continues to attack unpatched systems at increasing rates. Also, creating a healthcare cybersecurity framework.
The U.S. government on Wednesday issued its most direct and technically detailed advisory about North Korea's hacking activity to date, warning that the country continues to target U.S. media, aerospace, financial and critical infrastructure sectors.
Victims of Jaff and EncrypTile ransomware can take advantage of two new free tools from security firms that exploit weaknesses in the malware crypto to forcibly crack encrypted files on demand - no potential ransom-payment required.
Microsoft fears that nation-state actors may unleash viral code that could devastate users. On Tuesday, it released software fixes again for its older operating systems in hopes of averting a repeat of last month's infection of tens of thousands of computers with ransomware.
This session reviews research into Pawn Storm (a.k.a., APT28, Fancy Bear, Strontium, etc.), which exposes the scope and scale of the cyber espionage attacks and the cyber tradecraft of those who wage these attacks. Trend Micro's researchers have observed activity dating back to 2004, with attacks that have been...
The WannaCry Ransomware is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally.
Download this eBook to learn how to be prepared to quickly address the growing threat of ransomware and limit your company's exposure to future...
It's a growing epidemic: Ransomware, advanced persistent threats and phishing attacks are responsible for hundreds of millions of dollars in damage due to lost productivity, tainted credibility and worse - lost revenue. As attackers plan increasingly more sophisticated attacks, your organization needs to know how best...
Two researchers who launched a crowdsourced effort to subscribe to the Shadow Brokers' monthly leak of stolen Equation Group exploits - on behalf of the entire information security community - have dropped their effort, citing legal concerns.
In the wake of recent of recent ransomware attacks, such as WannaCry, which have plagued healthcare organizations, in particular, for the last year, what lessons do we have yet to learn? Ransomware attacks are nothing new, and while WannaCry was widespread, it was not sophisticated or stealthy, necessarily. So why did...
Two security researchers are attempting to crowdfund a recurring subscription fee to Shadow Brokers' monthly exploit dump club in hopes of helping to prevent or blunt future outbreaks of the WannaCry variety. Cue ethical debate.
From ransomware to business email compromise, most of today's Internet scourges - in spite of vast differences in their appearances - are related to each other and depend on a small number of reused adversarial techniques. Decomposing the threats into these atomic building blocks is helpful to understand the nature of...
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses as well as big data and machine learning combining to secure IT.
Eastern European cybercrime is evolving, and some of the latest trends defy conventional wisdom. Moscow-based cybersecurity company Group-IB offers an analysis of some of these changes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.