The actor behind the cyberattack targeting SolarWinds customers - Nobelium - is continuing its campaign to target the global IT supply chain, according to a new advisory from Microsoft, which says 140 resellers and tech service providers have been notified that they have been targeted by the group.
The outages of the notorious REvil - aka Sodinokibi - ransomware operation have been due to a coordinated law enforcement effort involving the U.S. and foreign partners, aimed at disrupting the group's attack capabilities, Reuters reports.
The U.S. Bureau of Industry and Security has issued an interim final rule to curb and control the export, reexport, or in-country transfer of certain offensive cyber tools that are used in surveillance of private citizens and other malicious activities that undermine the nation's security.
How many ways do U.S. businesses need to be told to lock down their systems to safeguard themselves from ransomware? That's the focus of a new, joint cybersecurity advisory from the U.S. government pertaining to BlackMatter, following an advisory issued last month about Conti.
Social media platform Twitter has suspended two accounts that were being used by members of the DPRK, a North Korean government-backed threat group, according to Adam Weidemann, an analyst with the Google Threat Analysis Group. The accounts allegedly targeted security researchers around the globe.
Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the importance of product security, the impact of ransomware on healthcare sector entities during the pandemic and thinking about cybersecurity awareness creatively.
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data. A 2019 report from Kaspersky found that 90% of data breaches are caused by human error. Threat actors know that humans are...
Some of the highest-ranking cybersecurity officials in the U.S. government discussed the pervasive threat of ransomware on Tuesday, likening it to a clear issue of national security with the ability to inflict measurable damage on major world powers.
This case study is based on interviews with executives responsible for contact center customer service and fraud prevention in two Top 20 U.S. Banks concerning the contact center challenges they faced and the needs that led them to look for a new technology solution.
Download this case study to learn how two Top 20...
The STIR/SHAKEN (S/S) framework allows voice service providers to authenticate that the caller ID information transmitted with a particular call matches the caller’s number. Upon widespread implementation, the hope is that S/S will help reduce illegal spoofing, allow law enforcement to identify bad actors more...
It's boom times for high-growth enterprises. But the same can be said for cybercriminal adversaries looking for cracks in your cybersecurity armor. How can you leverage your security controls and data to build an effective and mature 24/7 threat detection and response capability, that also helps ensure...
Integrating SOAR and MITRE ATT&CK can act as a force multiplier, providing advanced context on attacks so analysts can stay ahead of attackers and reduce the overall attack surface. Download ESG’s White Paper and learn how ServiceNow SOAR can help you operationalize MITRE ATT&CK.
A new self-assessment tool aims to help public and private sector organizations assess their level of vulnerability to insider threats, according to CISA. The agency also indicated this week it will keep its "rumor control" website active ahead of the 2022 midterm elections.
Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru’s Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to...