- + Demystifying Cyber Resilience: Building a Robust Defense—InfoSec Officer Shervin Evans on Preparing Organizations to Withstand Cyberthreats Cyber resilience takes a broader approach, emphasizing the ability...
- + Cybersecurity Resolutions: Skill Sets to Prioritize in 2025—Key Focus Areas for Cybersecurity Professionals in 2025 As we enter 2025, the cybersecurity landscape demands more than just maintaining the status q...
- + Unpacking OpenAI's Latest Approach to Make AI Safer—New Framework in o3 Models Aims to Better Align With Human Safety Values OpenAI says its latest o3 series is the most advanced and safest of its "rea...
- + Online Extortion Gang Clop Threatens Cleo Hacking Victims—Cybercriminals Say They Hacked 66 Companies The Clop cybercriminal group is threatening to make public the companies swept up by its mass hacking of ...
- + Why Cloud Identity Attacks Outpace On-Premises Risks—Blackpoint Cyber CEO Jon Murchison on MSP Cloud Identity Risks With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchis...
- + How Will Health Data Privacy, Cyber Regs Shape Up in 2025?—Washington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next...
- + US Considers TP-Link Ban After Volt Typhoon Hacking Campaign—Major Chinese Router Manufacturer Facing Increased Scrutiny After Chinese Espionage U.S. authorities have launched multiple investigations while repo...
- + Why Hackers Love Weekend and Holiday Attacks—About 75% of healthcare sector entities that suffered a ransomware attack over the past year were targeted on a weekend or holiday, highlighting the n...
- + Models Can Strategically Lie, Finds Anthropic Study—AI Can Fake Alignment to New Instructions to Avoid Retraining Advanced artificial intelligence models can feign alignment with new training goals whi...
- + Turmoil Besets Phishing-as-a-Service Toolkit Rockstar 2FA—Infrastructure Problems Blamed; Users Appear to Move to Similar FlowerStorm Service As the end of the year approaches, it's out with the old and in w...
- + Why Hackers Love Weekend and Holiday Attacks (Jeff Wichman)—About 75% of healthcare sector entities that suffered a ransomware attack over the past year were targeted on a weekend or holiday, highlighting the n...
- + North Korean Hackers Tied to $1.3B in Stolen Crypto in 2024—Researchers Trace 61% of Known Losses This Year to Pyongyang-Backed Hackers Hackers tied to North Korea's cash-strapped totalitarian dictatorship thi...
- + Companies Race to Use AI Security Against AI-Driven Threats—Palo Alto Networks' Meerah Rajavel on Securing Enterprises With 'Precision AI' Security teams struggle to manage overwhelming data streams from detec...
- + Alleged LockBit Coder Faces 41-Count Indictment in US—US Seeks Extradition of Dual Russian and Israeli Citizen Rostislav Panev from Israel A newly unsealed U.S. federal indictment against Rostislav Panev...
- + Editors' Panel: Cybersecurity 2024 - Thanks for the Memories—Looking Back on the Ransomware Attacks, Resilience Lessons and Tech Trends In the latest weekly update, ISMG editors discussed defining cybersecurity...
- + Federal Cyber Operations Would Downgrade Under Shutdown—Government Shutdown Could See Thousands of Federal Cyber Workers Furloughed A looming shutdown could sharply reduce the Cybersecurity and Infrastruct...
- + Siemens Warns of a Critical Vulnerability in UMC—Heap Overflow Flaw Threatens Industrial Control Systems Globally Siemens issued a security advisory for a vulnerability affecting industrial control ...
- + Managed XDR, AI and SMB Defense: Barracuda CEO Shares Vision—Barracuda CEO Hatem Naguib Shares Strategies for Email Protection, Managed Services With cyberthreats becoming more sophisticated, Barracuda CEO Hate...
- + Live Webinar | Supercharge Your ServiceNow CMDB with Complete and Real-Time Data
- + How Infoblox Streamlines Operations Across Hybrid Settings—Infoblox CEO Scott Harrell Pushes Unified Strategy Amid Hybrid Cloud Convergence Scott Harrell, CEO of Infoblox, explores the convergence of network ...
- + CISA: 2035 Quantum Encryption Deadline Still Achievable—CISA Says 2035 Quantum Deadline Remains Achievable Despite Recent Breakthroughs The federal government’s 2035 mandate to adopt quantum-resistant encr...
- + Crypto Roundup: LastPass Breach Linked to $5.4M Crypto Theft—Also, CoinLurker Malware Steals Data via Fake Updates Every week, Information Security Media Group rounds up cybersecurity incidents in digital asset...
- + HHS Urges Health Sector to Beef Up OT, IoMT Security—Feds Warn That Connected Devices Are Prey for Cyberattackers The security of medical devices has been getting most of the attention from regulators i...
- + UK ICO Criticizes Google Advertising Policy Update—Data Protection Authority Says Change Isn't Green Light for Device Fingerprinting The U.K. data regulator blasted Google Thursday for a changes to po...
- + Critical Flaws Expose 25,000 SonicWall Devices to Hackers—Many SonicWall Firewalls Are Unsupported or Lack Patches for Known Vulnerabilities Thousands of SonicWall network security devices remain exposed wit...
- + Proposed UK White Hat Legal Shield Fails in House of Lords—Amendment to Computer Misuse Act Fails During Bloc Vote A proposed amendment to British anti-hacking law that would have provided a legal shield to w...
- + Opswat Expands Critical Infrastructure Defense With Fend Buy—Data Diodes Enhance Air-Gapped Network Security, Deliver Advanced Network Isolation Opswat's acquisition of Fend integrates advanced hardware-based s...
- + US CISA Endorses Encrypted Apps Amid Chinese Telecom Hack—CISA Recommends Strict Mobile Security Measures Following Salt Typhoon Telecom Hack The Cybersecurity and Infrastructure Security Agency's latest gui...
- + Key Raccoon Figure Receives 60-Month U.S. Prison Sentence—Ukrainian Mark Sokolovsky Pleaded Guilty in October A Ukrainian national who was a key figure in the Raccoon malware-as-a-service criminal operation ...
- + AI, 5G, and Quantum: Innovation and Cybersecurity Risks—New Book by Cyber Expert Chuck Brooks Covers Innovation, Risk, Privacy Challenges Cybersecurity expert and Georgetown University lecturer Chuck Brook...
- + Vulnerabilities in Azure Data Factory Open Door to Attacks—Azure Data Factory's Apache Airflow Integration Flaw Can Expose Cloud Environments Security researchers say now-resolved vulnerabilities in a Microso...
- + Streamlining Retail IT Operations: Protecting Your Brand While Reducing Costs
- + Live Webinar | Transforming SOCs with Speed, Scaling and Security Innovation
- + Attack Exposure: Unpatched Cleo Managed File-Transfer Software—At Least 1,000 Hosts Still Vulnerable as Ransomware Group Claims Mass Exploits More than 1,000 Cleo managed file-transfer hosts remain internet-expos...
- + Live Webinar | Get Ahead and Stay Ahead of Threats with Tanium and Microsoft
- + Live Webinar | From Risky to Resilient: Proactive Strategies for Program De-Risking and Audit Readiness
- + Australia to Phase Out Weak Encryption Algorithms by 2030—Regulators Say NIST's 2035 Deadline for Insecure Encryption Could Be Too Late Australia has rolled out an ambitious roadmap to prepare for future qua...
- + CISA Orders Secure Cloud Configurations for Federal Agencies—Federal Agencies Tasked with Adopting New Cloud Security Policies Beginning in 2025 The Cybersecurity and Infrastructure Security Agency is requiring...
- + Sonar Expands to Third-Party Code Security with Tidelift Buy—Deal Targets Open Source Library Risks in Software Supply Chain, Boosts DevSecOps The integration of Tidelift into Sonar's ecosystem will enhance sof...
- + Espionage Campaign Targets Turkish Defense Industry—APT Group Uses Sophisticated Attack Chain to Deploy WmRAT and MiyaRAT A suspected South Asian threat actor targeted a Turkish defense organization, ...
- + Webinar | AI-Driven Security: Building a Platform-Based Defense Against Evolving Cyber Threats
- + Ransomware Defender Risk: 'Overconfidence' in Security Tools—CISOs at Organizations That Fell Victim Have a Different Story, 451 Research Finds Are your defenses against ransomware good enough to survive contac...
- + Arctic Wolf to Buy Cylance for $160M to Boost AI-Driven XDR—Deal With BlackBerry Integrates EDR for Hybrid XDR Platform for Midmarket Customers Arctic Wolf is acquiring Cylance from BlackBerry for $160 million...
- + Winnti-Like Glutton Backdoor Targets Cybercriminals—Malware Exploits Cybercrime Ecosystem for Profit Hackers are using a variant of a backdoor that's the hallmark of a Chinese threat actor suspected of...
- + CISA Urges Enhanced Coordination in Incident Response Plan—Draft National Response Plan Offers Flexible Coordination Strategies Across Sectors A draft update to the National Cyber Incident Response Plan aims ...
- + European Union Sanctions Russian Malicious Cyber Actors—Trading Bloc Includes Doppelganger Actors and GRU Unit 29155 in Sanctions List The European Union sanctioned Russian intelligence hackers and two Kre...
- + Thousands Affected by Data Theft Hack of Smallest US State—Brain Cipher Gang Claims Credit for Hit on State of Rhode Island's Vendor Deloitte Potentially hundreds of thousands of Rhode Islanders are affected ...
- + German BSI Disrupts Android Malware Infecting IoT Devices—Around 30,000 German IoT Infected from Backdroored Android Applications The German federal information security agency disrupted a botnet that infect...
- + ISMG Editors: CEO Shooting Sparks AI Accountability Debate—Also: How Leading Cybersecurity Firms are Gearing up for 2025 In the latest weekly update, ISMG editors discussed the shooting death of the UnitedHea...
- + Hackers Steal 17M Patient Records in Attack on 3 Hospitals—IT Outage, Downtime Procedures Affecting Services at California Healthcare Provider Cybercriminals claim they stole 17 million patient records from a...
- + Researchers: Iranian Custom Malware Targets Fuel Systems—An Iranian state hacking group is using custom malware to compromise IoT and OT infrastructure in Israel and the United States. An attack wave from Is...
- + Live Webinar | Active Directory Under Attack: How to Build a Resilient Enterprise
- + Crypto Roundup: Crypto Pros Targeted with Fake Meeting Apps—Also, Australian Fines Kraken AU$8 million Over Breaches This week, scammers targeted crypto workers with fake meeting apps, Australia fined Kraken c...
- + Russia Used Borrowed Spyware to Target Ukrainian Troops—Secret Blizzard Used Third-party Amadey Bots to Hack Ukrainian Military Devices A Russian state-backed hacker group used third-party data-stealing bo...
- + US Indicts 14 North Koreans in IT Scam Funding WMD Programs—DOJ Indicts North Korean IT Workers for Using Remote Jobs to Fund Weapons Programs U.S. federal prosecutors indicted 14 North Koreans for a long-runn...
- + New Malware Framework Targets Cleo File Systems—Possible Long-Term Attack by Unknown Hackers Thwarted Hackers exploiting flaws in Cleo Communications software instances had intimate knowledge of th...
- + Unlocking Compliance: The Role of SBOMs in Modern Software Development
- + Checkmarx CEO: Evolving Supply Chain Threats Demand Action—Checkmarx's Sandeep Johri Details Malicious Code, AI Risks in Application Security As software complexities grow, supply chain security is now essent...
- + Hackers Exploiting Cleo Software Zero-Day—Attackers Target Managed File Transfer Software Vulnerabilities File transfer software made by Cleo Communications is under active attack and a patch...
- + Google Gemini 2.0 Introduced With Advanced AI for Developers—Multimodal Agentic AI Delivers Speed, Tools, and Research Prototypes Google's latest AI model can natively process and output text, images and audio ...
- + Ransomware Hackers Exploiting Cleo Software Zero-Day—Attackers Target Managed File Transfer Software Vulnerabilities File transfer software made by Cleo Communications is under active attack and a patch...
- + AI Meets Fraud Prevention in LexisNexis-IDVerse Acquisition—LexisNexis Combines AI-Driven Document Authentication With Its Fraud Solutions To counter AI-driven fraud, LexisNexis acquired IDVerse, a London-base...
- + Clearinghouse Pays $250K Settlement in Web Exposure Breach—Inmediata Health Group Has Paid $2.7M in Fines, Civil Claims for 2019 HIPAA Breach A breach that exposed the personal information of nearly 1.6 milli...
- + Chinese APT Groups Targets European IT Companies—Evidence Mounts for Chinese Hacking 'Quartermaster' A probable Chinese nation-state threat actor compromised Visual Studio Code and Microsoft Azure c...
- + Live Webinar | Exposing the Truth: How Government Agencies are Being Mislead by SASE Capabilities Disinformation
- + Cybersecurity Gadgets to Hack Your Holiday Gift List—Tech and Training Ideas to Help Cyber Professionals Advance Their Skills If you're a cybersecurity professional trying to come up with ideas for your...
- + OpenWrt Update Flaw Exposed Devices to Malicious Firmware—Embedded Device Operating Sytem Had Flaw Allowing Hacers to Bypass Integrity Check A critical flaw in the updating service of a popular Linux operati...
- + US Indicts, Sanctions Alleged Chinese Sophos Firewall Hacker—Tianfeng Guan Allegedly Developed Zero-Day Exploit of Sophos XG Firewall The U.S. federal government rolled out its heavy guns Tuesday against a Chin...
- + Satya Nadella's Vision for Microsoft: AI, AI and AI—Copilot Enhancements and Other Key Announcements From Microsoft Ignite 2024 Advanced AI took the center stage at Microsoft Ignite 2024. Reflecting on...
- + Moody's: Hackers Aim for Big Payouts, Supply Chain Attacks—Big Game Hunting Will Intensify in 2025, Says Credit Rating Agency Improved cybersecurity will result in ransomware hackers targeting larger organiza...
- + Rhode Island Schools Deploy DNS Service to Tackle Ransomware—Rhode Island Becomes First State to Shield Students from Cyber Risks with New Tool Rhode Island will become the first state in the nation to launch a...
- + FDA Urges Blood Suppliers to Beef Up Cyber—Bulletin Comes In Wake of Recent Attacks Disrupting Blood Collection, Supplies The Food and Drug Administration is urging blood suppliers - a recent ...
- + Shaping the Future: How Gen AI Is Transforming 3D Design—Autodesk and AWS Are Driving the Next Generation of AI-Powered Design Innovation At AWS re:Invent 2024, Autodesk unveiled its innovative vision for g...
- + Are We Winning Against Cybercriminals or Losing?—InfoSec Officer Shervin Evans on the State of Cyberdefense, Meeting the Challenges Cybercriminals are launching relentless attacks. The potential for...
- + Previewing Black Hat Europe 2024 in London: 20 Hot Sessions—From Automotive Exploits and Bootloader Bugs to Cybercrime and 'LLMbotomy' Trojans Black Hat Europe returns to London with more than 45 keynotes and ...
- + Live Webinar | The New Data Landscape: Navigating the Shift to AI-Ready Data
- + Spyware Campaign Targets Sino Minority Groups Via WeChat—Possible Chinese State-Sponsored Exploit Kit Using Browser Flaws to Deploy Spyware A possible Chinese state threat group is targeting vulnerabilities...
- + Spyware Campaign Targets Sino Minority Groups via WeChat—Possible Chinese-state sponsored Exploit Kit Using Browser Flaws to Deploy Spyware A possible Chinese-state threat group is targeting vulnerabilities...
- + Insider Breach, Email Attacks Net $1.7M in HIPAA Fines—Incidents at Pain Management Firm, Pediatric Hospital Affect 50,000 People An insider breach at a Florida pain management firm and an email breach at...
- + Trump's AI, Crypto Czar David Sacks Faces Conflict Scrutiny—David Sacks Appointed as Trump's AI and Crypto Czar Amid Growing Industry Concerns President-elect Donald Trump's appointment of former PayPal execut...
- + Dutch Counter-Ransomware Initiative Led to Global Takedowns—Project Mellissa Contributed Toward Disruptive Actions A Dutch public and private sector anti-ransomware initiative has contributed to ransomware dis...
- + Protecting the C-Suite in the Wake of UHC CEO's Murder—The torrents of public hostility directed at health insurers in the aftermath of UnitedHealthCare CEO Brian Thompson's murder are serious signs of int...
- + Here's Where Top Cybersecurity Vendors Stand as 2025 Nears—Palo Alto, CrowdStrike, Zscaler Eye Firewall, SIEM Replacement, Incident Recovery Three of the world's largest pure-play cybersecurity vendors recent...
- + Weaponized AI: Hot for Fraud, Not for Election Interference—FBI Sees Rising AI-Enabled Fraud; Meta Reports Scant Election Interference Use Artificial intelligence: What's it good for? Per the old song about wa...
- + Cryptohack Roundup: Solana npm Package Attack Risks Wallets—Also, Man Who Stole $3.5M of Cloud Computing to Mine $1M in Crypto Pleads Guilty This week, Solana npm package attack, a Brazilian banking giant ente...
- + CEO's Murder Sparks Outcry Over UHC's Coverage Denials—Shell Casing Inscription 'Deny' Points to Potential Motive in CEO's Killing Law enforcement investigating murder of Brian Thompson, CEO of UnitedHeal...
- + Veeam Closes $2B Offering to Boost Data Resilience, Eyes IPO—CEO Anand Eswaran Talks Investors, Innovation and Data Resilience Leadership CEO Anand Eswaran explains how Veeam's $2 billion secondary offering str...
- + Russian Forces Accused of Secretly Planting Spyware on Phone—Russian Activist for Ukraine Claims Spyware Was Installed While in Custody by FSB A Russian activist says security forces covertly installed spyware ...
- + Webinar | The State of Observability in Financial Services
- + How to Take the Complexity Out of Cybersecurity—It goes without saying: Business ecosystems are increasingly complex, and so are the cybersecurity systems and strategies deployed to protect them. Bu...
- + Russian Money Laundering Services Busted in UK-Led Operation—French Police Reportedly Detain Accused Ryuk Money Launder Ekaterina Zhdanova An international investigation led by the United Kingdom busted Russian...
- + Experts Warn DHS Surveillance Tech Lacks Privacy Protections—Privacy Advocates Warn of Risks from Expanding DHS Use of AI and Facial Recognition The U.S. Department of Homeland Security is reportedly expanding ...
- + US FTC Cracks Down Geolocation Data Brokers—Gravy Analytics and Mobilewalla Ordered to Implement Stronger Consent Measures Two data brokers pledged to stop using geolocation data gleaned from s...
- + Police Shutter Largest German-Speaking Criminal Marketplace—Crimenetwork Served as a Platform for Illegal Goods and Services German police arrested the suspected administrator of the largest German-speaking un...
- + Live Webinar | Cyber Incident Response: Recovery and Review
- + OnDemand | How to Build Cyber Resilience with Proactive Incident Response Strategies
- + How Hackers Can Manipulate AI to Affect Health App Accuracy—Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said...
- + World Wide Work: Landing a Cybersecurity Career Overseas—Tips for Finding and Getting Security Jobs in a Global Market Organizations ranging from multinational corporations to government agencies and intern...
- + AI in Cybersecurity: Insights from Palo Alto Networks Unit 42®—AI is reshaping the fight against digital threats. Learn how attackers are using AI to supercharge malware and social engineering—and how organization...
- + 'Horns&Hooves' Malware Campaign Hits Over 1,000 Victims—Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims t...
- + Sixgen's Kyrus Acquisition Boosts National Cybersecurity—Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purc...
- + 16 Zero-Days Uncovered in Fuji Electric Monitoring Software—Flaws in Fuji's Tellus and V-Server Software Pose Risks to Critical Infrastructure Security researchers have uncovered 16 zero-day vulnerabilities in...
- + European Police Disrupts Matrix Encrypted Service—Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in i...
- + New Section 1033 Push Banks to Provide Customers with “Financial SIM Card”—Authored by: Matt Kunkel, CEO, LogicGate The Consumer Financial Protection Bureau (CFPB) recently finalized a set of rules that would bring a similar...
- + Russia Indicts Ransomware Hacker Wanted by the FBI—Suspected LockBit, Babuk Operator Mikhail Matveev Arrested in Russia A prolific ransomware affiliate hacker and developer is facing criminal charges ...
- + Just Like Windows: Linux Targeted by First-Ever UEFI Bootkit - UPDATED—Linux-Targeting Bootkitty Appears More Proof-of-Concept Than Threat, Researchers Say Cybersecurity researchers have discovered the first-ever UEFI bo...
- + Just Like Windows: Linux Targeted by First-Ever UEFI Bootkit—Linux-Targeting Bootkitty Appears More Proof-of-Concept Than Threat, Researchers Say Cybersecurity researchers have discovered the first-ever UEFI bo...
- + Warning: Patch Advantech Industrial Wireless Access Points—Researchers Discover 20 Critical Flaws Attackers Could Exploit in a Variety of Ways Researchers identified 20 critical vulnerabilities in a type of A...
- + EU Nations That Missed NIS2 Deadline Put On Notice—European Commission Opens Infringement Procedures Against 23 EU Member States The European Commission on Thursday opened infringement procedures agai...
- + Privacy Vendor Market Moves From Point to Platform Solutions—PwC's Anirban Sengupta Details Privacy Landscape, Growing Awareness in India Market The privacy vendor market in India is evolving rapidly, as many v...
- + Overcoming Identity and Access Challenges in Healthcare—Third-party access management poses significant cybersecurity risks in healthcare, but continuous identity management and monitoring can help mitigate...
- + The Growing Quantum Threat to Enterprise Data: What Next?—Key Steps for Navigating the Cybersecurity Transition to Quantum-Safe Cryptography As quantum computing continues to evolve, cybersecurity profession...
- + Just Like Windows: Linux Targeted by First-Ever Bootkit—Linux-Targeting Bootkitty Appears More Proof-of-Concept Than Threat, Researcher Say Cybersecurity researchers have discovered the first-ever bootkit ...
- + Breach Roundup: Microsoft Tries Again With Windows Recall—Also: Africa Busts Cybercrime Suspects; Many Smart Devices Lack Update Transparency This week, Microsoft previews its latest attempt to introduce AI-...
- + Cryptohack Roundup: Judge Strikes Down 'Dealer Rule' Change—Also: Python Library Update Steals Credentials; Drug Cartels Launder With Tether This week's cryptohack roundup includes a U.S. federal judge strikin...
- + Trump's Crypto Plans Raise Alarms Over Conflicts of Interest—President-Elect's Crypto Push Fuels Concerns Over Market Stability and Conflicts President-elect Donald Trump's strong cryptocurrency support amid ma...
- + Webinar | The CISO's Guide to a Strong Security Culture
- + A Hacker’s Take on Automated Threats for Code Chaos
- + Exposed on the Web: Thousands of Devices, Medical Records—Thousands of unique IP addresses are potentially exposing medical devices, electronic medical records systems and other sensitive healthcare informati...
- + When Hackers Meet Tractors: Surprising Roles in IoT Security—How to Find a Career in Industrial IoT - on the Factory Floor or in the Cornfield Cybersecurity once conjured images of IT departments, server rooms ...
- + Protecting AI Competitive Advantage: From Development to Deployment
- + New York Fines Geico, Travelers $11.3M for Data Breaches—Fines Tied to Wave of 2021 Driver's License Number Theft New York state authorities fined auto insurance giant Geico $9.75 million for failing to pro...
- + US National Security Officials Brief Telecom Executives—National Security Officials Share Intelligence on a Cyberespionage Campaign The White House on Friday hosted U.S. telecommunications executives to re...
- + OnDemand | The CISO's Guide to a Strong Security Culture
- + Road Blocks in Sustainability Data Management | Live Webinar
- + ISMG Editors: China-Linked Espionage Targets US Telecoms—Also: Highlights from ISMG's Financial Services Summit and Key Insights on AI Adoption On the 200th episode of the ISMG Editors' Panel, the team disc...
- + Haveli Purchases AppViewX to Strengthen Identity Automation—PE Firm Takes Majority Stake to Drive Certificate Lifecycle Management Innovation Private equity firm Haveli has purchased a majority stake in AppVie...
- + ISMG Editors: China-Linked Espionage Targets U.S. Telecoms—Also: Highlights from ISMG's Financial Services Summit and Key Insights on AI Adoption On the 200th episode of the ISMG Editors' Panel, the team disc...
- + North Korean IT Workers Using Fake Sites to Evade Detection—Researches Find Deep Ties to North Korea Among Fake IT Services Firms Websites North Korean state actors are using fake websites of foreign technolog...
- + US Cyber Force Surges Global Operations Amid Rising Threats—US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024 A secretive U.S. military unit has surged its support to partner nati...
- + Annual Report to Congress on Breaches of Unsecured Protected Health Information—The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 ...
- + FFIEC Final Authentication Guidance—The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' ex...
- + Accounting of Disclosures Under the HITECH Act—A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures o...
- + ENISA: Software vulnerability prevention initiatives—The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vu...
- + AI-nt Nothing Gonna Break My Defense: Securing Against Automated Attacks
- + Live Webinar | How to Build Cyber Resilience with Proactive Incident Response Strategies
- + Navigating the Unstructured Data Maze: Your Journey Starts Here
- + Live Webinar | Phishing Lessons Learned: Candid Conversation with NCA and CISOs
- + Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent—When a large hospital in an urban area is shut down by ransomware, the disruption can be significant, but when a rural hospital faces a similar cyber ...
- + Unforeseen Risks to Medical Devices in Ransomware Attacks—While ransomware attacks against medical devices don't happen often, disruptive cyber incidents that affect the availability of the IT systems that me...
- + Identity Security: How to Reduce Cyber Risk in Manufacturing—Manufacturing enterprises have more identities than ever to manage - human and non - and face more attacks upon these identities. Manual lifecycle man...
- + Study: 92% of Healthcare Firms Hit by Cyberattacks This Year—Healthcare organizations should rethink some of their approach to security, enhancing focus on insider threats, improving cyber awareness training and...
- + Will Arrests Squash Scattered Spider's Cybercrime Assault?—Members of Loosely Organized Group Recently Tied to Partnership With RansomHub Will the indictment of five alleged members of the loosely affiliated ...
- + Let's Give Thanks for How Far We've Come - and Forge Ahead!—Cybersecurity Training and Education Must Evolve to Keep Pace With the Profession Over the past few decades, cybersecurity has evolved from a niche c...
- + How Advances in Cloud Security Help Future-Proof Resilience—Embracing Zero Trust and AI in Cloud Security Zero trust, artificial-intelligence-driven security and automation tools are reshaping how organization...
- + Cyberstarts Program Sparks Debate Over Ethical Boundaries—Scrutiny Over Ethics of Profit-Sharing Prompts End to Cyberstarts CISO Compensation Allegations of conflicts of interest in Cyberstarts’ Sunrise prog...
As of 12/26/24 5:27am. Last new 12/25/24 11:18pm. Score: 365
- Next feed in category: Activist Post