State officials in Texas say that at least 23 local government entities have fallen victim to a coordinated ransomware attack unleashed on Friday morning. Security experts say attackers continue to pummel local governments, and illicit profits have been rising.
The recent data breach that exposed information on 2.6 million customers of Bangalore-based Jana Small Finance Bank points to the need for banks to ramp up their vendor risk management efforts, security analysts say.
A newly identified phishing campaign used Google Drive to help bypass some email security features as attackers attempted to target a company in the energy industry, security firm Cofense reported this week.
This edition of the ISMG Security Report discusses the latest improvements in deception technology and how best to apply it. Also featured: a report on the growth of mobile fraud, plus insights on Merck's experience recovering from a NotPetya attack.
Paige A. Thompson, who's been arrested on a charge of hacking into Capital One's network and taking the personal and financial data of 106 million individuals, is also suspected of stealing information from over 30 other organizations, according to new court documents.
The group behind the Cloud Atlas cyber espionage campaigns, which were first detected five years ago, is now deploying polymorphic techniques designed to avoid monitoring and detection, according to researchers at Kaspersky Lab.
More than 1,000 fake twitter accounts were created to launch a propaganda campaign against India on the same day that the Indian government announced annulment of Article 370 of the constitution, which gave special status to Jammu and Kashmir - a state located in the northern part of the Indian subcontinent.
Choice Hotels says about 700,000 guest records were exposed after one of its vendors copied data from its systems. Fraudsters discovered the unsecured database and tried to hold the hotel chain to ransom, which it ignored.
The U.S. Securities and Exchange Commission is investigating the exposure of personal and mortgage-related records from First American Financial Corp., according to security blogger Brian Krebs. First American spent $1.7 million on the incident in its second quarter, but investigations and lawsuits are looming.
The news that serial entrepreneur Elon Musk and scientists have unveiled Neuralink - a neuroscience startup that's been in stealth mode for two years and aims to create a new computer/brain interface - might make you ask: What took him so long? Before signing up, just make sure it's immune to ransomware.
As email threats become more advanced, machine learning is being used to detect these attacks. Learn the latest about machine learning & how it is changing the threat landscape.
Join this session to discuss:
How machine learning is being used to detect threats
Latest advancements in machine learning for cyber...
Attacks on card-not-present (CNP) merchants are escalating rapidly globally, fueled by rampant breaches, automated credential stuffing attacks, and the rapid growth of the CNP transactional category as a whole. The trend line is concerning for merchants, issuers, and the payment networks alike, as the industry seeks...
Security professionals are facing today a reality where the balance between attackers and defenders in the Cyber arena has broken. Attackers have attained a significant advantage, unmatched to the means and security controls that the cyber defenders have developed.
In this session, we will give answers to: