In a new report, tech giant Microsoft says distributed denial-of-service attacks became shorter in duration but more potent in 2022. The United States, India and East Asia were the top regions affected by DDoS attacks, and IoT devices continued to be the preferred mode of attack.
India and Singapore made it easier and cheaper for their citizens to send and receive money through the integration of UPI and PayNow, but could this move lead to a rise in cross-border online payment scams? Reports of UPI-related fraud surged in India in 2022.
Will large language models such as ChatGPT take cybercrime to new heights? Researchers say AI for malicious use so far remains a novelty rather than a useful and reliable cybercrime tool. But as AI capabilities and chatbots improve, the cybersecurity writing is on the wall.
AT&T wants to unload its cyber assets just five years after doubling down on security through its $600 million purchase of threat intelligence vendor AlienVault. The Dallas-based carrier has been working with British banking firm Barclays to solicit bids for its cybersecurity business, Reuters said.
The cybersecurity industry experienced a dramatic drop-off in funding, stock prices and M&A activity as the economic downturn took hold in late 2022. Venture capital financing tumbled to $18.5 billion in 2022, 39% lower than the record-breaking $30.4 billion invested in 2021, Momentum Cyber found.
The revolution ChatGPT drove in the consumer market has prompted enterprises to more closely examine how AI can help safeguard data, says Palo Alto Networks CEO Nikesh Arora. The demands from AI in the enterprise are far more exacting, as firms insist AI be clean, comprehensive and in real time.
Lehigh Valley Health Network, which operates 13 hospitals and numerous physician practices and clinics in eastern Pennsylvania, says it has been hit with an attack by Russian-based ransomware-as-a-service group BlackCat. The network says it didn't pay a ransom and operations were not disrupted.
Two recent separate hacking incidents involving attackers stealing copies of sensitive protected health information have affected more than 1 million patients of a New Jersey healthcare system and an Alabama cardiovascular clinic. Victims get free credit monitoring and identity restoration services.
In the wake of recent cyberthreats aimed at Australia's critical infrastructure, the country has adopted a new risk management program to strengthen its resilience and security in these key sectors. The new rules will help businesses prepare for, prevent and mitigate emerging threats.
Ireland's child and family agency, Tusla, says it is beginning a months-long process to notify 20,000 individuals that their personal information was exposed in the May 2021 ransomware attack against the Health Service Executive, which formerly managed Tusla's IT systems.
Twitter says it will turn off SMS second-factor authentication for all but paying customers starting March 20 in a decision provoking concerns that many customers will be less secure than before. Twitter says 2.6% of active Twitter accounts have activated second-factor authentication.
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The adoption of new technologies, multi-cloud architectures and multiple data storage sites has resulted in data residing in more places than ever before. That's why enterprises need a single pane of glass to know who's touching their data and why, says Imperva CEO Pam Murphy.
Airbus has made a formal offer to purchase a 29.9% stake in Atos' $4.8 billion Evidian cybersecurity, big data and digital business. Atos says it will initiate negotiations focused on both Airbus' offer and a long-term strategic and technological partnership between the two organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.