Fraudsters are now using numerous spoofed website templates with COVID-19 themes as part of phishing attacks designed to steal login credentials and banking data, according to Proofpoint.
Cryptocurrency-mining hackers appear to be behind a recent spate of supercomputer and high-performance computing system intrusions. But it's unclear if attackers might also have had data-stealing or espionage intentions.
Besides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa.
As hacking toolkits become more freely available across the internet, shrewd network infiltration techniques and destructive malware that were previously the realm of only the most advanced threat actors are now becoming more commonplace. Traditional approaches to network threat detection are not keeping up with the...
This white paper covers four ways machine learning, applied in a practical and focused way, can strengthen cybersecurity defense by:
Accelerating the productivity of cybersecurity specialists as the ratio of network traffic volume to analysts grows more and more disproportionate;
Improving detection capabilities...
Today's cyber threats require a new strategy to strengthen cyber defenses, one that leverages a collective approach to enable companies large and small to work together in defense. Doing so requires new solutions that are tailored to and within reach of companies of all sizes so all can participate in defensive...
The operators of the REvil ransomware strain are attempting to ratchet up pressure on a New York law firm to pay a $42 million ransom, threatening to release more data on the firm's roster of celebrity clients. So far, the REvil gang has released about 2 GB of legal information related to Lady Gaga.
Fraudsters have conned Norfund, a private equity investment firm based in Oslo, Norway, out of more than $10 million in what the company calls an "advanced data breach." But the incident bears the hallmarks of a business email compromise scam.
A sophisticated cyber-espionage campaign using spyware called Mandrake has been targeting Android users for at least four years, according to security firm Bitdefender. The malware has the ability steal a range of data, including SMS authentication messages from banks.
ARCHER, a British high-performance computing system for academic and theoretical research, has been offline since May 11, when a "security incident" forced the University of Edinburgh to take down the supercomputer. The security incident also affected supercomputers in other parts of Europe, university officials say.
A sophisticated hacking group associated with the North Korean government that's been tied to a number of high-profile attacks, including WannaCry, is using three new malware variants, according to the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
Fraudsters are honing their phishing emails tied to the COVID-19 crisis, using fake messages about business continuity plans and new payment procedures to spread the LokiBot information stealer, Microsoft researchers report.
A recently discovered cyberespionage toolkit called Ramsay is designed to infiltrate air-gapped networks to steal documents, take screenshots and compromise other devices, according to the security firm ESET.
Cyberattacks continue to plague organizations worldwide. Many of the largest and most damaging attacks stem from malware-infected files that evade traditional security solutions.
Security teams need a more effective and comprehensive solution to the problem of undetected malware not only affecting SecOps teams but...
The Russian cybercriminal underground is a complex, sophisticated, and bustling hive of activity, continuing to thrive alongside the government's new restrictive internet policies that censor information and limit the content citizens can access. This report breaks down Russia's attempts to crack down on free internet...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.