While the federal health data breach tally shows that hacker incidents continue to rise in 2017, regulators are offering up some insights from their investigations into a handful of ransomware-related breaches reported in 2016.
Cyber criminals attack any organization, regardless of size. While enterprises typically rebound from the customer confidence problems and other issues that come after a data breach, some small and medium-sized businesses (SMBs) never recover. Within 24 months of a major data loss, 72% of businesses are forced to shut...
Travel industry software giant Sabre has alerted hotels that its software-as-a-service SynXis Central Reservations system - used by more than 36,000 properties - was breached and payment card data and customers' personal details may have been stolen.
When Hayward Tyler, a UK-based global manufacturing firm, suffered a Cryptolocker ransomware attack, the company had contracts still in negotiation, confidential customer data and trade secrets encrypted by cyber criminals. However, within just one hour of discovering the ransomware, they were able to identify all the...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
Two men have pleaded guilty to hacking London-based telecommunications giant TalkTalk in 2015. Police say one of the men boasted in social media account chats about wiping and encrypting his hard drives, as well as taking part in the hack attack.
To shift from reactive to active defense mode, organizations need to get better at both threat-hunting and incident response. Too many organizations simply lack an incident response plan before they need one, according to Tim Bandos, Senior Director of Cybersecurity at Digital Guardian.
Download this interview...
In the wake of fraud reports, Blowout Cards has issued a security alert to customers, warning that an attacker hacked its website and installed a PHP file designed to skim payment card details at the time of purchase.
Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
The best approach to building a security policy is by using a comprehensive, layered approach that covers all threats (both new and known). This policy needs to leverage real-time threat intelligence by addressing all threat vectors and all platform types as workloads migrate from physical to virtual to...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
Brand and professional reputations can be damaged beyond repair by a successful ransomware or phishing attack. So how can organizations stay protected from advanced persistent cyber threats?
Download this checklist to learn how to:
Effectively secure cloud or SaaS-based applications;
Educate your users;
Detect...
Brand and professional reputations can be damaged beyond repair by a successful ransomware or phishing attack. So how can organizations stay protected from advanced persistent cyber threats?
Download this checklist to learn how to:
Effectively secure cloud or SaaS-based applications;
Educate your users;
Detect...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.