The Maze cybercrime gang, which revolutionized the ransomware business by adding an extortion element to each attack, has issued a statement saying it has hung up its spikes and will retire, at least temporarily. Security executives do confirm Maze's activity has dropped off in recent months.
After a federal judge blocked an order that would have banned ByteDance-owned TikTok from operating within the U.S., the Commerce Department vowed to continue to defend the Trump administration's executive order. Additional court hearings over the order are scheduled for later this year.
Validating identity across every digital channel is essential to track money movement information and help control P2P payment fraud, two fraud-fighting experts say.
The latest edition of the ISMG Security Report features a discussion with FBI Agent Elvis Chan on the cyber disruptions to expect immediately after the Nov. 3 U.S. election. Also featured: smart lock security flaws; cryptocurrency-funded crimes in 2021.
Although IoT door locks are ultimately designed to keep people out, they may actually be the way in. Craig Young of Tripwire describes problems he found in U-tec's Ultraloq and other issues with IoT security.
So far, much of the discussion about 5G security has focused on avoiding the use of technology from Chinese manufacturers, including Huawei and ZTE. But security experts are increasingly concerned that 5G network and device providers rushing products to market aren't devoting enough attention to security.
As our workforce becomes increasingly disparate and fluid, privileged access is emerging as a key cyber security concern for many organisations.
Gartner cited privileged access management as the number one project for CISOs for the past two years. But, according to Thycotic research, 66% of CISOs struggle to get...
Some 21 malicious Android apps containing intrusive adware were discovered on the Google Play Store, but most have now been removed, according to a new report from the security firm Avast.
A new online platform called VulnerableThings.com is aiming to become the go-to place for reporting and viewing reports on software flaws in IoT devices. The IoT Security Foundation and Oxford Information Labs say the platform could help vendors comply with new IoT regulations and standards.
A greatly enhanced variant of the powerful Mirai botnet is already infecting IoT devices even though it's operating in a test environment, according to researchers at cybersecurity firm Avira Protection Lab.
Heading into 2021, enterprises have more endpoints to secure than ever. And fortified by its acquisition of Panda Security, WatchGuard Technologies now has a stronger endpoint security strategy. Corey Nachreiner and Marc Laliberte discuss the dual evolution of targeted attacks and endpoint security solutions.
The 2020 Zero Trust Endpoint and IoT Security Report surveyed 325 IT and cybersecurity decision makers across several industries, including financial services, healthcare, manufacturing, high-tech, government, and education.
Download this report to gain exclusive insights on how enterprises are advancing Zero...
Security has never been easy. In today's dynamic environment of users, applications, endpoints and networks, security solutions have become more complex and siloed.
And while investments in security increase, vulnerabilities and breaches continue to grow exponentially.
Download whitepaper to learn more.
Legacy endpoint security approaches are complex, resource-intensive and require multiple point products. Many solutions focus on stopping known attack methods but leave organizations vulnerable to new threats.
It doesn't have to be this way. There is a new, better approach - intrinsic security.
The FCC is asking the Justice Department and other executive branch agencies if China Unicom's operations within the U.S. pose a significant enough national security threat to merit revoking the company's business license.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.