An alleged member of The Dark Overlord hacking group who apparently made dumbfounding operational security mistakes while trying to extort U.S. companies has pleaded not guilty. Nathan Wyatt is perhaps the only person associated with the notorious hacking group who left a clear digital trail.
A new cyberespionage campaign has targeted hundreds of manufacturing and other industrial firms in South Korea and has spread to other parts of Asia and Europe, CyberX reports. The apparent goal of the campaign is to steal trade secrets and intellectual property as well as credentials.
A Canadian medical testing lab acknowledges that it paid a ransom to "retrieve" data stolen by hackers in an incident that apparently did not involve ransomware. Find out about the unusual details of this incident.
In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps.
Following a series of high-profile ransomware attacks and other cyber incidents over the last year, two U.S. senators have introduced a bill designed to help bolster cybersecurity for local school districts.
Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights.
The gang behind Maze ransomware has begun publicly identifying its victims and listing data that it exfiltrated from systems before leaving them crypto-locked. The intent is clear: By naming and shaming victims, the Maze gang is trying to compel them to pay.
Suspicious code uploaded to VirusTotal points to Ryuk ransomware being used in a crypto-locking malware attack against New Orleans. Mayor LaToya Cantrell has declared a state of emergency and the city is continuing its recovery, noting that no emergency services have been affected.
Several sophisticated cybercriminals gangs are targeting "fuel dispenser merchants" throughout North America, in some cases by planting malware within corporate networks to steal payment card data, Visa warns in a new alert.
How confident are security leaders in their enterprise cybersecurity posture? And in turn, how are business leaders marketing cyber confidence to customers and partners? Alex Pitigoi of Nominet shares insights and analysis from new research.
Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security? Christine El Eris of Fiserv discusses fraud trends.
In 2016, Retired Brigadier General Francis X. Taylor had a front-row seat to the election interference threat picture. Today, as a leader of U.S. CyberDome, what's his view on how well the U.S. is prepared to protect the 2020 federal election?
New research finds that hackers linked to the North Korean government are now renting the botnet created by TrickBot malware, as well as access to a highly customized malicious framework, to help further their goals - including targeting payment systems.
A large Atlanta-area manufacturer of wire and cable says it has brought some systems back online after what appears to be a ransomware infection. Southwire Co., based in Carrollton, Georgia, tweeted on Thursday that "we are doing all we can to minimize and resolve this disruption."