An unidentified nation-state hacking group targeted several Russian federal agencies as part of a cyberespionage campaign that compromised the country’s federal networks to steal sensitive data, according to a report from Russian security firm Rostelecom-Solar.
Air India says millions of its customers were affected by a February data breach at SITA, a third-party data processing service based in Switzerland that serves many airlines.
After revealing Colonial Pipeline Co. paid attackers $4.4 million after a ransomware attack, CEO Joseph Blount has been scheduled to testify at a House Homeland Security Committee hearing June 9.
The zero trust conversation has matured in the past year, but some nuances are still being overlooked in terms of strategic vision. Christopher Hines of Zscaler weighs in on how the model can be applied toward so much more than merely VPN replacement.
Four editors at Information Security Media Group discuss tactics for improving hiring practices and increasing workforce diversity as well as achieving sustainable resiliency.
It's not just traditional data governance – it's about business risk. And in the age of GDPR and CCPA, you’d best have a handle on data discovery and classification. Patrick Benoit of CBRE gives the BISO's perspective on data risk governance.
5G technology reminds us that, globally, our sensitive data is open to attack. Janine Darling, founder and CEO of STASH Secure Data, is committed to resolving that vulnerability challenge.
You can see it in the latest high-profile attacks: Security requirements are ever more complex, exceeding the capacity of current protection capabilities. Enterprises need a new strategy for defending entry points, and Tom Sego of BlastWave believes he has it.
A week after Ireland's health services provider was hit by a ransomware attack, the Conti gang has provided a decryptor, which officials are now testing to determine whether to use it, Reuters reports. But the gang is still threatening to release stolen data unless a $19 million ransom is paid.
Although many companies are deploying extended detection and response, or XDR, their efforts often are coming up short, says Richard Stiennon, chief research analyst at IT-Harvest.
"They’re playing games," is how one security expert describes Conti ransomware-wielding attackers' "gift" of a decryptor to Ireland's crypto-locked health service, while still demanding a ransom to not leak stolen health data. The same could be said of the DarkSide gang's promised retirement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.