What are the implications of security regulations that have made it a legal requirement that only secure and authenticated code should run IoT devices?
Memo to IT administrators: Don't store data in cloud in an unsecure manner. Security researchers at Secureworks have found more than 1,200 cloud-based, unsecured Elasticsearch databases that attackers wiped, leaving only a ransom note demanding Bitcoin in return for their restoration.
In the aftermath of the BlackCat ransomware attack on May 24, 2022, that "severely affected" government services in Carinthia, the Austrian state has budgeted 500,000 euros to restore services and boost its cybersecurity and reinstated its passport issuance system, which was affected by the attack.
Obtaining threat insight is like practicing judo - you want to use your attacker's power against them, says Chris Borales, senior manager of product marketing at Gigamon. He and Tom Dager, CISO of Archer Daniels Midland Company, discuss how to keep pace with the evolving ransomware landscape.
Milind Mungale of Protean eGov Technologies has led the security strategies for the company for two decades. He discusses the changing cybersecurity landscape and building security operations from the ground up for a company that handles sensitive government and citizen information.
Microsoft plans to roll out new decentralized identity and cloud infrastructure entitlement management products to extend secure access from users to workloads and apps. Microsoft Entra Permissions Management will be available on a stand-alone basis in July, and Verified ID will debut in August.
A data breach at Turkish firm Pegasus Airlines has put more than 6.5TB of sensitive electronic flight bag data at risk, including sensitive flight details, source code and staff data, researchers say. The misconfigured AWS S3 bucket that led to the incident has now been secured.
Three months after Russia’s ongoing invasion of Ukraine began, a report from the State Cyber Defense Center's Cyber Rapid Response Team takes a look back at the turbulence the nation has faced in its cyber sphere during Q1 2022 and considers the way ahead.
The U.S. Cybersecurity and Infrastructure Security Agency has added 75 flaws to its catalog of known exploited software vulnerabilities. The vulnerabilities were disclosed in three separate batches of 21, 20 and 34 vulnerabilities on Monday, Tuesday and Wednesday, respectively.
The BlackCat ransomware group, aka ALPHV, which is said to be a rebrand of BlackMatter or DarkSide, has now targeted the Austrian state of Carinthia. The attack has "severely affected" government services in the state, says Gerd Kurath, a state spokesperson.
Attention to anyone who manages a Microsoft Windows environment: Security researchers are tracking a zero-day vulnerability in Microsoft Office that's being actively exploited by attackers to run malicious code on a vulnerable system.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.