Download this e-book to get up to speed on everything XDR. You’ll become well-versed in all things XDR, including key points such as:
The current state of detection and response
What XDR is and isn’t
10 must-have XDR capabilities
How XDR can help break the attack lifecycle
Use cases such as threat...
The U.S. Department of the Treasury unveiled additional steps to curb the illicit use of cryptocurrencies on Friday, warning enterprises not to engage with sanctioned entities exploiting the financial system - particularly to launder ransomware proceeds.
Researchers at Morphisec Labs have published fresh details about a new MirrorBlast campaign that they say is run by a Russia-based threat group TA505, targeting financial services organizations. The campaign delivers MirrorBlast via a phishing email that contains malicious links.
U.S. federal agencies issued a joint advisory around potential cyber threats to the nation's water facilities. They cite "ongoing malicious cyber activity - by both known and unknown actors - targeting the IT and OT technology networks, systems and devices" of U.S. water and wastewater systems.
In this update, four editors discuss key cybersecurity issues, including addressing the complexity of security, the rising number of victims targeted by double extortion ransomware and the Information Commissioner's Office's recent consultation on creating an international data transfer agreement.
The latest edition of the ISMG Security Report features an analysis of attempts made by European law enforcement to encourage young cybercriminals to channel their skills in more ethical ways. Also featured: Fraud detection and response; inspiring behavioral change.
After a turbulent 2020 dominated by dramatic change, cybersecurity experts everywhere are looking ahead at newly emerging and rapidly evolving threats and the ways in which IAM and IGA are adapting to stop them. But how much of what you’re hearing is hyperbole, and how much should you take to heart?
The American Osteopathic Association has just begun notifying nearly 28,000 individuals about a June 2020 data exfiltration incident involving their personal information. The medical professional organization says workforce challenges during the pandemic led to the notification delay.
Researchers at Cider Security have uncovered a security loophole in GitHub Actions that allows adversaries to bypass the required reviews mechanism and push unreviewed code to a protected branch, allowing it into the pipeline to production.
Thingiverse, a popular website dedicated to sharing user-created digital design files, has reportedly leaked a 36GB backup file that contains 2.5 million unique email addresses and other personally identifiable information.
The breach of text message routing giant Syniverse revealed yet another supply chain attack involving a key supplier, exacerbated by outdated communications protocols desperately in need of a security revamp and better incentives for improvement, says mobile telephony security expert Karsten Nohl.
Outdated yet ubiquitous, passwords are inconvenient, risky, costly and the primary reason for data breaches. In fact, more than 80% of hacking-related breaches leverage weak and compromised passwords. If that’s the case, then why aren’t banks making better progress when it comes to supporting a password-less...
Virtually every organization and industry today is at risk of being targeted by a ransomware attack, and those attacks are more devastating than ever. 2021 has already proven this new reality with major events affecting Colonial Pipeline, DC Police, Kia Motors, Acer and Kaseya - just to name a few.
The White House National Security Council this week kicked off its international counter-ransomware event with participation from more than 30 nations. This gathering aims to elevate both law enforcement collaboration and diplomatic efforts. Noticeably absent from the summit: Russia.
Dutch cybercrime police have a message for almost 30 users of an on-demand distributed denial-of-service site: We see what you're doing; now cut it out or we're going to arrest you. And not for the first time, the move shows police in Europe emphasizing ethical hacking pursuits instead for young adults.