After being extradited to the United States, a former Canadian government employee has pleaded guilty to charges related to his role in NetWalker ransomware attacks. [Read More]
Normalyze closes a $22 million funding round as venture capitalists rush to place bets on the newly coined Data Security Posture Management (DSPM) space. [Read More]
A Chinese threat actor has been conducting influence campaigns targeting rare earth mining companies in Australia, Canada, and the United States. [Read More]
As part of a campaign that started in March 2021, the threat actor targeted a telecoms company in Pakistan, as well as other organizations. [Read More]
Lithuania said it had been hit by an "intense" cyberattack, probably Russian, days after Moscow protested restrictions Vilnius imposed on the rail transit of certain goods to Kaliningrad. [Read More]
The FTC orders Residual Pumpkin and PlanetArt to implement MFA, encrypt Social Security numbers, collect less data, and have their information security programs assessed by a third-party. [Read More]
CrowdStrike researchers find evidence of ransomware actors deploying zero-day exploits against Mitel VOIP appliances sitting on the network perimeter. [Read More]
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.