BankInfoSecurity.com
Post-Quantum Cryptography Is Here: What Are You Waiting For?
4 months ago
Post-Quantum Cryptography Is Here: What Are You Waiting For?
4 months ago
High Profile AI Fraud: DeepFake, Identity Imitation
4 months ago
French Police Arrest Telegram CEO and Owner
4 months ago
Pavel Durov Reportedly Detained For Complicity Over Criminal Use
French media reported Saturday the detention outside Paris of Pavel Durov, CEO and owner of social media network Telegram, reportedly for failing to take steps to curb criminal activity on the platform. The Russian Embassy in France said it has demanded an explanation from the French government.
French media reported Saturday the detention outside Paris of Pavel Durov, CEO and owner of social media network Telegram, reportedly for failing to take steps to curb criminal activity on the platform. The Russian Embassy in France said it has demanded an explanation from the French government.
Credit Union Issues Belated MOVEit Data Breach Notification
4 months ago
Texas Credit Union Only Just Notifying 500,000 Members About May 2023 Data Theft
Fifteen months after a massive supply-chain attack hit users of MOVEit secure file-transfer software, Texas Dow Employees Credit Union has issued a data breach notification pertaining to 500,474 victims, saying it only discovered last month their personally identifiable information got stolen.
Fifteen months after a massive supply-chain attack hit users of MOVEit secure file-transfer software, Texas Dow Employees Credit Union has issued a data breach notification pertaining to 500,474 victims, saying it only discovered last month their personally identifiable information got stolen.
Auditors Uncover Lax FBI Hard Drive Disposal Practices
4 months ago
Hard Drives Slated For Destruction Kept in Open Cardboard Boxes
The FBI had a loose hard disk disposal problem that auditors say put classified information at risk. The bureau, auditor said, has a tracking system for obsolete computers and servers earmarked for destruction - but not for storage media extracted from the computer chassis.
The FBI had a loose hard disk disposal problem that auditors say put classified information at risk. The bureau, auditor said, has a tracking system for obsolete computers and servers earmarked for destruction - but not for storage media extracted from the computer chassis.
Seattle-Tacoma Airport IT Outages Persist Into Day 3
4 months ago
Disruptions Affecting Website, Terminal Information Screens, Baggage Sorting System
Travelers in the Pacific Northwest's busiest airport should travel light and gird for extra levels of frustration in the aftermath of a suspected Saturday cyberattack. The Seattle-Tacoma International Airport said that systems "experienced certain system outages indicating a possible cyberattack."
Travelers in the Pacific Northwest's busiest airport should travel light and gird for extra levels of frustration in the aftermath of a suspected Saturday cyberattack. The Seattle-Tacoma International Airport said that systems "experienced certain system outages indicating a possible cyberattack."
The Strategic Need for Employee Training and Education
4 months ago
Why the Benefits Far Outweigh the Risks
Today's workforce is increasingly insisting on having employer-provided education and development opportunities. Learn why offering employees opportunities for education and development is both a retention strategy and a key component of a successful business strategy.
Today's workforce is increasingly insisting on having employer-provided education and development opportunities. Learn why offering employees opportunities for education and development is both a retention strategy and a key component of a successful business strategy.
Post-Quantum Cryptography Is Here: What Are You Waiting For?
4 months ago
How Cybercrime Fuels Human Trafficking and Gambling Scams
4 months ago
Infoblox Researchers on Links Between Human Trafficking, Cybercrime and Gambling
Illegal gambling operations depend on trafficked individuals to perform cybercriminal activities. Threat researchers at Infoblox explain how cybercriminals use trafficked people for operations such as pig-butchering scams and leverage European sports sponsorships to boost illegal gambling websites.
Illegal gambling operations depend on trafficked individuals to perform cybercriminal activities. Threat researchers at Infoblox explain how cybercriminals use trafficked people for operations such as pig-butchering scams and leverage European sports sponsorships to boost illegal gambling websites.
$2.25M Settlement Reached in Atlantic General Hack Lawsuit
4 months ago
Nearly 137,000 People Affected in 2023 Ransomware Attack on Maryland-Based Hospital
A ransomware attack against Berlin, Maryland-based Atlantic General Hospital that affected the personal information of 137,000 individuals in 2023 has led to a $2.25 million preliminary settlement of a consolidated proposed federal class action lawsuit.
A ransomware attack against Berlin, Maryland-based Atlantic General Hospital that affected the personal information of 137,000 individuals in 2023 has led to a $2.25 million preliminary settlement of a consolidated proposed federal class action lawsuit.
Are the New FAA Cyber Requirements for Future Planes Enough?
4 months ago
Federal Aviation Administration Seeks Public Input on New Cyber Rules for Airplanes
The U.S. Federal Aviation Administration is seeking public comment on a proposed rule that aims to further elevate and streamline cyber regulations for future airplanes and aircraft equipment. The rule isn't intended to have a substantive effect on airliner cybersecurity standards.
The U.S. Federal Aviation Administration is seeking public comment on a proposed rule that aims to further elevate and streamline cyber regulations for future airplanes and aircraft equipment. The rule isn't intended to have a substantive effect on airliner cybersecurity standards.
Researchers Thrust a Virtual Stick Into the Bike Spokes
4 months ago
Wireless Gear Shifting System Is Vulnerable to Replay Attacks
Imagine cruising down a bike path and having the gears suddenly shift without warning. Security researchers say cybercriminals could take advantage of new wireless controlled bicycle gear systems to make that happen - and cause crashes and injuries.
Imagine cruising down a bike path and having the gears suddenly shift without warning. Security researchers say cybercriminals could take advantage of new wireless controlled bicycle gear systems to make that happen - and cause crashes and injuries.
Addressing the OT SOC Challenges in Industrial Environments
4 months ago
EY's Piotr Ciepiela Discusses Key Challenges in Implementing, Maintaining OT SOCs
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
McLaren Health Expects IT Disruption to Last Through August
4 months ago
Patients Still Asked to Bring Paper Records to Appointments Post-Ransomware Attack
McLaren Health Care expects IT disruptions caused by a ransomware attack earlier this month to last through the end of August. While most of McLaren's facilities are open, IT systems across its hospitals, cancer centers and clinics are still affected, including electronic medical record access.
McLaren Health Care expects IT disruptions caused by a ransomware attack earlier this month to last through the end of August. While most of McLaren's facilities are open, IT systems across its hospitals, cancer centers and clinics are still affected, including electronic medical record access.
California AI Catastrophe Bill Clears Committee
4 months ago
New Version Aims to Ensure AI Safety While Keeping Its Builders Happy
California state lawmakers watered down a bill aimed at preventing artificial intelligence disasters after hearing criticism from industry and federal representatives. The bill still faces opposition from Silicon Valley and Democratic lawmakers.
California state lawmakers watered down a bill aimed at preventing artificial intelligence disasters after hearing criticism from industry and federal representatives. The bill still faces opposition from Silicon Valley and Democratic lawmakers.
How Ransomware Group Stability Affects Payment Decisions
4 months ago
Robert Boyce on Accenture's Strategy for Assessing the Behavior of Ransomware Gangs
Accenture Global Cyber Resilience Lead Robert Boyce outlines why organizations must assess the stability of ransomware groups before deciding how to respond to extortion threats. He outlines how trustworthiness of ransomware gangs can affect the likelihood of receiving decryption keys after payment.
Accenture Global Cyber Resilience Lead Robert Boyce outlines why organizations must assess the stability of ransomware groups before deciding how to respond to extortion threats. He outlines how trustworthiness of ransomware gangs can affect the likelihood of receiving decryption keys after payment.
No Deal: Action1 Rebuffs CrowdStrike's Interest in $1B Buy
4 months ago
Action1 Opts For Independence, Believes It Can Become Multi-Billion Dollar Business
Action1 has rebuffed CrowdStrike's interest in acquiring the patch management and vulnerability remediation startup for $1 billion and opted to remain independent. Action 1 has decided to turn down acquisition inquiries since the company believes it can grow into a multi-billion dollar business.
Action1 has rebuffed CrowdStrike's interest in acquiring the patch management and vulnerability remediation startup for $1 billion and opted to remain independent. Action 1 has decided to turn down acquisition inquiries since the company believes it can grow into a multi-billion dollar business.
Cybersecurity Consulting: Is It the Right Career for You?
4 months ago
Explore the Wide Range of Categories and Services and What It Takes to Do the Job
Cybersecurity consulting encompasses a wide array of services and specialties, ranging from high-level strategic guidance to hands-on technical support. Discover the categories and learn how to position yourself as a trusted expert in the cybersecurity consulting field.
Cybersecurity consulting encompasses a wide array of services and specialties, ranging from high-level strategic guidance to hands-on technical support. Discover the categories and learn how to position yourself as a trusted expert in the cybersecurity consulting field.
Checked
9 hours 2 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed