DataBreachToday.com
Ransomware Recovery Hands-On Lab: Real-World Challenges
1 week 5 days ago
Bitcoin Fixer Convicted for Role in Money Laundering Scheme
1 week 5 days ago
$7 Billion Illicit Bitcoin Horde: Malaysian National Latest to Plead Guilty
A Malaysian national pleaded guilty Tuesday in an English courtroom to assisting an investment fraud scammer who converted stolen assets into a cryptocurrency treasure trove now worth $7.1 billion, including helping her to evade arrest by lining up assistants and Airbnb rentals in Scotland.
A Malaysian national pleaded guilty Tuesday in an English courtroom to assisting an investment fraud scammer who converted stolen assets into a cryptocurrency treasure trove now worth $7.1 billion, including helping her to evade arrest by lining up assistants and Airbnb rentals in Scotland.
Webinar | Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
1 week 6 days ago
Live Webinar | Translating Cyber Risk for the Board: Making Human Security a C-Suite Priority
1 week 6 days ago
The Browser Is Now the Workplace: How Your Organization Could Be Exposed
1 week 6 days ago
China's 'Phantom Taurus' Hacks Middle East
1 week 6 days ago
Threat Actor Shifts From Targeting Exchange to Databases
A Chinese cyberespionage threat actor with a history of hacking Microsoft Exchange to spy on geopolitical events including summits in Africa, the Middle East and Asia, has shifted its attention to targeting databases, say researchers.
A Chinese cyberespionage threat actor with a history of hacking Microsoft Exchange to spy on geopolitical events including summits in Africa, the Middle East and Asia, has shifted its attention to targeting databases, say researchers.
Hour-Long Email Phishing Breach Affects PHI of 150,000
1 week 6 days ago
Medication Tech Firm Says Hacking Incident Contained to One Employee Email Account
A Florida firm that offers medication therapy management services to health plans is notifying nearly 150,000 individuals that their information was potentially compromised in a phishing attack affecting one employee's email account for only about an hour. Why do users still fall for phishing scams?
A Florida firm that offers medication therapy management services to health plans is notifying nearly 150,000 individuals that their information was potentially compromised in a phishing attack affecting one employee's email account for only about an hour. Why do users still fall for phishing scams?
What Happens to Cyberthreat Sharing After CISA 2015?
1 week 6 days ago
Public-Private Cyberthreat Sharing at Risk Amid Shutdown, Experts Warn
With a key cyberthreat sharing law expiring Tuesday, analysts tell Information Security Media Group legal protections enabling cyberthreat sharing across the public and private sectors will vanish, raising fears of reduced visibility into critical infrastructure just as federal resources shrink.
With a key cyberthreat sharing law expiring Tuesday, analysts tell Information Security Media Group legal protections enabling cyberthreat sharing across the public and private sectors will vanish, raising fears of reduced visibility into critical infrastructure just as federal resources shrink.
How the $25B Palo Alto Networks-CyberArk Deal Came Together
1 week 6 days ago
A Look at How the 2nd Largest Deal in Cyber History Nearly Fell Apart in the 11th Hour
The second-largest acquisition in cybersecurity history included initial outreach in 2023, the seller nearly walking away and an accelerated announcement timeline due to media leaks. Palo Alto CEO Nikesh Arora first approached CyberArk Chairman Udi Mokady about a potential deal back in May 2023.
The second-largest acquisition in cybersecurity history included initial outreach in 2023, the seller nearly walking away and an accelerated announcement timeline due to media leaks. Palo Alto CEO Nikesh Arora first approached CyberArk Chairman Udi Mokady about a potential deal back in May 2023.
Webinar | Data Protection in the Cloud: Latest Insights & Real-World Trends
2 weeks ago
Unpatched Cognex Cameras Expose Industrial Systems
2 weeks ago
Cognex Says It Won't Patch Flaws
Nearly a dozen serious vulnerabilities in a Cognex industrial smart camera will go without a patch because the company says the model is "too old to merit a fix." Industrial security firm Nozomi Networks uncovered nine flaws during a security assessment.
Nearly a dozen serious vulnerabilities in a Cognex industrial smart camera will go without a patch because the company says the model is "too old to merit a fix." Industrial security firm Nozomi Networks uncovered nine flaws during a security assessment.
OneBlood Agrees to Pay $1M Settlement in Ransomware Hack
2 weeks ago
2024 Cyberattack Was One of Several on Other Blood Suppliers in US, UK
OneBlood, which provides blood supplies to 250 hospitals in Florida, Georgia and the Carolinas, will pay $1 million to settle proposed class action litigation filed against the non-profit entity in the wake of a 2024 ransomware attack that compromised the information of nearly 170,000 individuals.
OneBlood, which provides blood supplies to 250 hospitals in Florida, Georgia and the Carolinas, will pay $1 million to settle proposed class action litigation filed against the non-profit entity in the wake of a 2024 ransomware attack that compromised the information of nearly 170,000 individuals.
Who's Minding the Machines? The Identity Crisis Nobody Owns
2 weeks ago
Machine Identities Outpace Human Ones, But Accountability Lags Behind
Machine identities already outnumber human users in many organizations, but the answer to who owns them, who rotates their keys, audits their actions and takes the fall when something goes wrong often depends on who's responding - and the answers rarely align.
Machine identities already outnumber human users in many organizations, but the answer to who owns them, who rotates their keys, audits their actions and takes the fall when something goes wrong often depends on who's responding - and the answers rarely align.
OT Operators Urged to Map Networks or Risk Major Blind Spots
2 weeks ago
Global Cyber Agencies Call for Exhaustive OT Inventories to Combat Threats
Global cyber agencies are urging critical infrastructure owners and operators to maintain "definitive records" of their complex operational technology environments, calling for exhaustive asset visibility as regulators shift toward prescriptive mandates to counter escalating threats.
Global cyber agencies are urging critical infrastructure owners and operators to maintain "definitive records" of their complex operational technology environments, calling for exhaustive asset visibility as regulators shift toward prescriptive mandates to counter escalating threats.
Webinar | From Chaos to Control: Closing the Observability Gap and Driving Maturity
2 weeks ago
Webinar | From Chaos to Control: Closing the Observability Gap and Driving Maturity
2 weeks ago
Webinar | Next-Gen SaaS Data Protection: Product Roadmap & Feature Innovations
2 weeks ago
UK Government Backs Jaguar Land Rover With 1.5B Pound Loan
2 weeks ago
Carmaker Anticipates Phased Restart of Production
The British government will guarantee a 1.5 billion pound loan to Jaguar Land Rover as the embattled carmaker grapples with the fallout of a September cyberattack that froze production and sales across the globe. The government backed-loan shows the hack endangered "national economic security."
The British government will guarantee a 1.5 billion pound loan to Jaguar Land Rover as the embattled carmaker grapples with the fallout of a September cyberattack that froze production and sales across the globe. The government backed-loan shows the hack endangered "national economic security."
Webinar | Unlock the Strategic Value of Cyber Threat Intelligence (CTI) to Reduce Enterprise Risk
2 weeks 3 days ago
Checked
48 minutes 58 seconds ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed