Anti-virus vendor Kaspersky Lab says that an internal probe has confirmed that in 2014 a PC running its anti-virus software flagged and submitted new Equation Group APT malware variants. But after an analyst realized the provenance of the source code, the firm says its CEO ordered that it be immediately deleted.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It's the age of open banking, and that means changes for banking institutions and their customers - as well as for fraudsters. Just as open banking era makes business easier for customers, it also enables new opportunities for cybercriminals.
Download this eBook interview transcript and learn about:
A hacker exploited an unpatched, 12-month-old flaw in a small Australian defense contractor's IT help desk and stole data for the country's F-35 Joint Strike Fighter program, among other secrets, the Australian government has warned.
North Korea's leaders apparently blew a gasket over "The Interview," a comedy film that centered on an assassination plot against North Korea's leader. So how might the country have reacted to U.S.-South Korean "decapitation strike" plans reportedly stole last year by Pyongyang-affiliated hackers?
Credit-reporting agency Equifax now says records exposed in the massive data breach it revealed last month included information relating to 15.2 million U.K. residents - a much higher figure than the business first suggested.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
Card issuers can view the merchants with whom a cardholder does business, the frequency of a cardholder's purchases, and the devices and IP addresses associated with that specific card. While this allows them to understand and assess certain patterns of behavior for individual cardholders, it restricts analysis to the...
The chairman of the Securities and Exchange Commission, Jay Clayton, promised the Senate banking committee Tuesday that his agency is pursuing numerous cybersecurity improvements in the wake of a May 2016 breach.
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. In it, respondents say their organizations continue to connect new and different types of endpoints, including point-of-sale (POS) devices, printers,...
Infirmary Health System is the largest non-government healthcare team in Alabama, treating more than 100,000 patients annually. The organization deployed a security solution to qualify for meaningful use dollars and reduced security incidents significantly.
Download this case study and learn:
Why Infirmary Health...
The chairman of the U.S. Securities and Exchange Commission will face the Senate Banking Committee next week following the agency's belated disclosure that in May 2016, hackers stole secret market data from the SEC's systems and apparently used it for "illicit gain through trading."
In today's dynamic threat landscape, "real-time" is the operative phrase - and it needs to apply both to threat detection and incident response, says Tim Bandos of Digital Guardian. What are the required security controls and tools?
Hackers behind the mega-breach at Equifax stole data in May, but they - or other attackers - penetrated the credit bureau's systems in March, exploiting a vulnerability for which Apache Struts had issued a patch, just four days prior.