Looking ahead to 2020, Barracuda has just released a new report that outlines the four main types of spear phishing attacks, including business email compromise - and the business impact of these strikes. Michael Flouton of Barracuda shares insight.
Ransomware attacks have taken an unwelcome turn: The Maze gang reportedly has begun leaking a victim's files to create pressure to pay a ransom. Security experts say they're not surprised by this development, but note that given the different skills required, such tactics may not become widespread.
Twitter users no longer have to supply a phone number in order to use two-step verification for authentication. The move will better protect accounts from SIM hijacking attempts and also means users don't have to sacrifice some of their privacy to enable a security feature.
Stanislov Lisov, a Russian hacker who helped create the NeverQuest banking Trojan, has been sentenced to four years in federal prison after pleading guilty to one charge.
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.
The U.S. Federal Reserve is warning that the increasing use of cryptocurrencies known as "stablecoins," without proper safeguards and regulations, could pave the way for crime, including money laundering and terrorism financing.
Doppelpaymer ransomware, despite ongoing rumors, is not being spread via the Teams collaboration platform or BlueKeep remote desktop protocol flaws, Microsoft says. But it warns that the damaging crypto-locking code is being spread via stolen Active Directory administrator credentials.
To meet India's ambitious goal of growing the cybersecurity market as much as $35 billion and creating 1 million new jobs by 2025, academia need to play a critical role. Various stream of dimensions and disruptive technologies such as IoT, 5G, blockchain and issues around privacy has a huge impact on information...
India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches and to have better data protection mechanisms in place. The move could help fast-track cybercriminal investigations. But will data localization lead to improved data security or will it result in major...
Attacks tied to Shade ransomware continue to surge as part of an overall resurgence in ransomware, security researchers warn. Other malware trends include stealthy ways to sneak malicious code onto systems - including JavaScript and zipped attachments - as well as the continuing use of exploit kits.
Macy's says hackers successfully infiltrated its e-commerce website and planted rogue JavaScript, enabling them to steal customer data, including payment card information. Macy's says the breach has been contained and all stolen card numbers shared with card issuers.
U.S. Sen. Bob Menendez has sent letters to the State Department and Twitter CEO Jack Dorsey raising concerns about the insider breach at the social media platform and the role that Saudi Arabia is playing in manipulating American tech firms to crack down on dissidents.
Why try to hack Silicon Valley firms if you can buy off their employees instead? Such allegations are at the heart of a criminal complaint unsealed last week by the Justice Department, charging former Twitter employees with being Saudi agents. Experts say tech firms must hunt for employees gone rogue.
Whether you're a large enterprise that has experienced a headline data breach or a midmarket organization that has just been paralyzed by ransomware, you share points in common. Which law enforcement agency do I call after the incident has been discovered? When do I involve legal counsel? What resources are available...
The new 5G mobile networks are coming, and with them comes the promise of people, industries and things connecting on an unprecedented scale. And also with 5G come significant security concerns about secure infrastructure, connected devices and a new multifaceted attack surface. Telecommunications giant Huawei is one...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.