An Australian nonprofit children's charity warned about 80,000 donors of the compromise of their credit card and personal information resulting from a recent hacking incident. The Smith Family says the hacker failed to steal any charity funds but did manage to access donor data.
Authorities charged six people, including five former Tennessee hospital workers, with conspiracy in disclosing health data. Federal prosecutors say the six sold information about patients involved in motor vehicle accidents to third parties, including chiropractors and personal injury attorneys.
A large-scale cyberespionage campaign by notorious China-based advanced persistent threat actor Mustang Panda is targeting government, academic and other sectors globally. Its main targets include Asia-Pacific organizations in Myanmar, Australia, the Philippines, Japan and Taiwan.
Trade-related services resumed Monday at Central Depository Services Ltd. in India, days after trading was suspended during a cyberattack Friday. All pending trades have now been settled, though brokers report some continued IT issues. The service says it appears that no data has been compromised.
A year after buying Wickr's encrypted instant-messaging app, Amazon will shut down Wickr Me on Dec. 31, 2023. The app has come under law enforcement scrutiny for allegations that the strong encryption shields drug peddlers and child abusers from prosecution.
Data breaches are tricky to cover, and we want to report on them in an ethical way. That requires picking what should be reported for informed public discourse but avoiding topics that may encourage attackers' efforts to shame victims into paying a ransom and anything resembling data dump voyeurism.
The U.S. Department of Justice on Friday charged 10 individuals with using business email compromise and money laundering schemes to target public and private insurers. These schemes targeted Medicare, state Medicaid programs, private health insurers and numerous other victims.
Why is credential stuffing hard to solve? Are weak passwords the only reason behind credential stuffing attacks? Experts Sanjay Singh, head of DevSecOps at Games24x7, and Navaneethan M., CISO at Groww, explain how geo-based authentication, user behavior analytics and monitoring can detect breaches.
A well-orchestrated strategy for responding to ransomware or malware intrusion requires the right mindset and an approach that covers the entire kill chain process. Nitin Varma, managing director of CrowdStrike for India and SAARC, discusses how to respond and restore after being attacked.
After the collapse of the FTX cryptocurrency exchange, I received a small postcard from Japan. The sender was Mt. Gox. Here's how I bought a bitcoin for $12 and had a painful front-row seat for the first big cryptocurrency exchange collapse, plus some thoughts about cryptocurrency.
Cyberattackers love to strike on weekends and holidays - that's not news. What is news: These attacks cost more than weekday incidents, and they take a heavy toll on defenders. Cybereason's Sam Curry shares insight from the new study "Organizations at Risk: Ransomware Attackers Don’t Take Holidays."
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
Join us for an informative webinar session as we dive into the hard truth of phishing attacks. Phishing has evolved to be more precise and deceptive than ever before, with the influx of mobile devices, screen sizes and many other sophisticated schemes tricking users into divulging information that can compromise...
Cybercrime is always evolving as threat actors find new ways to infiltrate organizations, steal money, and cause damage. So what should you prepare for in 2023?
Join this webinar with Crane Hassold, Director of Threat Intelligence at Abnormal Security, where he’ll dive into the trends we saw in 2022 and provide...
The Cyber Police of Ukraine arrested five cybercrime gang members for their participation in a transnational scheme to fleece buyers into a supposed cryptocurrency and securities investment platform. The gang has established call centers around Europe, including three in Kyiv and Ivano-Frankivsk.