After the defacement of multiple Ukrainian government websites last week and subsequent deployment of destructive malware against Ukraine over the weekend, Lithuanian officials have offered to deploy the EU's Cyber Rapid Response Team to help Ukraine deal with cyberattacks.
A data breach at Volvo Cars involving intellectual property theft highlights the need for identity and access management and deployment of next-gen cybersecurity measures, such as automotive security operations centers, or ASOCs, some experts say.
Ransomware continues to evolve at warp speed and is always a potential threat, regardless of your company’s size, location, or industry.
Today’s ransomware threat is more advanced than attackers simply asking for a payment. Some threat actors care more about stealing your company’s data. At any given moment,...
The automotive industry continues to be under pressure from cyberattacks targeting all business angles; from the parts they manufacture, to the customer data they house within connected cars and/or their processing systems.
This treasure trove of PII, IP, and critical data is attractive to nefarious groups and puts...
Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control.
Learn how to strengthen your stack through integration, resolving issues that arise, and detecting more threats, all while securing your guests, accelerating your network, and strengthening your network. Defend...
The year is ending with a cybersecurity bang - not whimper - due to the widespread prevalence of the Apache Log4j vulnerability. Researchers warn that at least 40% of corporate networks have been targeted by attackers seeking to exploit the flaw. More than 250 vendors have already issued security advisories.
Threat intelligence can be a useful addition to your security toolkit. It
can provide your analysts with information and context they would
not have otherwise. There are many factors to consider, including
where to obtain the intelligence, how to collect it, how to integrate it,
and how much to...
In today's disparate IT environment, there are gaping, business critical gaps in enterprise log management. Graylog's Mark Brooks discusses the Log Management Maturity Model and the six (6) critical steps to move from "no alignment" to "continuous improvement."
Our 2021 Global Workplace Report reveals that the vision for a hybrid workplace is emerging, but the detail and capability are missing.
There is no longer a neat security perimeter that divides external threats
and inside resources and it’s not always clear if your new hybrid workforce
is secure and compliant...
The U.S. Transportation Security Administration has issued new security directives for higher-risk freight railroads, passenger rail, and rail transit that it says will strengthen cybersecurity across the transportation sector in response to growing threats to critical infrastructure.
The Bioeconomy Information Sharing and Analysis Center is warning biotechnology organizations, including vaccine makers and other biomanufacturers, of escalating threats involving Tardigrade malware, which experts say is used to launch ransomware and other potentially serious attacks.
The Southeast Asian region will see a spike in multifaceted extortion with more public breaches, along with an increase in ransomware-as-a-service operations in 2022, says Singapore-based Yihao Lim, principal intelligence adviser at Mandiant Threat Intelligence.
MSPs and their SMB clients took a beating in 2021 as cybercriminals evolved their strategies and extortion tactics to succeed with costly ransomware, tech supply-chain and other attacks. Recent research shows where businesses and their IT service providers failed to close gaps in defense strategies – gaps that led...
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including why security teams are still unprepared for cyberattacks over weekends and holidays, which experts warn is when attackers love to strike.