In this update, four editors discuss key cybersecurity issues, including addressing the complexity of security, the rising number of victims targeted by double extortion ransomware and the Information Commissioner's Office's recent consultation on creating an international data transfer agreement.
A free decryptor for BlackByte ransomware has been released by security researchers at Trustwave who cracked the crypto-locking malware's encryption. But they say that unfortunately, the underlying encryption problem is likely in the process of already being fixed by the malware's developer.
The latest edition of the ISMG Security Report features an analysis of attempts made by European law enforcement to encourage young cybercriminals to channel their skills in more ethical ways. Also featured: Fraud detection and response; inspiring behavioral change.
Democratic lawmakers on the House Committee on Energy and Commerce announced legislation that would rein in tech algorithms on platforms exceeding 5 million monthly viewers. This follows a high-profile whistleblower case heard before Congress on Facebook's allegedly questionable data policies.
The American Osteopathic Association has just begun notifying nearly 28,000 individuals about a June 2020 data exfiltration incident involving their personal information. The medical professional organization says workforce challenges during the pandemic led to the notification delay.
Australia plans to require businesses with more than $10 million in revenue to report ransomware attacks to the government, part of a comprehensive strategy to fight the attacks that also includes new criminal penalties and assistance to victims. The plan would need to be passed by Parliament.
The breach of text message routing giant Syniverse revealed yet another supply chain attack involving a key supplier, exacerbated by outdated communications protocols desperately in need of a security revamp and better incentives for improvement, says mobile telephony security expert Karsten Nohl.
ReversingLabs commissioned Forrester Consulting to conduct a Total
Economic Impact™ (TEI) study and examine the potential return on
investment (ROI) enterprises may realize by deploying its Titanium
Platform. The purpose of this study is to provide readers with a framework
to evaluate the potential financial...
The strategic importance of securing software that enriches our
daily lives - our banking systems and ATMs, medical records,
utilities and even our connected homes and cars - cannot be
understated. Malicious actors are actively targeting software
supply chains with new levels of sophistication and...
As digital business and remote work become the new normal, organizations recognize their increasing
exposures to cyberattacks and the need to refactor their security strategies accordingly. In response to this
new landscape several key factors are influencing the demand for an inhouse Malware Lab,...
As sophisticated malware continues to evade existing detection tools and
processes, security teams must adopt new technologies and use them to deploy
new detection, hunt, and response capabilities. Security teams looking to improve
threat intelligence, hunting, analysis, and rapid response capabilities...
A flurry of hacking incidents and other recent breach developments highlight the cyberthreats and risks facing fertility healthcare and other related specialty providers that handle sensitive patient information.
In an effort to bolster endpoint protection within the U.S. government, the White House is ordering federal agencies to allow CISA to access existing deployments. It is also setting timelines for improving the protection of workstations, mobile phones and servers.
One measure of the damage being done by ransomware groups continues to be how many victims get listed on ransomware operators' dedicated data leak sites, as part of their so-called double extortion tactics. Unfortunately, the number of victims doesn't appear to be declining.