In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.
Want defensive advice from a ransomware-wielding attacker? In a tell-all interview, a LockBit 2.0 representative not only extols the virtues of his malware, but also advises would-be victims to hire red teams, keep their software updated and educate employees to resist social engineering attacks.
The Department of Labor is offering $240 million in grants to states to help fight against unemployment benefits fraud. Eva Velasquez, CEO at the Identity Theft Resource Center, offers insights on making the most of this investment with a multilayered security approach.
Mastercard says that starting in 2024, banks and other institutions that issue its credit and debit cards will no longer need to include a magnetic stripe on the back, and that by 2033, m
agnetic stripes will be extinct. Given magnetic stripes' many security downsides, what's taken so long?
Despite these financial headwinds, new ways are emerging for FIs to differentiate on the quality of fraud prevention and outreach they can provide to customers.
Sometimes, that email from your boss isn't really an email from your boss. Business email compromise (BEC) has become the costliest form of cyber crime, tricking victims out of more than $1.8 billion in 2020 alone. These highly targeted cybersecurity threats are easy to fall for and invisible to traditional security...
The U.S. and Singapore have announced three agreements to expand their collaborative efforts - including shoring up information sharing, research and training - to address global cybersecurity issues.
John "Chris" Inglis says one of his first priorities as national cyber director within the White House is focusing on issues of cyber resiliency. Battling ransomware and coordinating government responses with the private sector are also top issues he's tackling.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the evolution of fraud trends and the challenges in implementing the "zero trust" framework in the OT environment.
A Massachusetts man who used SIM swapping and other account takeover techniques to target business executives and steal more than $530,000 worth of cryptocurrency has pleaded guilty to several federal charges.
CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a
unique role in the IT security industry. Other surveys do a great
job of collecting statistics on cyberattacks and data breaches
and exploring the techniques of cybercriminals and other bad
actors. Our mission is to provide deep insight into the minds...
Cybersecurity is a top priority for Enterprise networks, but as cyberattacks and data breaches become more prevalent, traditional cybersecurity approaches fall short.
"Detect and remediate" has long been the cybersecurity standard but as attackers become more sophisticated and attack rates continue to grow,...
Initial access brokers continue to sell easy access to networks. Given the uptake of such access by ransomware operations over the past year, one surprise is that relatively few individuals appear to be serving as brokers, which, of course, makes them an obvious target for law enforcement authorities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.