Cybercriminals are netting multimillion-dollar hauls by targeting healthcare industry payment processing, the FBI warns. The criminals use publicly available personally identifiable information and deploy social engineering techniques to impersonate care providers.
Vista Equity Partners has joined Thoma Bravo in the take-private cybersecurity spree, offering to buy security awareness training behemoth KnowBe4 at a $4.22 billion valuation. KnowBe4 says it has received a nonbinding offer from Vista of $24 per share for the shares not currently owned by Vista.
Palo Alto Networks has been in a 19-month dry spell when it comes to major acquisitions, but it looks like that's about to change. Israeli business publication Calcalist reported Monday the firm is closing in on a deal to buy New York-based code risk platform provider Apiiro for around $600 million.
SandboxAQ bought French vendor Cryptosense to help organizations migrate and defend key stores and hardware security modules using post-quantum cryptography architecture. Combining SandboxAQ's network scanning capabilities with Cryptosense's visibility will help firms discard RSA-based encryption.
Swiss police say that thanks to private encryption keys being recovered from a suspected member of a ransomware-wielding gang accused of amassing over 1,800 victims across 71 countries, victims of LockerGoga and MegaCortex ransomware can recover their data for free.
Ransomware gives cryptocurrency a bad name. U.S. federal regulators have noticed, publishing on Friday a slew of recommendations for ensuring that the blockchain world isn't a criminal haven. Among them are legislative proposals that would strengthen anti-money laundering statutes.
Four editors at Information Security Media Group analyze private-public partnerships today, preview ISMG's upcoming cybersecurity summit in Africa and discuss the increasing use of intermittent or partial encryption by ransomware gangs as a means to extort money from victims faster.
Uber is probing a hack attack after an intruder appeared to breach multiple internal systems, using the company's Slack messaging app to announce: "I am a hacker and Uber has suffered a data breach." The ride-hailing service has taken multiple systems offline while it investigates.
A Texas nonprofit, safety net medical center is still struggling to fully bring its communications and other systems back online two weeks after a ransomware attack in which cybercriminals have demanded a ransom in the "tens of millions of dollars.
Chinese state-backed cyber spies developed a Linux variant of a Windows backdoor to target a Hong Kong university after Beijing squashed pro-democracy protests in the city. The threat group, called SparklingGoblin, deployed the custom-built implant in February 2021, Eset researchers say.
Software point of sale or SoftPOS is a groundbreaking technology that allows businesses to accept card payments directly on their devices without requiring any additional software. As this payment method gains widespread adoption, what does it mean for the security of our payments systems?
The latest edition of the ISMG Security Report discusses the appearance at a Senate hearing this week by the former head of security for Twitter; the top-performing web application and API protection vendors, according to Gartner's Magic Quadrant 2022; and threat trends to watch for in 2023.
The specter of Chinese data collection on U.S. citizens hung over Capitol Hill in a pair of hearings as lawmakers asked whether an open internet can survive challenges such as Beijing hacking and TikTok. An executive for the short-form video app made a rare appearance before a Senate committee.
The U.S. government accused Iran of turning a blind eye to ransomware hackers after indicting three men affiliated with the Islamic Revolutionary Guard Corps. Authorities say their attacks affected critical infrastructure including healthcare centers, transportation services and utility providers.
Ransomware-wielding criminals feel the need for speed as they seek to take down victims more quickly and quietly. Cue the use of intermittent, or partial, encryption to speed up attacks. It scrambles files partially but enough to make them unusable.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.