The DOJ extradited from Colombia 37-year-old Mihai Ionut Paunescu, who faces criminal charges for allegedly running a "bulletproof" hosting service that helped cybercriminals launch malware attacks. He is set to undergo trial for conspiracy to commit computer intrusion, bank fraud and wire fraud.
What happened to the Russian cyber war? It was almost a universal prediction: Cyberattacks against Ukrainian digital infrastructure would help invaders seize control. But Kyiv has managed to resist such efforts. Here are nearly a dozen lessons learned so far from the war's cyber operations.
The U.S. Justice Department clawed back $500,000 from North Korean-government-sponsored cyberattackers who launched Maui ransomware assaults on the U.S. healthcare sector. Healthcare ransomware attacks have soared over the past two years, and the sector is among those most likely to pay a ransom.
A $2 billion fund to root out equipment from Chinese manufacturers Huawei and ZTE operating within small and rural U.S. telecoms isn't enough to cover costs, the Federal Communications Commission informed Congress. The program's full cost is closer to $5 billion, wrote FCC Chair Jessica Rosenworcel.
Hackers used a vulnerability in NFT collection platform Premint to steal more than 300 blockchain entries, netting more than $421,000 in stolen proceeds, all has been deposited into Torando Cash. The incident is among the largest NFT thefts this year. Some Premint users also saw a Rickroll.
The Albanian government says a cyberattack forced the national e-services portal offline. The office of Prime Minister Edi Rama says the attack is similar to those seen in Ukraine and other European countries where there has been an uptick in cyberattacks following Russia's invasion of Ukraine.
Venable's Grant Schneider and Jeremy Grant and ISMG editors discuss progress at the U.S. federal level in developing legislation for digital identity, the significance of an 18% increase in funding for CISA in fiscal year 2023 and the challenges of expanding the use of software bills of materials.
Microsoft security researchers say they're tracking a hacking group originating in North Korea that may be a side project of an established threat actor. So far the group, which prefers the name "H0lyGh0st," appears not to have collected any ransom.
Synthetic identity fraud can take eight to 12 months before resulting in mass fraud, meaning banks must leverage that opening to reauthenticate customers, says, Greg Woolf, founder and CEO of FiVerity. Synthetic IDs are often hard to detect, but "over a period of time, there are telltale signs."
Four ISMG editors discuss important cybersecurity issues, including lessons learned from the cyberattack on a steelmaker in Iran that caused a serious fire, how the economic crisis in Sri Lanka is affecting cybersecurity and what the rising cost of cyber insurance means for the industry.
Ransomware attacks and data breaches: One thing both have in common is the challenge of attempting to accurately understand their true scale and impact. Too often, data breach notifications lack useful details, while ransomware attacks and ransom payments go unreported.
A little more than halfway into the year, hacking incidents, and especially ransomware incidents, as well as breaches involving business associates, are dominating the hundreds of major health data breaches affecting millions of individuals being reported to federal regulators.
Attackers used a phishing campaign to direct unwitting Microsoft business email customers into supplying logon credentials to a proxy server. Attackers stole online session cookies, allowing them to defeat MFA and access inboxes. From there, they emailed corporate vendors to obtain financial data.
Threat actors carried out smishing attacks on nearly 10,000 Australian students enrolled at Deakin University and downloaded PII of about 47,000 students. Hackers compromised an employee's credentials to access the university's third-party SMS solutions provider to execute the attack.
The latest edition of the ISMG Security Report analyzes why the number of ransomware attacks and the amounts being paid in ransoms are both on the rise. It also discusses today's cyberthreat landscape and whether organizations should rely on user training to improve security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.