The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.
School is out for more than 3,000 students of a suburban Detroit district undergoing its second day of forensics analysis following an online attack. Students have been told not to use district-issued Chromebooks. Federal authorities have warned that school districts are targets of ransomware gangs.
Swiss police say that thanks to private encryption keys being recovered from a suspected member of a ransomware-wielding gang accused of amassing over 1,800 victims across 71 countries, victims of LockerGoga and MegaCortex ransomware can recover their data for free.
Ransomware gives cryptocurrency a bad name. U.S. federal regulators have noticed, publishing on Friday a slew of recommendations for ensuring that the blockchain world isn't a criminal haven. Among them are legislative proposals that would strengthen anti-money laundering statutes.
Four editors at Information Security Media Group analyze private-public partnerships today, preview ISMG's upcoming cybersecurity summit in Africa and discuss the increasing use of intermittent or partial encryption by ransomware gangs as a means to extort money from victims faster.
A Texas nonprofit, safety net medical center is still struggling to fully bring its communications and other systems back online two weeks after a ransomware attack in which cybercriminals have demanded a ransom in the "tens of millions of dollars.
The U.S. government accused Iran of turning a blind eye to ransomware hackers after indicting three men affiliated with the Islamic Revolutionary Guard Corps. Authorities say their attacks affected critical infrastructure including healthcare centers, transportation services and utility providers.
Ransomware-wielding criminals feel the need for speed as they seek to take down victims more quickly and quietly. Cue the use of intermittent, or partial, encryption to speed up attacks. It scrambles files partially but enough to make them unusable.
After an international law enforcement operation shuttered stolen data forum RaidForums in February, one of its power users launched a replacement called Breached. Within months, the English-language forum has amassed more stolen records and nearly as many users as its predecessor.
Who's been disrupting ransomware operations' data leak sites by targeting them with distributed denial-of-service attacks? No one has yet claimed credit for the ongoing disruptions and slowdowns, but one likely theory is that rival operations are attempting to cause each other pain.
CISO Marcin Szczepanik recalls when his team's budget was cut dramatically after the onset of the pandemic. He wanted to invest in the latest state-of-the-art tools but prioritized his costs and focused on email security - a move that improved the company's level of cyber maturity.
Co-founder and CEO Bipul Sinha has grown Rubrik's business with existing customers by more than 40% thanks to the company's unique take on data observability. The data security vendor has emphasized data availability and resiliency in the face of crippling ransomware and extortion-based attacks.
The NFL's San Francisco 49ers will notify more than 20,000 Americans that online attackers likely stole their name and Social Security number from the sports franchise's corporate network in a February network security incident. Ransomware-as-a-service group BlackByte took credit for the attack.
Chile's national consumer protection agency was hit by a ransomware attack affecting online services and containing indicators connecting the malware with the Conti ransomware-as-a-service group. A government official says national policy is not to pay ransoms.
Insurance market giant Lloyd's of London says that starting next year, its cyber insurance policies will no longer cover state-sponsored cyberattacks. But with attribution being inherently tricky, expect this move to be tested in court, says Jonathan Armstrong, a partner at Cordery law firm.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.