Fraudulent Instruction Losses Spike in 2022
Insurer says claimants have risen in nearly every sector
Cyber News, Cyber Threat TrendsInsurer says claimants have risen in nearly every sector
Cyber News, Cyber Threat TrendsA 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon, a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. KrebsOnSecurity has learned that the defendant was busted in March 2022, after […]
Cyber News, Cyber Threat TrendsLast week, the US Cybersecurity and Infrastructure Security Agency (CISA) released voluntary cross-sector Cybersecurity Performance Goals (CPGs). CISA was required to produce the CPGs under a national security memo on improving cybersecurity for critical infrastructure control systems issued by President Biden in July 2021. Working in coordination with the National Institute of Standards and Technology […]
Cyber News, Cyber Threat TrendsEngineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control system breaches in companies surveyed globally this year, doubling from the year earlier, according to research conducted by the SANS Institute and sponsored by Nozomi Networks. While the number of respondents who said they had experienced a […]
Cyber News, Cyber Threat TrendsWanted! Not only the extortionist who abused the data, but also the CEO who let it happen.
Cyber News, Cyber Threat TrendsPatients of Dutch mental health clinics are being warned that their personal records have fallen into the hands of hackers following a security breach at an online portal that “guaranteed” their privacy. Read more in my article on the Hot for Security blog.
Cyber News, Cyber Threat TrendsThe guidance is for network defenders and leaders to understand and respond to DDoS attacks
Cyber News, Cyber Threat TrendsThe firm is one of the defense department’s external providers employed to run one of its websites
Cyber News, Cyber Threat TrendsThe researchers were able to obtain the ZIP file containing the samples for the data breach
Cyber News, Cyber Threat Trends