Dark Reading: Attacks/Breaches
FBI Publishes GandCrab Decryption Keys
Tue, 16 Jul 2019 14:30:00 EDT
Publishing the keys should render existing versions of the ransomware far less dangerous for victims.
How Attackers Infiltrate the Supply Chain & What to Do About It
Tue, 16 Jul 2019 14:00:00 EDT
With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.
US Mayors Commit to Just Saying No to Ransomware
Tue, 16 Jul 2019 11:10:00 EDT
The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?
Is 2019 the Year of the CISO?
Tue, 16 Jul 2019 10:30:00 EDT
The case for bringing the CISO to the C-suite's risk and business-strategy table.
Flaws in Telegram & WhatsApp on Android Put Data at Risk
Mon, 15 Jul 2019 18:00:00 EDT
App settings combined with Android behavior can put data integrity at risk for WhatsApp and Telegram users.
Meet DoppelPaymer, BitPaymer's Ransomware Lookalike
Mon, 15 Jul 2019 16:25:00 EDT
New ransomware variant DoppelPaymer was leveraged in campaigns against the City of Edcouch, Texas, and the Chilean Ministry of Agriculture.
Is Machine Learning the Future of Cloud-Native Security?
Mon, 15 Jul 2019 10:00:00 EDT
The nature of containers and microservices makes them harder to protect. Machine learning might be the answer going forward.
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
Fri, 12 Jul 2019 13:00:00 EDT
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.
Data Center Changes Push Cyber Risk to Network's Edge
Thu, 11 Jul 2019 19:00:00 EDT
Changes in fundamental enterprise architectures coupled with shifts in human resources mean that companies are considering new risks to their infrastructure.
APT Groups Make Quadruple What They Spend on Attack Tools
Thu, 11 Jul 2019 17:45:00 EDT
Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge.
How to Catch a Phish: Where Employee Awareness Falls Short
Thu, 11 Jul 2019 16:45:00 EDT
Advanced phishing techniques and poor user behaviors that exacerbate the threat of successful attacks.
Most Organizations Lack Cyber Resilience
Thu, 11 Jul 2019 14:00:00 EDT
Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience.
Monroe College Hit with Ransomware Attack
Thu, 11 Jul 2019 13:30:00 EDT
All campuses are affected, with attackers demanding $2 million in Bitcoin in exchange for decryption keys.
Summer: A Time for Vacations & Cyberattacks?
Thu, 11 Jul 2019 12:01:00 EDT
About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.
The Security of Cloud Applications
Thu, 11 Jul 2019 10:30:00 EDT
Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong.
Persistent Threats Can Last Inside SMB Networks for Years
Thu, 11 Jul 2019 08:00:00 EDT
The average dwell time for riskware can be as much as 869 days.
Financial Firms Face Threats from Employee Mobile Devices
Wed, 10 Jul 2019 17:10:00 EDT
A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions - via mobile devices in the hands of their employees.
New Ransomware Targets QNAP's Network-Attached Storage Devices
Wed, 10 Jul 2019 16:05:00 EDT
More than 19,000 systems in the US are potentially at risk from eCh0raix.
Why You Need a Global View of IT Assets
Wed, 10 Jul 2019 14:00:00 EDT
It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have.
Financial Impact of Cybercrime Exceeded $45B in 2018
Tue, 09 Jul 2019 17:35:00 EDT
Cybersecurity analysts explore a range of industry research to examine trends around cyber incidents and their financial impact.