Change Healthcare Breach Affects 100 Million Americans
Updated figures from the HHS revealed that 100 million patients have been notified that their data was breached in the Change Healthcare ransomware attack
Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data
CERT-UA said the phishing campaign lures victims into downloading malware used to exfiltrate files containing sensitive personal data
Irish Data Protection Watchdog Fines LinkedIn $336m
LinkedIn violated the EU’s GDPR in how it processes its users personal data for behavioral purposes
Inequity Challenges Women in Digital Trust, But Progress is Being Made
A new ISACA study reveals that pay inequity and a lack of female leadership are significant issues noted by women in the digital trust sector
MacOS-Focused Ransomware Attempts Leverage LockBit Brand
An unidentified threat actor has attempted to develop ransomware targeting macOS devices, posing as LockBit
Lazarus Group Exploits Google Chrome Flaw in New Campaign
Lazarus Group exploited Google Chrome zero-day, infecting systems with Manuscrypt malware
Penn State Settles for $1.25M Over Cybersecurity Violations
Penn State will pay $1.25m for failing federal cybersecurity standards in DoD and NASA contracts
White House Issues AI National Security Memo
The National Security Memorandum on AI sets out actions for the federal government to ensure the safe, secure and trustworthy development of AI
Fortinet Confirms Exploitation of Critical FortiManager Zero-Day Vulnerability
This high-severity flaw, dubbed FortiJump by security researcher Kevin Beaumont, has been added to CISA’s KEV catalog
UK Government Introduces New Data Governance Legislation
The Data (Use and Access) Bill governs digital verification services and the use of personal data in public services, and will revamp the Information Commissioner’s Office
Cybersecurity Teams Largely Ignored in AI Policy Development
A new ISACA study has revealed that cybersecurity professionals are often overlooked in the development of AI policies
UK Government Urges Organizations to Get Cyber Essentials Certified
On the 10th anniversary since Cyber Essentials was introduced, the UK government has highlighted the impact the scheme has had in preventing attacks
New Malware WarmCookie Targets Users with Malicious Links
WarmCookie malware, aka BadSpace, spreads via malspam, malvertising and enables persistent access
Embargo Ransomware Gang Deploys Customized Defense Evasion Tools
The recently discovered Embargo ransomware group is using Rust-based custom tools to overcome victims’ security defenses, ESET researchers have observed
Former British PM Cameron Calls for Tech Engagement with China Despite Cyber Threats
Former UK PM David Cameron called for stronger defenses against Chinese cyber espionage while advocating collaboration with Beijing, coinciding with the BRICS Summit
70% of Leaders See Cyber Knowledge Gap in Employees
70% of leaders see cyber knowledge gap; AI attacks are harder to detect, 60% expect more victims
Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration
While Internet Archive’s services slowly resume, the data breach reveals the non-profit’s security failures
US Government Pledges to Cyber Threat Sharing Via TLP Protocol
The US government has issued guidance for federal agencies on the use of Traffic Light Protocol, designed to boost intelligence sharing with the cybersecurity community
UK Government Weighs Review of Computer Misuse Act to Combat Cybercrime
The British Minister for Security Dan Jarvis said at Recorded Future’s Predict 2024 that the new government was considering reforming the 1990 legislation
US Energy Sector Vulnerable to Supply Chain Attacks
45% of security breaches in the energy sector in the past year were third-party related, according to a report by Security Scorecard and KPMG
Newer123456Older
Why not watch?
Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats
Identifying Concentration Risk and Securing the Supply Chain
Mastering Australian Privacy Act and Essential Eight While Improving Cybersecurity Posture
How to Manage Your Risks and Protect Your Financial Data
What’s hot on Infosecurity Magazine?
US Government Pledges to Cyber Threat Sharing Via TLP Protocol
News
1
70% of Leaders See Cyber Knowledge Gap in Employees
News
2
Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration
News
3
LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks
News
4
FIN7 Gang Hides Malware in AI “Deepnude” Sites
News
5
Phishing Attack Impacts Over 92,000 Transak Users
News
6
New Cyber Regulations: What it Means for UK and EU Businesses
Webinar
1
The Future of Fraud: Defending Against Advanced Account Attacks
Webinar
2
Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack
Webinar
3
Learn Key Strategies for Industrial Data Security
Webinar
4
Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats
Webinar
5
How to Proactively Remediate Rising Web Application Threats
Webinar
6
#CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals
News Feature
1
Russia's SVR Targets Zimbra, TeamCity Servers for Cyber Espionage
News
2
#CyberMonth: How to Outsmart Novel Phishing Tactics and Techniques
News Feature
3
Ivanti: Three CSA Zero-Days Are Being Exploited in Attacks
News
4
#CyberMonth: How to Protect Your Digital Life, Six Ways to Stay Safe Online
News Feature
5
31 New Ransomware Groups Join the Ecosystem in 12 Months
News
6