Live Webinar | Considerations for Building Your Cybersecurity Strategy in 2021 and BeyondWebinar.
Thank you for registering with ISMG
Complete your profile and stay up to date
Cybercrime as-a-service , Fraud Management & Cybercrime , Malware as-a-Service Fresh Ransomware-as-a-Service Operations Seek Affiliates for Extorting New Victims Mathew J. Schwartz (euroinfosec) • August 26, 2021 Extracts from ransomware operators’ ransom notes and data-leak sites After a string of high-profile hits in the middle of this year, a number of the largest…
Breach Notification , Incident & Breach Response , Security Operations Seller of 99 Million Customers’ Stolen Data Calls Firm ‘Incompetent,’ but Stops Sale Mathew J. Schwartz (euroinfosec) • April 1, 2021 A broker of breached data claims via dedicated .onion leak site to have deleted 8TB of stolen MobiKwik customer data that the…
A new WhatsApp virus that promises to turn colour theme of your WhatsApp app to pink is being circulated. Internet security researcher Rajshekhar Rajaharia has warned against clicking on the APK link of the “WhatsApp Pink” Android app that is being circulated into groups. Also Read – WhatsApp ‘Stand up for Earth’ stickers introduced: How…
Fraud Management & Cybercrime , Governance & Risk Management , Patch Management FireEye: Attacks Happened Before Patch Issued for VPN Vulnerability Doug Olenick (DougOlenick) • April 30, 2021 A cyberthreat gang that’s been active since 2020 exploited a now-patched zero-day vulnerability in the SonicWall SMA 100 Series appliance to plant ransomware in attacks…
Governance & Risk Management , IT Risk Management , Next-Generation Technologies & Secure Development Updated Security Approach Designed to Mitigate Ransomware, Nation-State Attack Risks Scott Ferguson (Ferguson_Writes) • August 10, 2021 Ron Ross, NIST Fellow and one of the co-authors of an updated guide to cyber resiliency As ransomware and nation-state attacks have…
Behind the strategies and solutions needed to counter today’s cyber threats are—dedicated cybersecurity researchers. They spend their lives dissecting code and analyzing incident reports to discover how to stop the bad guys. But what drives these specialists? To understand the motivations for why these cybersecurity pros do what they do, we decided to talk with cybersecurity…