Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.
The “Ransom Disclosure Act would require ransomware victims to disclose ransom payments within 48 hours of payment — including the amount of ransom demanded and paid the type of currency used for payment of the ransom, and any known information about the entity demanding the ransom.
Despite the flurry of cyberattacks, an Untangle report finds that SMBs are expanding and embracing new work environments and investing in and investigating new technologies to secure their business.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
GridEx has grown to be the largest distributed play exercise of its kind in North America, serving as a critical benchmark that maximizes the ability of organizations to coordinate with neighboring utilities and reliability coordinators to effectively exercise and address grid reliability issues.
By understanding each of the bad actors, federal agencies, law enforcement and first responders — often victims of cyberhacktivism —can better prepare for, and prevent, cyberattacks from happening. Here are a few basic steps every public safety agency can take.
Cyentia Institute and RiskRecon released research that quantifies how a multi-party data breach impacts many other organizations in today’s interconnected digital world.
While researching a misconfiguration in the popular workflow platform Apache Airflow, Intezer discovered several unprotected instances. These unsecured instances expose companies’ sensitive information across various industries.
It’s difficult for security teams to get executive buy-in to address the problem because measuring and improving AD security is challenging. There are several reasons why.