Cyber espionage campaigns focus on gaining access to journalist networks by impersonating legitimate members of the profession. The state sponsored hackers then hunt for useful geopolitical information.
Third-party access can quickly transform from an enabler of operational efficiency into a security strategy Achilles heel if an organization lacks an adequate third-party identity and risk management strategy.
A Quantum ransomware attack on Professional Finance Company (PFC) impacted 657 healthcare organizations and leaked sensitive patient data for millions of patients.
The FBI, CISA, and the Treasury Department warned about Maui ransomware attacks by state-sponsored North Korean hackers targeting US healthcare organizations.
Cyber attacks are using better research and personalization to find a way to take advantage of the senior level or C-Suite — and cybersecurity operations are falling behind in combatting these whaling attacks.
Attackers exfiltrated sensitive data from thousands of websites, desktop, and mobile applications in a supply chain attack leveraging typo-squatting in popular NPM packages.
An account takeover hit Disneyland's Facebook and Instagram, and the company took some of its social media presence offline for a short period as it recovered.
The Russia-Ukraine conflict has seen cyber warfare enter the mainstream and the risk of spill-over into unrelated businesses remains a possibility. Businesses should review their existing backup and recovery strategies and cyber incident response plans or they risk getting caught in the cyber crossfire.
Inside sources at Sky Mavis claim that the record-breaking Axie Infinity crypto theft from the company's Ronin bridge in March stems from a fake job offer made to one of the company's senior engineers.