A multinational cybersecurity advisory warned that cyber attacks on managed service providers (MSPs) could enable supply chain attacks, ransomware, and cyber espionage downstream.
The nature of phishing attacks and the role of human error in the problem means that it’s unlikely we can completely eliminate this threat. Implementation of behavioral analytics solutions allow security teams to clearly identify irregular or abnormal behaviors and take action to determine if someone with access is a potential threat.
Ukraine's major internet provider Triolan suffered two severe cyber attacks disrupting internet services in what it described as the "vile strategy of the enemy."
Be vigilant when you engage with third party service providers. Ultimately it is your responsibility under the GDPR when cyber attacks and data breaches occur, not solely your service providers.
Lloyd’s of London has issued a bulletin indicating that its cyber insurance products will no longer cover the fallout of cyber attacks exchanged between nation-states. This definition extends to operations that have "major detrimental impact on the functioning of a state."
Australian companies that have connections to the country's critical infrastructure might have no choice but to allow the government to step in during cyber attacks, if new legislation proposed by the Morrison government is approved.
How do we prevent AI from being used as a tool for cyberattacks? We need to come up with ways to keep AI under control and stop hackers from manipulating automated computer systems and cause them to take actions they were never intended to take.
The breach of the Microsoft Exchange email server software is estimated to have hit tens of thousands of victims. The Biden administration has formally declared that Chinese state-backed APT groups were behind the original cyber attacks.
Here’s what needs to be done at the enterprise level to ensure bulletproof cybersecurity against state-sponsored cyber attacks in the most uncertain times of COVID-19 and beyond.
When one thinks of cyber attacks on industrial networks, one often pictures advanced nation-state threat actors using sophisticated techniques. A new report indicates that the modern trend may be in the other direction.