News
-
"The FCC Wants Carriers to Notify You Sooner When There's a Data Breach"The Federal Communications Commission (FCC) has recently proposed rules that would improve reporting for breaches at carriers. Most notably, the move would scrap a mandatory wait of seven business days before a telecom can warn customers about a…
-
"Russian Hackers Targeted U.S. Nuclear Scientists"According to Internet records reviewed by Reuters and five cybersecurity experts, a Russian hacking group known as Cold River targeted three nuclear research laboratories in the US this past summer. Cold River targeted the Brookhaven National Laboratory…
-
"Cyber Attacks on UK Organizations Surged 77% In 2022, New Research Finds"In 2022, UK organizations faced an average of 788 weekly cyberattacks, a 77 percent increase from 2021. According to new data from Check Point, the intensity of cyber threats will increase by 38 percent compared to the previous year. In addition, the…
-
"Many of 13 New Mac Malware Families Discovered in 2022 Linked to China"According to Mac security expert Patrick Wardle, more than a dozen new Mac malware families were discovered in 2022, including information stealers, cryptocurrency miners, loaders, and backdoors, many of which have been linked to China. Patrick…
-
10th Annual Best Scientific Cybersecurity Paper Winners AnnouncedThe tenth NSA Competition for Best Scientific Cybersecurity Paper reco
-
"Real Vulnerability Management Goes Beyond NIST's Cybersecurity Framework"Skybox Security's technical director, Ed Mosquera, urges local government agencies to develop a proactive and risk-based approach to cybersecurity rather than relying solely on the National Institute of Standards and Technology's (NIST) Cybersecurity…
-
"Data, Privacy, And the Future of Artificial Intelligence"Data privacy and protection have become increasingly important and restrictive for US and European businesses. Simultaneously, innovators at the forefront of Artificial Intelligence (AI) research are constantly seeking larger and better datasets to…
-
"Survey Report Looks at How Prepared Industrial Enterprises Are for Operations Recovery Following Cyber Attacks"A new Industrial Cyber Magazine survey report, sponsored by Salvador Technologies, explores some specific challenges faced in planning for Operational Technology (OT) recovery and business continuity. Because of the significant contrasts between OT and…
-
"Notorious Russian Spies Piggybacked on Other Hackers' USB Infections"In 2008, Turla, a Russian cyberespionage group, gained notoriety as the hackers behind agent.btz, a piece of malware that spread throughout the US Department of Defense's (DOD) computers via infected USB devices inserted by Pentagon employees. The same…
-
"Hackers Went After Personally Identifiable Information the Most, Study Says"According to a recent analysis conducted by Imperva, which examined the top 100 breaches from July 2021 to July 2022, hackers targeted Personally Identifiable Information (PII) 42.7 percent of the time. The Imperva study stated that of all the types of…
-
"User Documents Overwritten With Malicious Code in Recent Dridex Attacks on macOS"Security Researchers at Trend Micro have found that the cybercriminals behind the Dridex banking trojan have adopted a new tactic in recent attacks targeting macOS devices, overwriting the victim’s document files to deliver their malicious code. …
-
"Social Security Numbers Stolen in Ransomware Attack on Maternal Health Org"Cybercriminals stole Social Security numbers and other personal information during a ransomware attack on a maternal health service organization. Cybersecurity experts informed Maternal and Family Health Services that the hackers had access to their…