Dark Reading: Attacks/Breaches
Cybersecurity: An Organizationwide Responsibility
C-suite execs must set an example of good practices while also supporting the IT department with enough budget to protect the organization from next-generation cyberattacks.
The Ripple Effect of Data Breaches: How Damage Spreads
The financial loss from so-called 'ripple events' is thirteen times greater than the cost of single-party security incidents.
2019 Trending as Worst Year on Record for Data Breaches
New Risk Based Security report shows data breaches up 33.3% over last year so far.
Breaches Are Inevitable, So Embrace the Chaos
Avoid sinking security with principles of shipbuilding known since the 15th century.
Cardplanet Operator Extradited for Facilitating Credit Card Fraud
Russian national Aleksei Burkov is charged with wire fraud, access device fraud, and conspiracy to commit identity theft, among other crimes.
Unreasonable Security Best Practices vs. Good Risk Management
Perfection is impossible, and pretending otherwise just makes things worse. Instead, make risk-based decisions.
New DDoS Attacks Leverage TCP Amplification
Attackers over the past month have been using a rarely seen approach to disrupt services at large organizations in several countries.
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.
DDoS Attack Targets UK Labour Party Weeks Ahead of Election
Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.
Why Cyber-Risk Is a C-Suite Issue
Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.
Researchers Find New Approach to Attacking Cloud Infrastructure
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
5 Security Processes You Shouldn't Overlook During M&A
Security needs to be a central element of due diligence if a merger or acquisition is to succeed
Hospital Cyberattacks Linked to Increase in Heart Attack Mortality
Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.
9 Principles to Simplify Security
This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.
Twitter & Trend Micro Fall Victim to Malicious Insiders
The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.
TA542 Brings Back Emotet with Late September Spike
Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September.
PayPal Upsets Microsoft as Phishers' Favorite Brand
Several factors edged the world's most popular payment service into the top spot.
The Cold Truth about Cyber Insurance
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.
Kaspersky Analysis Shines Light on DarkUniverse APT Group
Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.
Black Hat Q&A: Hacking a '90s Sports Car
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
Feed Fetched by RSS Dog.