The Biden administration is allegedly preparing to sanction financial exchanges that facilitate illicit digitalpayments to cybercriminals. How will this new initiative impact businesses?
Is the U.S. in a cyber war? Here, Eric Jeffery, Sr. Solutions Architect for IBM Security, explores the scale of the latest nation-state sponsored cyberattacks.
Disaster recovery solutions make it easy for administrators to prevent data loss caused by failure events or ransomware, even when they cannot be on-site.
Tony Bryson, Chief Information Security Officer for the Town of Gilbert, Ariz.,
scaled the town's cybersecurity defenses by adopting a preventative solution through a third-party security company to help to mitigate the risks associated with supply chain attacks.
Questions leaders can use to measure organization's ransomware preparedness
September 14, 2021
C-suite and other executives expect cyberattacks to increase over the next 12 months, yet only 33.3% say that their organizations have simulated ransomware attacks to prepare for such an incident, according to a recent Deloitte poll.
CISA and FBI urge organizations to remain vigilant to ransomware threats on holidays, including this Labor Day
September 1, 2021
The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency have observed an increase in highly impactful ransomware attacks occurring on holidays and weekends—when offices are customarily closed—in the United States, as recently as the Fourth of July holiday in 2021.
ShinyHunters, a financially motivated threat group that emerged in May 2020, has made their return to push a trove of data allegedly stolen from U.S. telecommunications company AT&T, according to Digital Shadows, who could not independently verify the integrity of ShinyHunters’ claims.
According to the Cybersecurity and Infrastructure Security Agency (CISA), malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-3447, CVE-2021-3452, and CVE-2021-3120. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine.