Lookout, Inc. announced the discovery of major crypto mining scams using hundreds of Android apps. In total, security researchers at the Lookout Threat Lab identified more than 170 apps that are estimated to have scammed more than 93,000 victims.
The U.S. Secret Service hosted a virtual Cyber Incident Response Simulation with business leaders, law enforcement and other private sector partners focused on ransomware and cryptocurrency attacks and mitigation strategies.
In a new era of hybrid workspaces, many sectors are making the shift to the cloud and adopting cloud-based SaaS applications at an accelerated pace for agility and scalability - but this practice and the efficiencies that are gained come at a cost. Business leaders are realizing that they must allot more of their resources and budgets to address new security concerns surrounding these transitions to keep their environment safe and prevent breaches.
Kaseya’s VSA product has been the victim of a sophisticated ransomware attack, affecting 60 Kaseya customers and an estimated 1,500 downstream businesses. Attackers are allegedly demanding $70 million in return for a universal decryptor software key that would unscramble all affected machines.
Secretary of Homeland Security Alejandro N. Mayorkas announced the Department’s largest cybersecurity hiring initiative in its history with the onboarding of nearly 300 cybersecurity professionals and the extension of an additional 500 tentative job offers.
The massive shift to remote work and a continually expanding attack surface has made the concept of trust-based security a naïve one at best, dangerous at worst. But the upshot is that everything we’ve seen and experienced in the past year has helped seed the need for a zero-trust based approach. Let’s look at some of the major trends and factors of the past year and how these risks can be mitigated using a zero trust approach.
In this year’s Security Leadership: 2021 Women in Security report, we take you through the professional journeys of 13 enterprise security leaders that have risen the ranks during their careers with their skills, forward-thinking mindsets, and a passion for the job they do.
As organizations shift IT spending to cloud services, it’s important to prepare for more regulations, a high rate of data loss, and a likely increase in attacks on cloud apps. To plan for these challenges, organizations need visibility and security for software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) clouds. Here are four categories to consider to secure your cloud environments.
Back when threats were only of a physical nature, power plants created and conducted drills to prepare. While a physical attack is still a concern, we must now also consider a digital protection system. Because of the rapid rate of development in this sector, it is imperative that power plant technicians understand both the physical and digital threats they may face.
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and the UK’s National Cyber Security Centre (NCSC) released a Cybersecurity Advisory exposing malicious cyber activities by Russian military intelligence against U.S. and global organizations, starting from mid-2019 and likely ongoing.