In contrast to the competitions on Russian-language cybercriminal forums profiled previously by Digital Shadows, how are competitions on English-language cybercriminal forums more generally "innocent"?
The US Centers for Disease Control and Prevention has drafted a 17-page document that details interim guidance on how businesses, schools, churches, mass transit and other organizations should handle safely reopening to the public amid the coronavirus pandemic.
State utility commissions can strengthen the cybersecurity of U.S. critical infrastructure – particularly the electric grid – by advancing several relevant recommendations of the Cyberspace Solarium Commission report.
What are some simple risk management rules that will support healthcare organizations, without significantly exposing it to major security risks as they adapt to this new and challenging COVID-19 situation?
The old curse has come true: we are “living in interesting times.” None of us could have possibly foreseen the way that 2020 has evolved, least of all, conference professionals. Gartner says it’s taking a $158 million hit in its Q2 revenues; O’Reilly went one huge step further, permanently shuttering its in-person events business. Aside from those gatherings, an entire slew of security meetings has moved into the virtual realm. In-person conferences during the pandemic are seen as being too hazardous and unsafe. It's now better to meet online than to risk spreading the virus.
SafetyDetective's security research team, led by Anurag Sen, has discovered a significant data leak stretching into 10 billion records at adult live-streaming website CAM4.com, belonging to Irish company Granity Entertainment.
Millions of U.S. businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks, according to a new report from Tanium.
The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat.
Due to increased cybersecurity threats, President Donald Trump signed an executive order banning U.S. power grid entities from buying and installing electrical equipment that has been manufactured outside the U.S.