- Welcome Guest
- Sign In
Shouldn't you get paid when businesses use your personal information gleaned from the internet? How much is your personal data posted online worth to you? Would you register your personal data so that you get paid when companies track you and use your own data to target you for ads? That is precisel...
Clients of SolarWinds, which experienced a high-profile data breach last year, are being targeted in a probe by the U.S. Securities and Exchange Commission, according to a Reuters report. "The impact of these large-scale breaches clearly has the potential to destabilize stock prices and the broader ...
A Russian-language dark web marketplace called Hydra that is known to facilitate the illegal sale of narcotics has seen cryptocurrency transactions soar over the last five years. According to a report by Flashpoint and Chainalysis, Hydra's crypto business began accelerating in 2017 after its chief c...
That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...
IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...
New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...
As the value of cryptocurrencies continue to soar, new investors are eager to get in on the action, and scammers are more than willing to accommodate them. According to the Federal Trade Commission, claims of losses from cryptocurrency fraud skyrocketed from October 2020 to March 2021. The median lo...
The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...
As cryptocurrency values continue to rise, cryptojacking becomes more attractive to cybercriminals. Now, a powerful hardware-based threat detection technology is being integrated into a Microsoft enterprise security product to help protect businesses from cryptojacking malware. The action integrate...
From coin shortages and curbside operations to contactless transactions, how consumers pay for their purchases has been completely transformed during the pandemic. Marketers expect that transformation to continue and expand. It is not just family staples that are seeing a jump in consumer digital pa...
Jonathan Cran, founder and CEO of Intrigue, a cybersecurity startup based in Austin, Texas, used his company's network security tools to compile a list of Fortune 500 companies still exposed to last month's Microsoft Exchange breach. Potentially, many of those companies may not know their networks a...
Businesses fearful their workers may be targeted by fraudsters will want to take a look at the free Tax Scam Awareness Kit offered by Proofpoint. The kit, for both Windows and macOS, includes materials for an employee education campaign about tax fraud, three educational videos, an infographic, answ...
Major information technology providers opposed to the broadening of class action litigation related to consumer protections have taken their case to the U.S. Supreme Court. The companies are hoping the court will strike down a lower court ruling which makes it easier for consumers to file class acti...
Cloud cybersecurity -- or a lack of it -- is feeding a frenzy of companies out of the public cloud. A similar concern about managing compliance obligations is keeping organizations from moving to the cloud in general. However, much of the growing concerns over cloud cybersecurity result from experie...
Social Media
See all Social Media