Ransomware Is Devastating European Healthcare Providers. Here’s Why

In the early morning of May 14th this year, security staff attached to the National Cyber Security Centre in Ireland noticed suspicious activity within IT networks connected to the country’s Health Service Executive, the HSE. Hours later, IT syste… Continue reading Ransomware Is Devastating European Healthcare Providers. Here’s Why

Biden-Putin Summit and Why Threat Actors Just Won’t Give it a Rest

On June 11, McDonald’s said in a message to its U.S. employees that it had discovered unauthorized activity on an internal security system. The burger chain responded by bringing on some external consultants to investigate what had happened, repor… Continue reading Biden-Putin Summit and Why Threat Actors Just Won’t Give it a Rest

Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Microsoft president and CLO Brad Smith says secretly subpoenaing data from cloud providers—blocking them from telling customers—must stop.
The post Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders appeared first on Security Boulevard.
Continue reading Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Report: Ransomware Attacks and the True Cost to Business

Ransomware attacks have continued to make headlines, and for good reason: on average, there is a new ransomware attack every 11 seconds, and the losses to organizations from ransomware attacks is projected to reach $20 billion over the course of 2… Continue reading Report: Ransomware Attacks and the True Cost to Business

Ransomware Attacks are Evolving: What You Need to Know

One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple techniques to profit even more off their v… Continue reading Ransomware Attacks are Evolving: What You Need to Know

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show simil… Continue reading Protecting the New Most Vulnerable Population – The Grandparent Scam

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Details about the “ANOM” global crime sting where the FBI created a fake encrypted mobile phone for criminals that promised secure communications, new details about how the Colonial Pipeline ransomware attack started, and some really bad security resea… Continue reading ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

EA’s Source: It’s in the Game (and in Hackers’ Hands)

Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools.
The post EA’s Source: It’s in the Game (and in Hackers’ Hands) appeared first on Security Boulevard.
Continue reading EA’s Source: It’s in the Game (and in Hackers’ Hands)

Why Freelancers Should Prioritise Cybersecurity

Article by Beau Peters
As a freelancer in any industry, you are likely more susceptible to hackers and cybercrime than many other professions. Not only are you pulling in a constant stream of customer data, but as a worker on the go, you likely work … Continue reading Why Freelancers Should Prioritise Cybersecurity

Can the Government Compel You To Produce Records That Don’t Exist Yet?

We all know that the government can get a subpoena compelling you to produce records that are in your “possession, custody or control,” provided those records are not privileged, along with a few other constraints. They can also get a search warrant a… Continue reading Can the Government Compel You To Produce Records That Don’t Exist Yet?