Chatbots, Maintenance and Monitoring: Security Automation

Last week the Identity Theft Resource Center (ITRC) unveiled its virtual victim assistant, ViViAN, to serve identity crime victims after-hours and on weekends. Developed in partnership with the SAS Institute, an anti-fraud software and services compan… Continue reading Chatbots, Maintenance and Monitoring: Security Automation

The Week in Breach News: 05/12/21 – 05/18/21

It’s the all ransomware edition featuring huge breaches at Toshiba & the VA plus a special report on the state of phishing security in 2021.
The post The Week in Breach News: 05/12/21 – 05/18/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 05/12/21 – 05/18/21

Accellion Data Breach Highlights Third-Party Risk

Two mega-breaches caused by third parties earlier this year, following the SolarWinds supply chain hack created a growing tsunami of third-party risk for enterprises and government organizations. Security software provider Accellion also suffered a br… Continue reading Accellion Data Breach Highlights Third-Party Risk

DarkSide Ransomware Gang Struck Down — but by Whom?

DarkSide, hackers of the Colonial Pipeline, has hurriedly shut up shop. It claims that its servers and cryptocurrency balances have disappeared.
The post DarkSide Ransomware Gang Struck Down — but by Whom? appeared first on Security Boulevard.
Continue reading DarkSide Ransomware Gang Struck Down — but by Whom?

How to Prevent Fraudsters From Using Tax Fraud to Augment Their Heists

Tax fraud refers to the manipulation of tax returns through a number of criminal activities that cause losses worth billions of dollars to the government. In the US, as the last-minute rush to file tax returns with the Internal Revenue Services (IRS) i… Continue reading How to Prevent Fraudsters From Using Tax Fraud to Augment Their Heists

Student’s Negligence Opened Door for Ryuk into Biomolecular Facility

An article published by ZDNet revealed how Ryuk ransomware got a free run into a biomolecular facility in Europe after a student went on a hunt for a free version of a data visualization software. History of Ryuk Ransomware As per an article by CSO Onl… Continue reading Student’s Negligence Opened Door for Ryuk into Biomolecular Facility

Cybersecurity Executive Order: Can automation fix the nation’s misconfiguration problem?

President Joe Biden signed and released an Executive Order (EO) from the White House on May 12th, addressing his plan to improve the nation’s cybersecurity and protect federal government networks. This order comes on the heels of the Colonial Pipeline … Continue reading Cybersecurity Executive Order: Can automation fix the nation’s misconfiguration problem?

Pipeline Ransomware Shows Dangers of Unsecured Infrastructure

The ransomware attack against the Colonial Pipeline is the latest incident targeting critical infrastructure in the United States with severe potential in terms of business continuity and energy disruption. The May 7 attack happened on Friday, a busy … Continue reading Pipeline Ransomware Shows Dangers of Unsecured Infrastructure

Follow Up: The Microsoft Exchange Attack | ARIA Cybersecurity

While past blogs focused on the initial cyberattack involving Microsoft Exchange Server, this follow-up article takes a much closer look at what really happened–and how similar attacks can be avoided.
The post Follow Up: The Microsoft Exchange At… Continue reading Follow Up: The Microsoft Exchange Attack | ARIA Cybersecurity