Hackers Exploit the COVID-19 Pandemic for Cyber Scams

Cyber criminals are taking advantage of the global crisis coronavirus pandemic (COVID-19) to attempt cyber scams! The Wave of Coronavirus Cyber Scams While the world is busy fighting with the coronavirus pandemic (COVID-19), cyber attackers are misusin… Continue reading Hackers Exploit the COVID-19 Pandemic for Cyber Scams

Directives Issued After US Pipeline Ransomware Attack

In the wake of the terrible ransomware attack that targeted one of the most important fuel pipelines of the US, the Department of Homeland Security (DHS) has mandated additional cyber security measures. This is the second security directive issued by t… Continue reading Directives Issued After US Pipeline Ransomware Attack

US Offers Bounty for Tips on State-Sponsored Cybercrime

Last week, the Biden administration announced a ‘new’ Rewards for Justice program offering up to $10 million USD for information relating to those who create and perpetuate ransomware attacks against U.S. infrastructure. The program, admin… Continue reading US Offers Bounty for Tips on State-Sponsored Cybercrime

Essential Protection for Legacy Applications – Part 1

Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective protection of legacy applications is a rich and complex topic that we will detail in a series of blog… Continue reading Essential Protection for Legacy Applications – Part 1

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created.
The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first on Radware Blog.
The post … Continue reading Why Understanding Cyber Criminals Behavior and Tools is Vital

How (and Why) Hacker Forums Self-Moderate

“Everything in moderation,” the saying goes. But it may come as a surprise that this expression even seems to apply to many of the hacker forums littered across the dark web. On the surface, these forums may appear to be a lawless landscape, but there… Continue reading How (and Why) Hacker Forums Self-Moderate

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

A bipartisan Senate bill would require some businesses to report data breaches to law enforcement within 24 hours or face financial penalties and the loss of government contracts. The legislation from Senate Intelligence Chair and Democratic Senator Ma… Continue reading New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

White House Accuses China of Microsoft Exchange Attack

Russia may have drawn the lion’s share of scorn for a recent string of cyberattacks against U.S. and global interests, but the Biden administration and a bevy of allies and partners blame China for the assault on Microsoft’s email system. Noting… Continue reading White House Accuses China of Microsoft Exchange Attack

Cyber Games Offer Competitive Challenges

With high-profile public and private institutions in the U.S. facing a growing threat from cybercriminals and cyberattacks, there is a growing push to prepare the next generation of potential IT security pros to meet the challenges. Cyber games are on… Continue reading Cyber Games Offer Competitive Challenges