U.S. federal prosecutors announced a slew of indictments and arrests in cases involving attempts by foreign nationals to illegally export technology into Russia, China and Iran. The arrests are part of a recently announced Disruptive Technology Strike Force.
An Illinois man pleaded guilty Monday to eight criminal counts stemming from the three years he spent leading a conspiracy to sell stolen financial information on darknet markets. The man, Michael D. Mihalo, 40, founded a darknet carding site known as Skynet Market.
A Russian man the U.S. government says was a key actor in Russian ransomware hacking faces federal criminal charges and economic sanctions. A $10 million reward is out for information leading to his arrest. Mikhail Matveev, aka "Wazawaka," was a key figure in the Babuk ransomware-as-a-service gang.
A threat actor is using a custom-made backdoor to target organizations operating in South and Southeast Asia. Sectors at immediate risk include government, aviation, education and telecommunications. The Lancefly ATP group uses custom-written malware that Symantec's Threat Hunter Team calls Merdoor.
Fallout from the March hack of Capita and accompanying data breach continues to mount. While the outsourcing giant initially reported no signs of data exfiltration, multiple customers - including Britain's largest pension fund and potentially hundreds more - now say personal data is indeed at risk.
New bipartisan legislation introduced in the U.S. Senate - the Rural Hospital Cybersecurity Enhancement Act - aims to help address the shortage of cybersecurity skills facing rural hospitals, which increasingly find themselves in the crosshairs of hackers, including ransomware attackers.
Institutional pharmacy PharMerica says personal data of nearly 6 million current and deceased patients was caught up in a March hacking incident. The Money Message ransomware group claims to be the attacker, posting on its dark web leak site multiple spreadsheets the group says contain patient data.
Cybercrime watchers continue to see prolific use of information-stealing malware such as Raccoon and Vidar, which are being used to populate stolen digital identity listings at markets such as Genesis, RussianMarket and TwoEasy, as well as via Telegram channels offering "clouds of logs."
A newly uncovered hacking group with a string of cyberespionage successes is targeting Ukrainian and pro-Russian targets alike. Malwarebytes in a Wednesday dubs the threat actor "Red Stinger," saying the group is the same as the "Bad Magic" threat actor revealed by Kaspersky in March.
In the latest weekly update, ISMG editors discuss how the Feds have dismembered Russia's 'Snake' cyberespionage operation; the ongoing debate over privacy laws and regulations in the APAC region; and why more companies are banning the use of generative AI tool ChatGPT.
A hacker made $34 million from MEV bot attacks, NYDFS penalized Bitflyer for lax cybersecurity, Ishan Wahi was sentenced in the Coinbase insider trading case, the IRS is training Ukraine in blockchain forensics and the New York AG proposed a crypto cybersecurity bill.
In this week's data breach, the spotlight was on Dragos, a guilty plea from a Twitter hacker and cryptocurrency thief and North Korean hackers. Also, Sysco, a Ukrainian border truck queuing system and an update on Western Digital. Plus, a new tool for decrypting partially encrypted files.
Customers want to trust a brand, and that includes trusting it with protecting their digital identity. Joe Burton, Telesign CEO, advised that customers should be part of the "security journey." Explaining why you're asking for information to verify their identities "turns friction from annoying to reassuring."
In the annals of attempting to downplay the impact of a data breach, here's a new one: British outsourcing giant Capita says the hackers who hit it - steling data pertaining to customers, suppliers and employees - accessed "less than 0.1% of its server estate."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.