logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 3

Read more

US Claims to Have Recovered $1.4bn in COVID Fraud

April 10, 2024 / 49 / 0
[ad_1] A US initiative designed to crack down on COVID fraud has resulted in the seizure of $1.4bn and thousands of criminal charges in the past three years, the Department of Justice (DoJ) has revealed. The COVID-19 Fraud Enforcement Task Force (CFETF) was set up... Continue reading
Read more

Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto

April 10, 2024 / 43 / 0
[ad_1] A recent research study has shed light on the decade-long activities of a Romanian cyber threat group known as RUBYCARP, which uses techniques such as cryptocurrency mining and phishing. One of the key findings from the technical write-up, published by Sysdig today, is the... Continue reading
Read more

Change Healthcare Hit By Cyber Extortion Again

April 10, 2024 / 133 / 0
[ad_1] Change Healthcare, a subsidiary of UnitedHealth Group, has been facing renewed extortion from cybercriminals just a month after paying a ransom to prevent the release of data stolen in a February 2024 ransomware attack.  The attack, orchestrated by the ALPHV/BlackCat ransomware gang, severely disrupted healthcare... Continue reading
Read more

Hackers Use Malware to Hunt Software Vulnerabilities

April 9, 2024 / 40 / 0
[ad_1] Many threat actors are turning to malware to scan software vulnerabilities that they can use in future cyber-attacks. Security researchers at Unit 42, the threat intelligence branch of cybersecurity provider Palo Alto Networks, discovered a significant number of malware-initiated scans among the scanning attacks... Continue reading
Read more

Foreign Interference Drives Record Surge in IP Theft

April 9, 2024 / 44 / 0
[ad_1] Hostile foreign states are behind a surge in malicious insider breaches, driving IP theft and industrial espionage to an all-time high, according to DTEX. The insider threat specialist analyzed over 1300 investigations across its global customer base to compile the 2024 i3 Insider Risk Investigations... Continue reading
Read more

Why Identity Management is Key in a Cyber Resilience Strategy

April 9, 2024 / 37 / 0
[ad_1] Identity compromise is one of the top cyber threats to organizations, prompting cybersecurity professionals to encourage better identity management hygiene across industries. According to the Identity Defined Security Alliance (IDSA), almost nine out of ten businesses (84%) have experienced an identity-related breach over the... Continue reading
Read more

New Malware “Latrodectus” Linked to IcedID

April 9, 2024 / 59 / 0
[ad_1] Cybersecurity researchers have identified a new loader named “Latrodectus,” discovered in November 2023, which has since been associated with nearly a dozen campaigns since February 2024. This malware, described in an advisory published by Proofpoint last Thursday, was primarily utilized by actors identified as... Continue reading
Read more

Byakugan Infostealer Capabilities Revealed – Infosecurity Magazine

April 8, 2024 / 45 / 0
[ad_1] New research has shed light on the intricate workings of the Byakugan malware, initially detected in January. During an investigation into a campaign featuring malware concealed within PDFs, the FortiGuard Labs team unearthed additional insights about the malware. Last Thursday, they issued an advisory... Continue reading
Read more

US Federal Data Privacy Law Introduced by Legislators

April 8, 2024 / 35 / 0
[ad_1] A bipartisan US federal data protection law has been drafted by two US lawmakers, aiming to codify and enforce privacy rights for all US citizens. Congresswoman Cathy McMorris Rodgers (R-WA 5th District) who is the House Committee on Energy and Commerce Chair, and Senator... Continue reading
Read more

Famous YouTube Channels Hacked to Distribute Infostealers

April 8, 2024 / 40 / 0
[ad_1] Threat actors increasingly utilize YouTube to distribute information stealer malware (infostealers) by appropriating legitimate channels as well as using their own video channels. In a new report, the AhnLab Security Intelligence Center (ASEC) found a growing number of cases in which malicious actors steal... Continue reading
Next Page »

Search