Home Search

U.S. - search results

If you're not happy with the results, please do another search
Ransomware attack on Colonial Pipeline

Colonial Pipeline Reportedly Paid $4.4 Mn in Ransom

0
The world has taken notice of the ransomware attack on the Colonial Pipeline in the U.S. Given the aftermath of the attack, which caused...
Ransomware Attacks, Graff ransomware attack

Suffered Attack, Paid Ransom, Restored Systems: The CNA’s Ransomware Timeline

0
Businesses have been harrowed with the ever-rising question, “To pay or not to pay ransom?” The FBI had urged companies to avoid ransom payments...
Japan restricts foreign equipment and tech, Japan Embraces AI Tools to Fight Cyberattacks with US$237 mn Investment

Japan to Impose Strict Regulations on Private Sector’s Adoption of Foreign Equipment and Technology

0
Fearing a situation like the Colonial Pipeline-like hack, the Japanese government is set to impose restrictions on the usage of foreign equipment and technology...
Patchwork BADNEWS, APT31 threat group

Magecart Group 12 Found Deploying PHP Web Shells to Skim Users’ Payment Information

0
Malicious web shells have been wreaking havoc by enabling remote access, executing arbitrary commands, and controlling servers. It’s a technique mostly used by Magecart...
covid-19 vaccine, vaccine

On Sale! Fake Vaccines and Bogus COVID Results Flood Dark Web

0
While the world is in rush to get vaccinated against Coronavirus, opportunistic criminals are misusing the situation to spread fake COVID-19 vaccines. Anne An,...
Toshiba subsidiaries ransomware attack by darkSide ransomware

Toshiba’s European Subsidiary Confirms Ransomware Attack; DarkSide’s Involvement Suspected

0
As the ransomware pandemic ravages through the big and small size industries alike, the Japanese tech giant joins the list of those affected by...
Security and Compliance in Cloud

How to Simplify Security and Compliance in Cloud

0
Digital transformation was only a trend a few years ago; however, it has quickly become a reality for many organizations, including government agencies. The...
third-party risk

Innovate Through Uncertainty by Managing Third-party Risk

0
Like beauty, risk is in the eye of the beholder, and business risk is no exception. While some organizations perceive risk as a potential...
Apple App Store, Apple vulnerabilities

Did Apple choose to keep mum about the XcodeGhost malware attack affecting 128Mn iPhone...

0
Apple entered the courtroom of the U.S. District Court for the Northern District of California on May 3, 2021, for a showdown against Epic...

Bigger Organizations Have Multiple Attack Surfaces

0
Upendra Mardikar is a prolific inventor and cybersecurity and digital identity executive with an “art of possible” mindset who led global teams to secure...