newsThe US indicts 7 Chinese nationals for cyber espionageThe UK has similarly linked a Chinese state-affiliated entity to the compromise of the UK Electoral Commission’s systems between 2021 and 2022.By Sandeep Budki26 Mar 20246 minsCyberattacksCybercrime news analysis New phishing campaign targets US organizations with NetSupport RATBy Lucian Constantin21 Mar 20243 minsPhishingCyberattacksMalwarenews analysis No easy solutions to the ransomware threat despite takedownsBy Cynthia Brumfield19 Mar 202411 minsRansomwareCybercrime news analysisAttackers abuse cloud accounts to spawn thousands of crypto CDN nodesBy Lucian Constantin 13 Mar 20244 minsCryptocurrencyCyberattacksCloud Security news analysisBianLian group exploits TeamCity again, deploys PowerShell backdoorBy Lucian Constantin 11 Mar 20244 minsRansomwareMalwareCybercrime news analysisAttack targets Docker, Hadoop, Confluence, and Redis with new payloadsBy Lucian Constantin 06 Mar 20246 minsCryptocurrencyCyberattacksMalware news analysisNew Redis attack campaign weakens systems before deploying cryptominerBy Lucian Constantin 20 Feb 20246 minsCryptocurrencyCyberattacksMalware news analysisAttack campaign targeting Azure environments compromised hundreds of accountsBy Lucian Constantin 14 Feb 20244 minsPhishingCyberattacksCybercrime news analysisPhishing attack uses compromised SendGrid accounts to target additional usersBy Lucian Constantin 08 Feb 20245 minsPhishingEmail SecurityCybercrime Articlesnews analysisRansomware victim numbers rose by 50% in 2023Ransomware groups new and old reported nearly 4,000 victims on their leak sites in 2023, up from about 2,700 in 2022.By Lucian Constantin 06 Feb 2024 5 minsRansomwareCybercrimenewsZero-day, supply-chain attacks drove data breach high for 2023Zero-day exploits, supply chain attacks fuel 72% increase over previous record for incidents of compromise. Another increase is expected for 2024.By John Mello Jr. 26 Jan 2024 4 minsCyberattacksZero-day vulnerabilitySupply ChainnewsMedusa group steps up ransomware activitiesNew extortion site offers victims, many of which are in the healthcare sector, multiple ways to pay ransoms.By John Mello Jr. 12 Jan 2024 4 minsRansomwareCybercrimenews analysisAttackers deploy rootkits on misconfigured Apache Hadoop and Flink serversMisconfigurations allow threat actors to bypass authentication and install cryptominers once rootkits are deployed.By Lucian Constantin 11 Jan 2024 5 minsCyberattacksMalwareCybercrimenews analysisMirai-based NoaBot botnet deploys cryptominer on Linux serversThe attack campaign targets weakly defended servers by brute-forcing SSH logins.By Lucian Constantin 10 Jan 2024 6 minsBotnetsCyberattacksMalwarenewsHacked X accounts with gold checkmarks are for sale on the dark web, says studyVerified X accounts with gold badges sell for $1200 to $2000, depending on their brand value and reach.By Shweta Sharma 05 Jan 2024 4 minsIdentity TheftTechnology IndustryCybercrimenewsHybrid online frauds likely to gain momentum in 2024: ReportA combination of cybersecurity tools and social engineering tactics to conduct payment fraud is likely to gather pace in 2024, making it imperative for the stakeholders to allocate resources to address them.By Gagandeep Kaur 21 Dec 2023 3 minsCybercrimenewsMicrosoft cracks down on group operating ‘cybercrime-as-a-service’Microsoft has aggressively pursued legal measures to dismantle Storm-1152’s network, seizing its US-based infrastructure, shutting down key websites, and rigorously investigating to identify the individuals responsible for the group’s activities.By Prasanth Aby Thomas 14 Dec 2023 3 minsCybercrimenews analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian Constantin 17 Nov 2023 4 minsRansomwareComplianceCybercrimenewsMajor Australian ports shut down following cyber incidentDP World Australia restricted port operations for two days following the discovery of a cyber incident.By Samira Sarraf 12 Nov 2023 2 minsCyberattacksSupply ChainCybercrimenewsGenerative AI to fuel stronger phishing campaigns, information operations at scale in 2024Google Cloud forecasts continued use of gen AI to create smarter campaigns while cybersecurity pros will use the same tools to defend and close the skills gap.By Samira Sarraf 08 Nov 2023 6 minsPhishingCyberattacksGenerative AInews analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleReport finds network segmentation is considered critical to thwarting ransomware attacks, but adoption is slow in organizations.By Michael Hill 06 Nov 2023 5 minsRansomwareZero TrustCybercrime Show more Show less View all Resources whitepaper Are You Data and AI Ready? Digital transformation creates a $100 trillion opportunity for enterprises, but also leads to infrastructure challenges with data exchange and platform growth. The post Are You Data and AI Ready? appeared first on Whitepaper Repository –. By Digital Realty Trust, L.P. 14 Mar 2024Other whitepaper Magic Quadrant for Distributed File Systems and Object Storage By Dell Technologies and Intel® 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel® 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence