newsThe US indicts 7 Chinese nationals for cyber espionageThe UK has similarly linked a Chinese state-affiliated entity to the compromise of the UK Electoral Commission’s systems between 2021 and 2022.By Sandeep Budki26 Mar 20246 minsCyberattacksCybercrime news analysis New phishing campaign targets US organizations with NetSupport RATBy Lucian Constantin21 Mar 20243 minsPhishingCyberattacksMalwarenews analysis No easy solutions to the ransomware threat despite takedownsBy Cynthia Brumfield19 Mar 202411 minsRansomwareCybercrime news analysisAttackers abuse cloud accounts to spawn thousands of crypto CDN nodesBy Lucian Constantin 13 Mar 20244 minsCryptocurrencyCyberattacksCloud Security news analysisBianLian group exploits TeamCity again, deploys PowerShell backdoorBy Lucian Constantin 11 Mar 20244 minsRansomwareMalwareCybercrime news analysisAttack targets Docker, Hadoop, Confluence, and Redis with new payloadsBy Lucian Constantin 06 Mar 20246 minsCryptocurrencyCyberattacksMalware news analysisNew Redis attack campaign weakens systems before deploying cryptominerBy Lucian Constantin 20 Feb 20246 minsCryptocurrencyCyberattacksMalware news analysisAttack campaign targeting Azure environments compromised hundreds of accountsBy Lucian Constantin 14 Feb 20244 minsPhishingCyberattacksCybercrime news analysisPhishing attack uses compromised SendGrid accounts to target additional usersBy Lucian Constantin 08 Feb 20245 minsPhishingEmail SecurityCybercrime Articlesnews analysisRansomware victim numbers rose by 50% in 2023Ransomware groups new and old reported nearly 4,000 victims on their leak sites in 2023, up from about 2,700 in 2022.By Lucian Constantin 06 Feb 2024 5 minsRansomwareCybercrimenewsZero-day, supply-chain attacks drove data breach high for 2023Zero-day exploits, supply chain attacks fuel 72% increase over previous record for incidents of compromise. Another increase is expected for 2024.By John Mello Jr. 26 Jan 2024 4 minsCyberattacksZero-day vulnerabilitySupply ChainnewsMedusa group steps up ransomware activitiesNew extortion site offers victims, many of which are in the healthcare sector, multiple ways to pay ransoms.By John Mello Jr. 12 Jan 2024 4 minsRansomwareCybercrimenews analysisAttackers deploy rootkits on misconfigured Apache Hadoop and Flink serversMisconfigurations allow threat actors to bypass authentication and install cryptominers once rootkits are deployed.By Lucian Constantin 11 Jan 2024 5 minsCyberattacksMalwareCybercrimenews analysisMirai-based NoaBot botnet deploys cryptominer on Linux serversThe attack campaign targets weakly defended servers by brute-forcing SSH logins.By Lucian Constantin 10 Jan 2024 6 minsBotnetsCyberattacksMalwarenewsHacked X accounts with gold checkmarks are for sale on the dark web, says studyVerified X accounts with gold badges sell for $1200 to $2000, depending on their brand value and reach.By Shweta Sharma 05 Jan 2024 4 minsIdentity TheftTechnology IndustryCybercrimenewsHybrid online frauds likely to gain momentum in 2024: ReportA combination of cybersecurity tools and social engineering tactics to conduct payment fraud is likely to gather pace in 2024, making it imperative for the stakeholders to allocate resources to address them.By Gagandeep Kaur 21 Dec 2023 3 minsCybercrimenewsMicrosoft cracks down on group operating ‘cybercrime-as-a-service’Microsoft has aggressively pursued legal measures to dismantle Storm-1152’s network, seizing its US-based infrastructure, shutting down key websites, and rigorously investigating to identify the individuals responsible for the group’s activities.By Prasanth Aby Thomas 14 Dec 2023 3 minsCybercrimenews analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian Constantin 17 Nov 2023 4 minsRansomwareComplianceCybercrimenewsMajor Australian ports shut down following cyber incidentDP World Australia restricted port operations for two days following the discovery of a cyber incident.By Samira Sarraf 12 Nov 2023 2 minsCyberattacksSupply ChainCybercrimenewsGenerative AI to fuel stronger phishing campaigns, information operations at scale in 2024Google Cloud forecasts continued use of gen AI to create smarter campaigns while cybersecurity pros will use the same tools to defend and close the skills gap.By Samira Sarraf 08 Nov 2023 6 minsPhishingCyberattacksGenerative AInews analysisOrganizations turn to zero trust, network segmentation as ransomware attacks doubleReport finds network segmentation is considered critical to thwarting ransomware attacks, but adoption is slow in organizations.By Michael Hill 06 Nov 2023 5 minsRansomwareZero TrustCybercrime Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoWhy ransomware is still a major concern for healthcare systemsCyberattacks continue to threaten healthcare systems around the world, putting patients at risk and further eroding trust in healthcare providers. Can anything be done to reduce the risk, or will going to the doctor or hospital be a roll of the dice when it comes to personal and private data, as well as health equipment? Keith chats with Wes Wright, the chief healthcare officer at Ordr.net, about the ongoing threat of ransomware for healthcare systems. 28 Nov 2023 44 minsRansomwareCybercrime MGM Resorts Hack: Key Takeaways and Lessons Learned for Cybersecurity 02 Nov 2023 43 minsHacker GroupsRansomwareCyberattacks Why security awareness training is failing 13 Oct 2023 29 minsPhishingCyberattacksIT Training What is inside a hacker’s backpack? 06 Sep 2023 33 minsHackingCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence