Carl Pei, co-founder of OnePlus, a smartphone company, said Tuesday that his Twitter account had been compromised via a third-party app called IFTTT and a tweet had been injected via his profile for an apparent cryptocurrency scam.
Iran is using its abundance of oil to generate electricity that powers a massive bitcoin cryptomining operation that enables the country to turn its greatest natural resource into money, offsetting some of its income lost as a result of economic sanctions, according to cryptocurrency analysis firm Elliptic.
The U.K.-based insurance firm One Call says it has successfully restored its systems in a new environment that is separate from the one that was impacted by a ransomware attack May 13, adding that a ransomware note which purported to be from DarkSide could not be verified as authentic.
Ransomware attacks are stuck on repeat: Criminal syndicates have found an extremely profitable business model, and they're milking it for all it's worth. So give the city of Tulsa, Oklahoma, credit for having in place robust disaster recovery capabilities and vowing to remediate, rather than pay criminals.
5G technology reminds us that, globally, our sensitive data is open to attack. Janine Darling, founder and CEO of STASH Secure Data, is committed to resolving that vulnerability challenge.
"They’re playing games," is how one security expert describes Conti ransomware-wielding attackers' "gift" of a decryptor to Ireland's crypto-locked health service, while still demanding a ransom to not leak stolen health data. The same could be said of the DarkSide gang's promised retirement.
Security researchers who track ransomware often think such attacks must have hit their peak and can't get any worse - but then they do, thanks to top gangs continually improving the sophistication of their criminal enterprises, say McAfee's Raj Samani and John Fokker.
While ransomware attacks are largely viewed as cybersecurity incidents, there are critical data privacy concerns that must always be top of mind, says Jodi R. Daniels, founder and CEO of privacy consultancy Red Clover Advisors.
The ransomware challenge facing organizations today traces directly to the success being enjoyed by gangs who wield such malware, says Palo Alto Networks' Jen Miller-Osborn, who describes new strategies to help disrupt this cybercrime business model, including the launch of the new Ransomware Task Force.
Cybersecurity professor Ron Woerner defines “unfluence” as the negative side of influence. He describes the principles of influence and psychology and how black hat hackers use them on their victims - and how to defend against these tactics.
Allen Phelps, CEO of the security firm Trust Farm, reviews some of the tactics, techniques and procedures used by foreign influence threat actors to target research organizations and shares some best practices to defend against those threats.
According to a recent study, 84% of IT leaders say protecting a remote workforce is harder. The number of remote workers today is higher than ever before. The sudden shift to remote work takes place against a backdrop of many troubling cyber security concerns, which are taxing the expertise of cyber security...
In the wake of recent attacks on supply chains and critical infrastructure, Adrian Mayers says it's time for cybersecurity to be seen as an issue of national defense, and that cybersecurity leaders throughout the private and public sectors must embrace their role to protect national interests.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.