Analysis: Emotet and Netwalker Takedowns

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology

Analysis: The Persistent Ransomware Threat

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the persistent threat of ransomware. Also featured: Sorting out breaches tied to Accellion’s File Transfer Appliance; an update on fraud trends in 2021

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

2020 Breach Statistics: An Analysis

Data Breach Today

data breaches in 2020 isn't all good news; it reflects that hackers are changing their tactics, says James Lee of the Identity Theft Resource Center, who offers an analysis of the center's new data breach report

Analysis: Microsoft Exchange Server Hacks

Data Breach Today

This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Analysis: Sandworm's Hacking Campaign

Data Breach Today

This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software.

Analysis: Russia's Sandworm Hacking Campaign

Data Breach Today

This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software.

Analysis: Threat Landscape Report

Data Breach Today

Louis Marinos of the European Cybersecurity Agency offers an analysis of the agency's new Threat Landscape 2020 report, which shows how cybercriminals have been advancing their capabilities, adapting quickly and targeting victims

Analysis: Fat Face's Awkward Breach Notification

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward "strictly private and confidential" data breach notification.

Retail 167

Analysis: Takeaways From Ransomware Gang Interviews

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Analysis: The Impact of SolarWinds Hack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of what we know so far about the impact of the SolarWinds supply chain hack and how to respond

Analysis: The Latest SolarWinds Hack Developments

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends

Cloud 197

Analysis: 2020 Health Data Breach Trends

Data Breach Today

Ransomware, Phishing Incidents, Vendor Hacks Prevail Hacking incidents, including ransomware and phishing attacks, as well as security incidents involving vendors dominated the federal tally of major health data breaches in 2020

Analysis: How Will Biden Address Cybersecurity Challenges?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic

Analysis: McAfee's Planned IPO

Data Breach Today

The latest edition of the ISMG Security Report analyzes cybersecurity firm McAfee's plans to again become a publicly traded company. Also featured: 'Zero trust' strategic insights and an IoT security flaw saga

IoT 150

Analysis: Apple iOS 'Zero-Click Exploit'

Data Breach Today

This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device.

Analysis: The Latest Ransomware Trends

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges

Analysis: Securing RDP to Prevent Ransomware Attacks

Data Breach Today

Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks.

Tom Kellermann: Post-Election Security Analysis

Data Breach Today

Cybersecurity Strategist Warns of Pre-Inauguration Nation-State Strikes The good news: U.S. election security measures seem to have worked. The bad news: Disinformation and misinformation campaigns continue.

Analysis: Implications of Water Treatment Plant Hack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant.

Analysis of FireEye Breach: Is Nothing Safe?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why the FireEye breach is a wake-up call for the cybersecurity industry. Also featured: Monero cryptocurrency scams; key considerations for cloud security

Analysis: Russia's COVID-19 Disinformation Campaign

Data Breach Today

The latest edition of the ISMG Security Report analyzes how and why Russia is spreading disinformation about the COVID-19 pandemic. Plus: the latest CCPA regulation updates; a CISO's tips on securely managing a remote workforce

Analysis: Lessons Learned From Emotet Takedown

Data Breach Today

The latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans

Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity

IoT 175

Analysis: Cyberthreats in the Educational Sector Worldwide

Data Breach Today

Check Point Researchers Identify Increases in DDoS Attacks, Other Threats Check Point Research analysts have observed a significant rise in cyberthreats on the educational sector worldwide since July. DDoS attacks have surged in the U.S., while European institutions have been hit by ransomware

Analysis: Ransomware's Costly Impact

Data Breach Today

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims.

Analysis: HIPAA Enforcement in a Biden Administration

Data Breach Today

HHS Issues 10th 'Right of Access' Settlement; Will Such Actions Continue? The Department of Health and Human Services last week issued its 10th settlement involving a HIPAA "right of access" case since launching its patient records access initiative last year.

Access 200

Security Analysis of Apple’s “Find My…” Protocol

Schneier on Security

This paper presents the first comprehensive security and privacy analysis of OF. Uncategorized academic papers Apple Bluetooth crowdsourcing de-anonymization privacy reverse engineering security analysis trackingInteresting research: “ Who Can Find My Devices?

Paper 100

Analysis: Iowa Election App Missteps

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of the missteps that led to problems with the app used in this week's Democratic presidential caucuses in Iowa. Also featured: growing privacy concerns about facial recognition and business continuity tips for dealing with the coronavirus

Analysis: Cybersecurity Challenges Facing New President

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of how President-elect Joe Biden is expected to renew international relationships needed in the fight against cyberattacks. Also featured: the pandemic's impact on cybercrime; analysis of Europol's annual cybercrime report

Analysis: Facebook Breach's Impact

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the latest developments in Facebook's massive data breach and expert analysis of the potential for nation-state interference in the U.S. midterm elections

Analysis: Will Trickbot Takedown Impact Be Temporary?

Data Breach Today

Experts Weigh in on the Effects of Actions by Microsoft and Others to Disable Botnet Despite the takedown of the Trickbot botnet by Microsoft and others Monday, the malware is still functioning, and its operators retain the tools needed to rebuild their malicious network, some cybsersecurity experts say.

IT 202

Analysis: Indictments in Equifax Hack

Data Breach Today

The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure

Analysis: Supply Chain Management After SolarWinds Hack

Data Breach Today

This edition of the ISMG Security Report features insights from David Forscey, managing director at Aspen Cybersecurity Group, on improving supply chain security in the aftermath of the SolarWinds hack. Also featured: Black Hat Europe's key takeaways; keeping safe during the holidays

Analysis: Coronavirus Cybersecurity and Privacy Issues

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors

Analysis: The Contact-Tracing Conundrum

Data Breach Today

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing

Analysis: Are Darknet Markets Here to Stay?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis on why criminals continue to use darknet markets, despite the risks. Also featured: Hackers target Virgin Mobile KSA; coping with COVID-19 stress

Analysis: Why Ransomware Gangs Getting Bigger Payoffs

Data Breach Today

The latest edition of the ISMG Security Report analyzes why ransomware gangs continue to see bigger payoffs from their ransom-paying victims. Also featured: Lessons learned from Twitter hacking response; security flaw in Amazon's Alexa

Analysis: Permitting Cybersecurity Donations to Physicians

Data Breach Today

New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson