Sun.May 07, 2023

article thumbnail

Why Humans Alone Can't Beat Cybercrime

Data Breach Today

Rubrik CEO Sinha on Why Defenders Need Latest Tech to Keep Up With Threat Actors Cybercrime has grown considerably in the last several years. The scope, velocity and variability of attacks have increased, as has the attack surface - and it's impossible for humans alone to understand, correlate, find the cause, analyze and fix it, said Bipul Sinha, co-founder and CEO of Rubrik.

IT 157
article thumbnail

San Bernardino County Sheriff’s Department paid a $1.1M ransom

Security Affairs

The San Bernardino County Sheriff’s Department confirmed that it has paid a $1.1-million ransom after the April ransomware attack. The San Bernardino County Sheriff’s Department opted to pay a $1.1-million ransom after a ransomware attack infected its systems in early April. The ransomware attack forced the Police department to temporarily shut down some of its systems to prevent the threat from spreading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Past, Present and Future of Tech Regulation

Data Breach Today

Center for Strategic and International Studies' Gerstell on Impact of New Rules Historically, U.S. regulators have been slow to set controls on critical infrastructure because of the technical complexity of systems in that sector, but that is changing thanks to the U.S. national cybersecurity strategy, said Glenn Gerstell of the Center for Strategic and International Studies.

article thumbnail

Dragon Breath APT uses double-dip DLL sideloading strategy

Security Affairs

An APT group tracked as Dragon Breath has been observed employing a new DLL sideloading technique. Sophos researchers observed an APT group, tracked as Dragon Breath (aka APT-Q-27 and Golden Eye), that is using a new DLL sideloading technique that adds complexity and layers to the execution of the classic DLL sideloading. The attack consists of a clean application, which acts as a malicious loader, and an encrypted payload.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Role of Regulation in Comprehensive Cybersecurity

Data Breach Today

HackerOne's Ilona Cohen on Why Critical Infrastructure Needs More Regulatory Focus How much regulation is too much, and how much is too little? Increased cyber regulation, especially in areas of critical infrastructure, is necessary, as outages in the space have the potential to affect many Americans, said Ilona Cohen, chief legal and policy officer at HackerOne.

article thumbnail

Your Twitter Feed Sucks Now. These Free Add-Ons Can Help

WIRED Threat Level

A few simple tools can help filter out most Twitter Blue users (but still see the ones you like).

Privacy 83