Cybercrime gangs are still making hay with ransomware, but a new report from Europol shows that malicious cryptomining is gaining momentum.
A Business Email Compromise (BEC) scam is a type of financial fraud designed to steal money from businesses and individuals. If the email from the CEO says to transfer money ASAP, it's time to call IT, not the bank.
Sen. Ron Wyden says foreign hackers are targeting the personal accounts of senators and is introducing legislation to help protect those accounts.
A year after the massive data breach rocked Equifax, there has been some incremental changes: new state regulations and a federal law for credit freezes. What more needs to happen to get significant improvements in data security and digital privacy?
For many criminals, the fact that they can just buy remote desktop protocol (RDP) credentials means they don’t need to spend the time trying to develop their own attacks. With RDP, the network is their oyster.
Facebook is expanding its bug bounty program to third-party apps and websites that might expose user tokens improperly.
Cloudflare has released a gateway and browser extension to make the distributed IPFS network easily and securely accessible.
F-Secure researchers found that modifying the hardware on modern computers make them susceptible to “cold boot” attacks where passwords and encryption keys can be harvested from memory. Hibernate or power off. Don't put the computer in sleep mode.
Five lawmakers have asked the Secretary of State for answers about his agency's failure to implement MFA despite a federal requirement to do so.
The attack group known as Magecart has been stealing payment information from sites for several years and is showing signs of maturation with the BA breach.
A data breach disrupts day-to-day operations and can hurt the company’s reputation, but the fact that stock prices bounce back pretty quickly makes it seem like the stock market doesn't penalize the company. Analysis by UK-based Comparitech found that long-term impact on the company’s stock performance after a breach.
Security strategist, adviser, and author Richard Bejtlich joins the podcast to talk about the evolution of incident response and how the security community has changed over the last 20 years.
The Mirai and Gafgyt IoT botnets recently have begun adding exploits for vulnerabilities in enterprise products.
The United States Department of Justice painstakingly laid out the investigative breadcrumbs that identified the tools and techniques used by North Korea in offensive campaigns conducted over a four-year span, which includes the attack against Sony Pictures in 2014, the theft from Bangladesh Bank in 2016, and the devastating WannaCry ransomware outbreak in 2017.
The Tor Browser, which allows for private web browsing, is now available for the Android platform.