Morgan Stanley has agreed to pay a $60 million fine for its repeated failures to adequately protect customer data when disposing of old equipment.
A new Android ransomware strain known as MalLocker.B is using new techniques to persist and evade defenses.
Ransomware, business email compromise, and social engineering are among the top threats facing organizations, but the magnitude of the problem is not well-understood, Europol said in its threat assessment report.
California voters will vote on Proposition 24, on whether to expand the groundbreaking privacy law that was passed just two yeras ago. Proposition 24, or the California Privacy Rights Act of 2020, builds on the California Consumer Privacy Act of 2018 which just took effect this year.
The new Global Privacy Control protocol is designed to let users tell websites not to sell their data.
Universal Health Services says most of its network and applications are back online after a massive malware infection hit the company last week.
Two hospitality merchants in North America were compromised by point-of-sale malware in May and June of this year, Visa said in a recent technical report.
The newly discovered MosaicRegressor framework has been used by attackers linked to China to deliver a UEFI rootkit in some targets.
The EARN IT Act has now made its was into the House of Representatives, with a key change from the Senate version's stance on encryption.
There are multiple distinct banking Trojan families in Latin America, rather than one large group as has been previously believed, ESET researchers said at the Virus Bulletin 2020 conference.
GitHub has released a new code-scanning feature for both public and private repositories that finds security flaws before they make it into a codebase.
Larry Cashdollar, a senior security researcher at Akamai, joins Dennis Fisher to talk about 20 years of vulnerability research and the many different ways that things can go sideways.
A security incident at Universal Health Services has taken the network of the large health system offline.
Organizations are increasingly developing incident response playbooks to plan out in advance what steps to take in case of a security breach—such as an employees accessing files without authorization, a lost computer, or a server compromised by outside attackers. A team of academics from the UK's University of Kent and University of Warwick outlined a comprehensive playbook on how organizations should communicate after a security incident.
The Zerologon vulnerability Microsoft patched in Windows Server last month is actively being exploited in several attacks, Microsoft warned.