Search results

The cyber insurance market has a critical infrastructure problem

by Tonya Riley • 1 month ago

Rising cybersecurity risks are reviving questions about the ability of cybersecurity insurance to cover the risks of a catastrophic attack.

FBI, CISA, Treasury: North Korean hackers taking aim at health care with Maui ransomware

by Tim Starks • 1 month ago

The ransomware has previously received little public scrutiny.

North Korea aims 'TraderTraitor' malware at cryptocurrency workers

by Tonya Riley • 4 months ago

The Cybersecurity and Infrastructure Security Agency is attributing the campaign to hackers known as the Lazarus Group.

Treasury updates Lazarus Group sanctions with digital currency address linked to Ronin Bridge hack

by Joe Warminsky • 4 months ago

The address received $600 million in Ethereum and other digital currency during the March attack, crypto-tracking company Chainalysis said.

CISA to brief critical infrastructure companies about urgent new Log4j vulnerability

by Tonya Riley • 8 months ago

Log4j is a widely-used open-source logging tool popular in apps including Minecraft, Apple Cloud, Cloudflare and Twitter.

Money launderer connected to North Korean government hackers, 'Hushpuppi' is sentenced to 11 years

by Jeff Stone • 11 months ago

Ghaleb Alaumary faced up to two decades behind bars.

Kaseya says up to 1,500 victims affected by ransomware, as Biden directs 'full resources' to investigate

by Tim Starks • 1 year ago

REvil, the group that took credit for the attack, is seeking $70 million from what it says are actually 1 million victims.

USB-based malware is a growing concern for industrial firms, new Honeywell findings show

by Tonya Riley • 1 year ago

The hacking tools could be bad news for industrial systems.

New global model needed to dismantle ransomware gangs, experts warn

by Shannon Vavra • 1 year ago

Tackling ransomware gangs globally is a tall order, but a path forward is taking shape.

Amid widespread Exchange Server attacks, Microsoft issues patch for older versions

by Shannon Vavra • 1 year ago

It's an unusual move reserved for severe vulnerabilities.