featureLogic bombs explained: Definition, examples, preventionA logic bomb is malicious code that waits for the right time or opportunity to strike. Some infamous examples show the potential for damage.By Josh FruhlingerJul 05, 202412 minsMalwareCybercrimeSecurity brandpostSponsored by CyberArk Understanding APIs and how attackers abuse them to steal dataBy John Walsh, senior product marketing manager at CyberArkJun 24, 20245 minsCybercrimebrandpostSponsored by CyberArk Why identity security Is essential to cybersecurity strategyBy Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity SecurityJun 24, 20246 minsCybercrime newsScattered Spider arrest in Spain unlikely to stop cybercrime groupBy John Leyden Jun 18, 20244 minsCybercrime brandpostSponsored by CyberArkThe growing threat of identity-related cyberattacks: Insights into the threat landscapeBy Brandon Traffanstedt, senior director in CyberArk’s Field Technology Office Jun 14, 20246 minsCybercrime featureDeepfakes: Coming soon to a company near youBy Grant Gross Jun 14, 20248 minsPhishingCybercrime newsMicrosoft: The brand attackers love to imitateBy Martin Bayer Jun 03, 20243 minsPhishingEmail SecurityCybercrime news‘Operation Endgame’ deals major blow to malware distribution botnetsBy Lucian Constantin May 30, 20244 minsBotnetsMalwareCybercrime newsWorld’s largest botnet seized in Federal bust, Chinese national arrestedBy Shweta Sharma May 30, 20244 minsBotnetsCybercrime ArticlesnewsKroll cyber threat landscape report: AI assists attackers AI is simplifying all sorts of tasks — and not always for the better: cybercriminals, too, are adopting it.By Lynn Greiner May 24, 2024 4 minsThreat and Vulnerability ManagementCybercrimeVulnerabilitiesnews analysisEmerging ransomware groups on the rise: Who they are, how they operateNew and developing ransomware gangs move to fill the void left by the shutdown and law enforcement disruption of big players, with differing tactics and targets.By Lucian Constantin May 24, 2024 6 minsRansomwareCybercrimenewsTracking manual attacks may deliver zero-day previewsAccording to analysis from LexisNexis, human-based digital fraud attacks are increasing more quickly than bot-based attacks — a difference CISOs should leverage for their defenses.By Evan Schuman May 23, 2024 4 minsCyberattacksFraudCybercrimenewsLockBit no longer world’s No. 1 ransomware gangAfter dominating for eight months, LockBit has been overtaken by ransomware gang Play in the wake of a law enforcement crackdown and unmasking of LockBit’s alleged creator.By Viktor Eriksson May 23, 2024 2 minsRansomwareCybercrimenews analysisGlobal stability issues alter cyber threat landscape, ESET reportsWith conflict on the rise, regional APT groups are increasing activity, altering focus, and putting specific industries in their crosshairs. Here’s what CISOs should know.By Evan Schuman May 20, 2024 4 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementnewsBreachForums seized by law enforcement, admin Baphomet arrested Official telegram channels operated by BreachForums members confirm law enforcement seizures and arrest. By Shweta Sharma May 16, 2024 4 minsData BreachCybercrimenewsAdministrator of ransomware operation LockBit named, charged, has assets frozenA Russian national alleged to have been the administrator of the notorious and prolific LockBit ransomware provider faces international charges. A $10-million reward for the suspect’s arrest has been offered.By Lucian Constantin May 07, 2024 3 minsAdvanced Persistent ThreatsHacker GroupsRansomwareopinionWhat is the dark web? How to access it and what you’ll findThe dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.By Darren Guccione Apr 02, 2024 13 minsData BreachTechnology IndustryCybercrimenewsThe US indicts 7 Chinese nationals for cyber espionageThe UK has similarly linked a Chinese state-affiliated entity to the compromise of the UK Electoral Commission’s systems between 2021 and 2022.By Sandeep Budki Mar 26, 2024 6 minsCyberattacksCybercrimenews analysisNew phishing campaign targets US organizations with NetSupport RATThe sophisticated campaign gives attackers wide access under the guise of legitimate remote support software.By Lucian Constantin Mar 21, 2024 3 minsPhishingCyberattacksMalwarenews analysisNo easy solutions to the ransomware threat despite takedownsLaw enforcement takedowns of ransomware actors are accelerating, but experts think that as long as Russia harbors the cybercriminals, there are no quick and easy solutions to tamping down the ransomware crime wave.By Cynthia Brumfield Mar 19, 2024 11 minsRansomwareCybercrimenews analysisAttackers abuse cloud accounts to spawn thousands of crypto CDN nodesThis new technique to monetize cryptojacking avoids traditional detection methods that rely on monitoring CPU cycles and RAM usage.By Lucian Constantin Mar 13, 2024 4 minsCryptocurrencyCyberattacksCloud Security Show more Show less View all Upcoming Events21/Oct-23/Oct awards CSO50 Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity 21/Oct-23/Oct awards CSO Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Cyber Recovery and Disaster Recovery as a Service In this webcast from VMware and Broadcom, the focus is on cyber and data recovery, with an emphasis on business value. The post Cyber Recovery and Disaster Recovery as a Service appeared first on Whitepaper Repository –. By VMware 20 Jun 2024CybercrimeData ManagementVMware whitepaper Best Practices in Cybersecurity and Cyber Resilience By Cohesity Inc. 07 Jun 2024Business OperationsCybercrimeData and Information Security whitepaper Best Practices in Cybersecurity and Cyber Resilience By Cohesity Inc. 07 Jun 2024Business OperationsCybercrimeData and Information Security View all Video on demand videoWhy ransomware is still a major concern for healthcare systemsCyberattacks continue to threaten healthcare systems around the world, putting patients at risk and further eroding trust in healthcare providers. Can anything be done to reduce the risk, or will going to the doctor or hospital be a roll of the dice when it comes to personal and private data, as well as health equipment? Keith chats with Wes Wright, the chief healthcare officer at Ordr.net, about the ongoing threat of ransomware for healthcare systems. Nov 28, 2023 44 minsRansomwareCybercrime MGM Resorts Hack: Key Takeaways and Lessons Learned for Cybersecurity Nov 02, 2023 43 minsHacker GroupsRansomwareCyberattacks Why security awareness training is failing Oct 13, 2023 29 minsPhishingCyberattacksIT Training What is inside a hacker’s backpack? Sep 06, 2023 33 minsHackingCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO