What’s Next in Cybersecurity: Insights for 2023
By Geert van der Linden, EVP & Head of Global Cybersecurity Practice at You might feel like we live in an age of permacrisis. The…
By Geert van der Linden, EVP & Head of Global Cybersecurity Practice at You might feel like we live in an age of permacrisis. The…
In an incident still under investigation, the Housing Authority of the City of Los Angeles (HACLA) was attacked by LockBit during the holiday season. The…
Fraud Management & Cybercrime , Ransomware Pennsylvania Nonprofit Says Patient Medical, Financial Data Breached in 2022 Attack Prajeet Nair (@prajeetspeaks) • January 6, 2023 …
2022 was slow for vendor acquisitions, and Salesforce was no different. The vendor’s three acquisitions in 2022 focused on improving integrations and supporting its ecosystem.…
This week saw a lot of ransomware news, ranging from new extortion tactics, to a ransomware gang giving away a free decryptor after attacking a…
In total 22 proprietary software vulnerabilities were identified in the firmware, which Qualcomm addressed in its January 2023 security bulletin. Firmware attacks are increasingly common…
By Doron Pinhas, Chief Technology Officer, 2022 clearly demonstrated that attacks on data represent the greatest cyber-threat organizations face. The attack pace not only continued,…
Bottom line: The threats of sensitive and relevant online data collected and made available to the public is real and ever-present. News of data dumps…
Fraud Management & Cybercrime , Governance & Risk Management , Insider Threat ‘Shopping Experience’ Engineer at Retailer Accused of ‘Malicious Software Edits’ Mathew J. Schwartz…
Proposals by the Payment Systems Regulator (PSR) to establish a new fraud refund mechanism risks excluding many victims of authorised push payment (APP) fraud and…
Air France and KLM have informed Flying Blue customers that some of their personal information was exposed after their accounts were breached. Flying Blue is…
By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For example, the aviation industry prohibits…