The ODP Corp. reports in a Securities and Exchange Commission 8-K filing that it has suffered a loss of about $28 million due to a March 1 cyber incident at its business services and supplies subsidiary, CompuCom, that forced the company to shut down some of its operations.
Customers of Indian payments platform MobiKwik appear to have gotten a lucky break: A listing for 8.2TB of stolen data pertaining to 99 million customers was withdrawn by a cybercrime forum seller, supposedly because of the public risk posed. MobiKwik continues to deny that it was breached. Who's to be believed?
Many organizations have invested in improving their threat detection capabilities over the
past two years and express increased confidence in their ability to stop threats that have
penetrated the network perimeter. However, these organizations also cite a number of
weaknesses and areas for further improvement,...
Love it or hate it, email remains an essential business and productivity tool. Many organizations have now migrated to cloud-based Office 365 email for their employees. But while cloud-based approaches offer easier procurement, manageability and better cost savings, certain email facts of life won't change.
Moving...
The rush to operationalize remote work did not afford the time to conduct the usual level of due diligence associated with a range of issues such as scaling VPN infrastructure, tightening access/authentication policies and process and vetting personal devices not configured to corporate standards.
However, while...
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
Quantum computing eventually could break existing cryptographic methods with brute force attacks, so organizations need to prepare now, says Evangelos Rekleitis of ENISA.
DDoS, one of the oldest types of cyberthreats, continues to pose major security risks for virtually every type of enterprise — small and large alike. And while some organizations might believe they’re a low-risk target, the growing reliance on internet connectivity to power business-critical applications leaves...
As remote work continues, organizations across DACH - and beyond - must ensure that their employees can work remotely easily as well as securely, while sacrificing nothing on the performance, stability, or productivity front.
To make that happen, many organizations have increased their adoption of SD-WAN and Secure...
Eleven U.S. senators are raising concerns about the Department of Energy's cybersecurity readiness as the department continues to investigate a breach related to the SolarWinds supply chain attack.
Identity crimes are up, but data breaches are down. What does this mean for risk mitigation strategies? Jim Van Dyke and Al Pascual of Sontiq offer an analysis.
Many organizations have updated the authentication process for customers to help ensure frictionless transactions. Now, some are starting to take similar steps to streamline and enhance authentication of their employees - especially those working remotely.
What happens when an e-commerce retailer sends customers a data breach notification email with a subject line that reads "strictly private and confidential"? "Clearly trying to make people stay quiet," responded one unamused Fat Face customer. Others report being none the wiser as to what risks they now face.
What if organizations could turn external penetration testing into an interactive experience they could use to regularly evaluate and increase their security posture? It is possible. SANS instructor Matt Bromiley reviews Cobalt's "pentest as a service" platform, an experience he describes as "an information security...
This guidebook aims to outline how security teams can transform pentesting from a development blocker into a value-adding program that provides periodic feedback. It explores the following:
What on-demand pentesting is and how it can lead to more timely vulnerability findings
The value pentesting can bring to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.