Advanced voice impersonation and deepfake technologies are giving rise to cybercrime groups that offer Vishing-as-a-Service, security researchers say. Vishing is proving to be successful in tricking victims and bypassing voice authorization mechanisms.
A recent hack of a Utah medical radiology group's network server has compromised sensitive health information of more than a half-million individuals, ranking the incident among the 20 largest health data breaches posted on the federal tally so far this year. What are the risks to patients?
Marketers aim to use the right message to reach the right customer at the right time. That’s exactly what cybercriminals do, too — except they’re stealing your brand to sell
Download this report to learn more about why:
All brands are at risk;
Brands don’t realize the...
Ransomware attacks have been a reality for organizations of all sizes for quite
some time. In recent months, however, the volume and sophistication of attacks,
as well as the consequences, have been ratcheting up.
This whitepaper examines ten strategies that can reduce risk, build resilience, and help get...
A cybercriminal known as cfk on popular hacking forums and @AnibalLeaks on Twitter claims to have stolen a database consisting of 45 million records of Argentina's National Registry of Persons, or ReNaPer. The government denies that there has been unauthorized entry into its systems.
A federal judge has imposed the maximum sentences - a total of seven years in prison - on a hacker who earlier pleaded guilty in a conspiracy case involving the hacking of University of Pittsburgh Medical Center human resources databases and the theft of personal information of 65,000 employees - some which was sold...
On one hand, 60% of survey respondents rate their institutions as "above average" or "superior" when it comes to mitigating fraud. Yet, 55% say their customers and partners lack sufficient awareness to protect themselves from fraud. Appgate's Bryan Jardine analyzes the Faces of Fraud survey results.
The number of breach reports filed by U.S. organizations looks set to break records, as breaches tied to phishing, ransomware and supply chain attacks keep surging, the Identity Theft Resource Center warns. It says that there's also been a rise in tardy breach notifications containing little detail.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including why enterprises need a multilayered approach to securing identity, how fraud will evolve in 2022 and the need to secure backdoors to prevent ransomware attacks.
Microsoft has officially gone fully passwordless, allowing Windows users to replace their alphanumeric passwords with one of several substitute sign-in technologies to gain entry into a Microsoft product - a move received positively by industry insiders.
Massachusetts Attorney General Maura Healey says her office is probing the data breach at T-Mobile that exposed the personal information of 54 million people, including current, former and prospective customers of the carrier. The Federal Communications Commission is also investigating the incident.
The White House is preparing executive branch agencies to adopt "zero trust" network architectures by 2024, with CISA and the OMB overseeing the creation of technology road maps that departments must follow. This is a major component of President Biden's cybersecurity executive order.
Veriff’s industry-leading identity verification, KYC, and AML technology is able to process more than 9,500 government-issued ID documents from over 190 countries and match faces with biometric face recognition technology to verify millions of identities across the world.
Download Veriff’s H1 2021 Identity Fraud...
Investment banking giant Morgan Stanley is the latest company to report a data breach tied to zero-day attacks on Accellion's legacy File Transfer Appliance - yet another indicator of the sustained impact of supply chain attacks.