Barracuda's CIO Siroui Mushegian discusses how Barracuda uses AI and strong partnerships to deliver comprehensive cybersecurity solutions. The company builds products on AWS infrastructure, sells them through AWS Marketplace and uses AWS for internal systems.
A Russian activist says security forces covertly installed spyware on his cellphone while he was detained in Moscow for aiding Ukraine. A report published Thursday shows the spyware received a broad range of permissions, from tracking location to reading encrypted messages.
This week, Solana npm package attack, a Brazilian banking giant entered crypto trading and a Nebraska man pleaded guilty to cryptojacking. Australia tightened rules for crypto businesses and crypto losses dropped in 2024 and DMM Bitcoin will cease operations.
Law enforcement investigating murder of Brian Thompson, CEO of UnitedHealthCare are examining potential motives. But shell casings reportedly found at the crime scene spotlight one of the top motives speculated - anger over the company's alleged denial of coverage practices. Where does AI fit in?
CEO Anand Eswaran explains how Veeam's $2 billion secondary offering strengthens its financial position as the data resilience vendor prepares for an initial public offering. He discusses the company’s commitment to innovation and strategic pacts with Splunk, CrowdStrike and Palo Alto Networks.
This week, a vodka maker in bankruptcy cited its ransomware attack, no ransomware at the Spanish tax agency and cable cuttings in Finland. Data stolen from Japanese shoppers, Chemonics International and law firm KYL. A sweep of Asian cybercrime, trends in the U.K. and ENGlobal ransomware attack.
A Russian state hacking group hijacked the command and control infrastructure of a Pakistan-based espionage network as part of an ongoing intelligence-gathering operation targeting victims in Asia, finds a report from Microsoft and Black Lotus Labs.
Security researchers warn of a newly discovered zero-day vulnerability in widely used VoIP telephony software, a discovery that comes as the United States struggles to evict Chinese nation-state hackers from telecom networks. The software is the MiCollab software suite from Canada-based Mitel.
Longtime Tenable CEO Amit Yoran is temporarily stepping aside for cancer treatment and recovery, with top deputies Stephen Vintz and Mark Thurmond stepping up to lead the organization. Yoran was diagnosed in March with a treatable form of cancer, but recently learned he needs additional treatment.
An international investigation led by the U.K. busted Russian money cash-for-crypto laundering networks in an operation that's led to the arrest of 84 individuals and U.S. sanctions against others. One of the network allegedly laundered extortion money paid to the Ryuk ransomware group.
The U.S. Department of Homeland Security is reportedly expanding its use of emerging surveillance tools, including drones and artificial intelligence, without proper safeguards as experts warn of potential privacy violations and risks involving facial recognition and third-party data usage.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.
German police arrested the suspected administrator of the largest German-speaking underground markets for illegal goods and services. Crimenetwork, online since 2012, was used to sell stolen data, drugs and forged documents. The platform had more than 100,000 users and 100 sellers.
Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.