The 2019 Midyear Quickview Data Breach Report from Risk Based Security says that 2019 is on track to being the “worst year on record” for data breach activity.
A long-running scam email campaign that pretends to be an unsubscribe confirmation request has seen a recent resurgence according to researchers in the Information Security Community.
A major breach of the biometric database Suprema has been reported. Suprema describes itself as a "global Powerhouse in biometrics, security and identity solutions," with a product range that "includes biometric access control systems, time and attendance solutions, fingerprint live scanners, mobile authentication solutions and embedded fingerprint modules."
The ransomware called MegaCortex, which is known to target enterprises, has been retooled for wide-scale attacks.
iNSYNQ, a United States-based Cloud hosting provider, was hit in mid-July, by a massive ransomware attack which crippled its cyberinfrastructure and prevented QuickBooks customers from accessing their accounting data for three days.
Credit and debit card accounts linked to a data breach at select Hy-Vee locations may be the source of data from 5.3 million accounts being offered for sale online.
Governor John Bel Edwards made the announcement over a cybersecurity issue after a series of attacks shut down phones and locked and encrypted data at three of the state’s school districts.
The Department of Justice (DOJ) charged a Pakistani man with bribing AT&T employees more than $1 million to install malware on the company's network and unlock more than two million devices.
State Farm Insurance is notifying customers that accounts have been compromised by a credential-stuffing attack, which is accomplished by hackers who take advantage of users who often reuse the same passwords across multiple online accounts.
The Department of Justice (DOJ) announced the arrest of 281 suspects in connection with email scams and wire transfer fraud, which is the biggest arrest of its kind against this type of digital scammer.
PerCSoft, a Wisconsin-based company that manages a remote data backup service for hundreds of dental offices across the country, is struggling to restore access to client systems after falling victim to a ransomware attack.
Malicious software samples uploaded by U.S. Cyber Command to VirusTotal are associated with campaigns from Lazarus Group, an advanced persistent threat group linked with North Korea. Lazarus is an umbrella name that typically describes hacking activity which advances Pyongyang’s interests, and the group is especially known for hacking banks and other financial institutions.
Source: The Department of Homeland Security
Texas is currently fighting an unprecedented wave of ransomware attacks that has targeted local government entities in the state, with at least 23 impacted by the attacks.
The campaign is designed to deliver Quasar Remote Administration Tool (RAT) onto Windows systems via password-protected fake resume documents.
How safe is your organization? Take the Cyber Risk Scorecard survey to assess your current cybersecurity standing and find additional steps your organization can take to protect against common cyber threats.
Jake Omann specializes in providing clients with risk management and executive risk services that cover their liabilities as a corporation, as well as the personal liabilities of their directors and officers. He started his career over 10 years ago in sales at a multinational financial services co
Jake Omann specializes in providing clients with risk management and executive risk services that cover their liabilities as a corporation, as well as the personal liabilities of their directors and officers. He started his career over 10 years ago in sales at a multinational financial services corporation before beginning his broker career in managing executive risk programs for Fortune 500 companies. Jake currently sits on the board for ACES for Kids.
Wire transfer requests top the list of business email compromise (BEC) objectives, according to a study by Barracuda Networks. Additional objectives laid out by the report include duping users into clicking on malicious links, establishing rapport and stealing information, with the end goal of extorting millions of dollars from unsuspecting companies.
This month's Threat Intelligence Report is about a large hotel chain that reports an “unauthorized access” to its customer database since 2014, exposing data of 500 million guests; a vulnerability in a postal service site that left 60 million customers exposed for more than a year; a third-party vendor breach that exposes data of millions of healthcare patients; a new report that profiles notorious MageCart cyber criminals; court documents that reveal first-ever indictment on ransomware charges; and a bundled pack that makes SamSam and other ransomware easier for hackers to obtain and deploy.
Send a Message
Find a Location