Hewlett Packard Enterprise in an after-hours regulatory filing disclosed that suspected Russian state hackers had gained access to corporate email inboxes for more than seven months. A threat group tracked as "Midnight Blizzard" first penetrated HPE's cloud-based email service in May 2023.
Federal regulators have released guidance that spells out voluntary cybersecurity performance goals for the healthcare sector. The document is a first step in fleshing out the Biden administration's strategy to push hospitals and other healthcare entities to adopt a stronger cybersecurity posture.
A security vulnerability in Fortra's GoAnywhere managed file transfer software can allow unauthorized users to create a new admin user. The vulnerability is a remotely exploitable authentication bypass flaw. Hackers have targeted file transfer software over the past year, including GoAnywhere MFT.
Cloud security just got quantifiably profitable. A 2023 Forrester Consulting TEI study commissioned by Palo Alto Networks reveals how Prisma® Cloud's Code to Cloud™ platform delivers a 264% return on investment (ROI) over three years. This comprehensive report provides a clear framework for organizations to...
The cloud native revolution demands a revolution in security. Enter Cloud-Native Application Protection Platforms (CNAPPs). This Frost Radar™ analysis dives deep into the booming CNAPP market, where over 30 vendors vie for dominance. But consolidating cloud infrastructure, workload protection, and application...
Cloud security just got unified and powerful. Introducing Cloud-Native Application Protection Platforms (CNAPPs). This Gartner® Market Guide empowers you to navigate the surging CNAPP market, where security transforms from a patchwork of tools to a single, integrated platform.
Cloud-native apps need top-notch...
Cloud workload protection platforms (CWPP) are surging in popularity as organizations embrace cloud migration, cloud-native technologies, and IaaS spending booms. Legacy security solutions and CSPM struggle with real-time threat detection and vulnerability management, pushing organizations to adopt CWPP for...
An unsecured database appearing to belong to a Netherlands-based medical laboratory exposed 1.3 million records on the internet, including COVID test results and other personal identifiable information, said a security researcher who discovered the trove and reported his findings to the company.
Non-bank mortgage lending giant LoanDepot says hackers stole "sensitive personal information" pertaining to 16.6 million customers when they breached its systems earlier this month as part of a ransomware attack. The company said it will directly notify all affected customers.
Skateboarding shoe and outdoor apparel maker VF Corp. said data pertaining to 35.5 million customers appears to have been stolen in a data breach the company detected and disclosed last month. The breach disrupted e-commerce order fulfillment as well as inventory replenishment at retail stores.
The appearance of Naz.api - a massive collection of online credentials harvested by information-stealing malware that contains 71 million unique email addresses - illustrates the scale at which such data is being collected, shared and sold, security experts warn.
This week, Microsoft expanded plans to store EU citizens' data locally, shipping-themed phishing spam is a threat, the British Library overcame a ransomware setback, the FBI warned of Androxgh0st malware, Remcos RAT targeted South Korea, and eBay was fined $3 million for a cyberstalking campaign.
It's last call for Drizly, the alcohol delivery service Uber bought for $1.1 billion in 2021. Whether or not Drizly's past cybersecurity missteps - leading to a two-decade consent agreement with regulators - played any part in its being retired by Uber remains unclear.
Extended Detection and Response (XDR) has evolved significantly over the past few years, becoming more critical than ever for organizations in need of enhanced capabilities. But so, too, have the accompanying managed services evolved. Port53 Technologies President Omar Zarabi explains.
Robert Blumofe, executive vice president and CTO at Akamai, expects social engineering, phishing, extortion and AI-driven attacks to dominate the threat landscape. He advised enterprises to use FIDO2-based MFA, zero trust, microsegmentation and API security to reduce risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.