Global Operations Lead to Arrests of Alleged Members of GandCrab REvil and Cl0p Cartels

Global Operations Lead to Arrests of Alleged Members of GandCrab REvil and Cl0p Cartels

A total of 13 suspects believed to be members of two prolific cybercrime rings were arrested as a global coalition across five continents involving law enforcement and private partners, including Trend Micro, sought to crack down on big ransomware operators. About the GandCrab/REvil arrests According to a report by Interpol, the global operation, which was done by 19 law enforcement agencies in 17 countries, led to the apprehension of seven suspects linked as “affiliates” or…

Read More

VMware Cloud on AWS at re:Invent 2021 – Cloud Blog – VMware

VMware Cloud on AWS at re:Invent 2021 – Cloud Blog – VMware

AWS re:Invent 2021 is here again with its 10 year anniversary. And its super exciting as we are going to have in-person event again after 2019 where you will have a chance to attend live sessions, meet subject matter experts in person and attend some great networking events. For those who can’t go to Las Vegas in person, there is a virtual option as well. So if you have not done so, please register now…

Read More

Cybersecurity is a growing field that can benefit from hiring veterans

Cybersecurity is a growing field that can benefit from hiring veterans

There is a real need for “boots-on-the-ground” cybersecurity professionals, so why not tap into a pool of trained and motivated veterans? Image: iStock/Drazen Zigic There are numerous success stories on how veterans are able to transition into the private sector and flourish. One such story involves Sloane Menkes, the cybersecurity, risk and regulatory principal at PwC. Menkes’ military career started with the U.S. Air Force Academy. After graduating, she was commissioned as an information systems…

Read More

Fake emails exploited FBI email service to warn of phony cyberattacks

Fake emails exploited FBI email service to warn of phony cyberattacks

A hacker has taken responsibility for the compromise, saying they did it to highlight a vulnerability in the FBI’s system. Image: Getty Images/iStockphoto The FBI is usually a key source that tries to help people combat cyberattacks and security threats. But in an unusual twist, the law enforcement agency has found itself the victim of an exploit. SEE: Security incident response policy (TechRepublic Premium) On Saturday, spam tracker Spamhaus tweeted that it had learned of…

Read More

Scam Spotter Campaign Flags Gift Card Fraud

Scam Spotter Campaign Flags Gift Card Fraud

A cyber-safety platform has found a humorous way to warn the American public how to spot a gift card scam ahead of the holiday season.  ScamSpotter.org has made a series of amusing videos in which some of the ridiculous storylines deployed by gift card scammers are played out by actors.  In one Hollywood blockbuster–style dramatization, a grandmother steals a helicopter and breaks into a jail in a foreign country to set her granddaughter free using gift…

Read More

US Journalist Imprisoned for Spreading False Information is Freed

US Journalist Imprisoned for Spreading False Information is Freed

An American journalist who was sentenced to prison in Myanmar for disseminating fake or incendiary information has been freed. Danny Fenster was arrested at Yangon Airport on May 24 in connection with his role as the managing editor of online magazine Frontier Myanmar. On Friday, a court in military-ruled Myanmar found the 37-year-old from Detroit, Michigan, guilty of violating visa regulations, spreading false news or information that causes fear, and contacting illegal organizations. Despite calls from rights…

Read More

How organizations are beefing up their cybersecurity to combat ransomware

How organizations are beefing up their cybersecurity to combat ransomware

Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy. Image: Shutterstock/Carlos Amarillo The recent wave of ransomware attacks has triggered heightened concerns among everyone from the private sector to the federal government. To better combat ransomware attacks, organizations realize that they have to improve key aspects of their cyber defenses. A report released Monday by identity management provider Hitachi ID looks at the changes…

Read More

Resiliency helps teams adapt to evolving risks. Learn how to update and automate your path with VMware Cloud Disaster Recovery.

Resiliency helps teams adapt to evolving risks. Learn how to update and automate your path with VMware Cloud Disaster Recovery.

Recently I hosted a great conversation with Belu De Arbelazi who leads our product marketing strategy for Resiliency using VMware Cloud Disaster Recovery, see the video below. Check out the themes in the article for more details. Belu De Arbelazi helps explain modern challenges and solutions. DR automation drives resiliency in the face of (un)expected technical challenges VMware Cloud DR represents the advanced DR technologies within the VMware portfolio. Teams are learning the increasing complexity…

Read More

Immersive Labs Acquires Snap Labs

Immersive Labs Acquires Snap Labs

American cybersecurity startup Snap Labs has been snapped up by British cybersecurity startup Immersive Labs. The acquisition of the Pennsylvania-based company was announced today by Immersive Labs founder and CEO James Hadley. Hadley wrote that both companies share the belief that simulating real-world experiences is the best way to develop the in-depth cyber knowledge, skills, and judgment needed to tackle cybersecurity risk. “It’s hugely exciting to be able to share this belief with other like-minded entrepreneurs and work together to…

Read More

Don’t fall for LinkedIn phishing: How to watch for this credential-stealing attack

Don’t fall for LinkedIn phishing: How to watch for this credential-stealing attack

Cybercriminals are now using LinkedIn to find a way into your files. Learn how to detect phishing on LinkedIn and protect yourself from it. Image: Natee Meepian/Shutterstock Cybercriminals are always changing their tactics in order to achieve their goals. With phishing, the goal is to collect banking credentials, credit card numbers or get access to emails from users, which in turn allows them to run more sophisticated scams, like the infamous business email compromise scam…

Read More
1 2,156 2,157 2,158 2,159 2,160 2,763