Number of US Breach Victims Jumps 564% in Q1 2021

Number of US Breach Victims Jumps 564% in Q1 2021

The number of publicly reported breach victims in the US has soared by 564% from the end of 2020 to the first three months of this year, according to the latest data from the Identity Theft Resource Center (ITRC). The non-profit claimed that 51 million consumers were affected by incidents in Q1 2021, versus eight million in the final three months of 2020. However, the volume of breaches only rose by 12%, or 363, over…

Read More

Italian Arrested After Paying Hitman to Murder Ex-Girlfriend

Italian Arrested After Paying Hitman to Murder Ex-Girlfriend

Europol has revealed the arrest of an Italian national suspected of paying for a hitman via a dedicated dark web site. The unnamed suspect reportedly paid €10,000 in Bitcoin to have their ex-girlfriend murdered. They visited a website hosted on the TOR network which advertised assassination services. Europol said its European Cybercrime Centre (EC3) and Joint Cybercrime Action Taskforce (J-CAT) assisted the Italian Postal and Communication Police (Polizia Postale e delle Comunicazioni) in the operation….

Read More

Get Involved with Docker – Docker Blog

Get Involved with Docker – Docker Blog

Every day, hundreds of passionate Docker users around the world contribute to Docker. Whether you are just getting started or are an expert in your field, there are many ways to get involved and start contributing to Docker. If you’re into technical writing, you can easily publish and/or edit articles in docs.docker.com. If you’re more into code contribution, there are dozens of open source Docker projects you can dive into. Or if you’re just interested…

Read More

Taking a DIY approach to cybersecurity is a dangerous proposition

Taking a DIY approach to cybersecurity is a dangerous proposition

Taking a DIY approach to cybersecurity is a dangerous proposition | 2021-04-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

New report reveals collaboration platform security risks

New report reveals collaboration platform security risks

New report reveals collaboration platform security risks | 2021-04-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Integrity: How It’s More than Just Data Security and FIM

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security circles up until now. Let’s take a look at the security industry more broadly. In most conversations dealing with integrity, data security and File Integrity Monitoring (FIM) controls often end…

Read More

2021 Brings new security challenges and regulations for European CISOs

2021 Brings new security challenges and regulations for European CISOs

European CISOs are shifting how they spend on security in response to the COVID-19 pandemic and are having to adopt to a raft of new proposed EU cyber regulations. Forrester has recently explored three security topics: that of European cyber regulations, European CISO budgetary trends in 2021, and finally the career paths of CISOs at major UK FTSE 100 organizations. What becomes apparent is that European CISOs are shifting how they spend on security in…

Read More

PowerCLI: An Aspiring Automator’s Guide

PowerCLI: An Aspiring Automator’s Guide

Getting into scripting can be daunting. It’s easier to just use existing scripts found online, but if you choose this route you’ll quickly run into limitations. If you take the time to learn how to create your scripts, trust me, you’ll never look back! PowerCLI: The Aspiring Automator’s Guide Automating vSphere is particularly useful for countless applications and the best way is through PowerCLI – a version of PowerShell developed specifically for VMware. Learn how…

Read More

How to better combat malware delivered through email

How to better combat malware delivered through email

A majority of security pros said they’re most concerned about malicious payloads sent to employees via file attachments, according to a survey from GreatHorn. Image: iStock/Igor Kutyaev Phishing emails are one of the most common and successful ways to infect an organization with malware. Employees who’ve been instructed not to click on file attachments and links in unexpected emails still can’t seem to resist the temptation. Once triggered, a single malicious payload can lead to…

Read More

Consulting Firm Data Breach Impacts MSU

Consulting Firm Data Breach Impacts MSU

Michigan State University (MSU) has been impacted by a data breach stemming from a cyber-attack on an Ohio law firm. Bricker & Eckler LLP, which is associated with MSU Title IX contractor INCompliance Consulting, was hit with ransomware in January 2021.  An investigation into the incident determined that an unauthorized party gained access to certain Bricker internal systems at various times between approximately January 14 and January 31. “Findings from the investigation indicate that the party…

Read More
1 2,321 2,322 2,323 2,324 2,325 2,562