Data Privacy and Cybersecurity

Data Security Demands May Lead To Cryptocurrency Ban

Predicting the future is always an iffy proposition, writes Tara Seals, in Threatpost. Nevertheless, she gives it a try, forecasting evolving business models for cybercriminals…

Cybercriminals Adopt Cloud-Based Services Model

Malicious actors are embracing cloud-based services and technologies to speed their attacks and more efficiently monetize the data they steal. Savvy cybercriminals now sell access…

A Dive Into the Dark Side

The Dark Web/Darknet is where bad guys peddle stolen data and share tips about successful cyberattack strategies, but it’s also a bonanza of cyber-threat intelligence…

20-Year-Old Hacker & Crew Find “Critical Vulnerabilities” At Apple, Collect $288,500

A 20-year-old and a team of fellow hackers he assembled after reading about Apple’s bounty program discovered 55 vulnerabilities at Apple. Eleven of them were…

Who Knew That Campari Owns Wild Turkey?

The Ragnar Locker ransomware gang knew. On Nov. 1 the hacksters informed the Italian spirits brand Campari that they’d encrypted its servers and were holding…

Cybercrime Gang Posts Futuristic Rant, Quits

The Maze Gang, aka The Maze Team Project, which specialized in encrypting files on corporate networks so they couldn’t be accessed and exfiltrating data which…

Home Depot Exposes Canadian Customers’ Data

On Oct 28 Home Depot customers began reporting that they had received hundreds of emails from the store, each containing an order confirmation for a…

Data Breach Victims Lose Trust In the Brand

A Whitepaper on the OPSec Security site discusses a consumer survey revealing that about half of global consumers expect to be hit by a data…

The Gaping Holes In Cyber Insurance

Cyber insurance should be understood as a societal problem, not just a business problem, says a treatise from the Carnegie Endowment. Some fundamental concepts, like…

Ransomware Attacks Affect Company Culture Permanently

Ransomware attacks inflict lasting damage on companies, according to a research paper by cybersecurity company Sophos, and suffering a major attack can make an organization…

Do NOT follow this link or you will be banned from the site!