#information security

[ follow ]
#cybersecurity
Dr.Web
1 week ago
Information security

Doctor Web resumed virus database updates after the attack on its infrastructure

Doctor Web quickly restored operations after a cyberattack, ensuring customer safety and resuming virus database updates within three days. [ more ]
www.itpro.com
2 weeks ago
Information security

Cracking open insider threats

Insider threats pose significant risk, requiring businesses to enhance their security strategies beyond just external defenses. [ more ]
ITPro
3 weeks ago
Information security

The history - and future - of automation in security

Automation in cybersecurity has evolved significantly over 40 years, enhancing defenses by facilitating speedy responses and minimizing human error. [ more ]
Theregister
1 month ago
Information security

Dick's Sporting Goods runs into problems with online attack

Dick's Sporting Goods suffered a cyberattack that targeted its servers, but claims no disruption to business operations has occurred. [ more ]
The Hacker News
1 month ago
Information security

New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads

Researchers discovered a new dropper delivering malware through Windows shortcut files disguised as pirated movies, targeting information stealers. [ more ]
The Hacker News
1 month ago
Information security

Russian-Linked Hackers Target Eastern European NGOs and Media

Two spear-phishing campaigns targeting Russian opposition organizations and international NGOs show a sophisticated alignment with Russian governmental interests. [ more ]
Dr.Web
1 week ago
Information security

Doctor Web resumed virus database updates after the attack on its infrastructure

Doctor Web quickly restored operations after a cyberattack, ensuring customer safety and resuming virus database updates within three days. [ more ]
www.itpro.com
2 weeks ago
Information security

Cracking open insider threats

Insider threats pose significant risk, requiring businesses to enhance their security strategies beyond just external defenses. [ more ]
ITPro
3 weeks ago
Information security

The history - and future - of automation in security

Automation in cybersecurity has evolved significantly over 40 years, enhancing defenses by facilitating speedy responses and minimizing human error. [ more ]
Theregister
1 month ago
Information security

Dick's Sporting Goods runs into problems with online attack

Dick's Sporting Goods suffered a cyberattack that targeted its servers, but claims no disruption to business operations has occurred. [ more ]
The Hacker News
1 month ago
Information security

New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads

Researchers discovered a new dropper delivering malware through Windows shortcut files disguised as pirated movies, targeting information stealers. [ more ]
The Hacker News
1 month ago
Information security

Russian-Linked Hackers Target Eastern European NGOs and Media

Two spear-phishing campaigns targeting Russian opposition organizations and international NGOs show a sophisticated alignment with Russian governmental interests. [ more ]
morecybersecurity
#information-security
Theregister
2 weeks ago
Information security

1.7M potentially pwned by payment services provider breach

Slim CD is notifying 1.7 million customers due to a data breach that may have compromised credit card information. [ more ]
London Business News | Londonlovesbusiness.com
2 weeks ago
Information security

What are the three types of access control? - London Business News | Londonlovesbusiness.com

Access control is essential for moderating who can access specific resources within an organization. [ more ]
Hot for Security
3 weeks ago
Privacy professionals

California-based Elderly Care Company Warns of Data Breach

Covenant Care California experienced a data breach affecting patients' personally identifiable information, prompting a delayed notification process for those impacted. [ more ]
ComputerWeekly.com
3 weeks ago
Information security

Cyber firms need to centre their own resilience | Computer Weekly

Crowdstrike's outage illustrates the critical risks associated with inadequate information security and automated updates. [ more ]
Federal Trade Commission
4 weeks ago
Privacy professionals

FTC Takes Action Against Security Camera Firm Verkada over Charges it Failed to Secure Videos, Other Personal Data and Violated CAN-SPAM Act

Verkada must implement a security program and pay a $2.95 million penalty for security failures and CAN-SPAM Act violations. [ more ]
San Francisco Bay Times
1 month ago
Privacy professionals

David Wayne Aguilar of Consult Our Source - San Francisco Bay Times

Consult Our Source specializes in information security for major clients, leveraging two decades of experience to safeguard sensitive data. [ more ]
Theregister
2 weeks ago
Information security

1.7M potentially pwned by payment services provider breach

Slim CD is notifying 1.7 million customers due to a data breach that may have compromised credit card information. [ more ]
London Business News | Londonlovesbusiness.com
2 weeks ago
Information security

What are the three types of access control? - London Business News | Londonlovesbusiness.com

Access control is essential for moderating who can access specific resources within an organization. [ more ]
Hot for Security
3 weeks ago
Privacy professionals

California-based Elderly Care Company Warns of Data Breach

Covenant Care California experienced a data breach affecting patients' personally identifiable information, prompting a delayed notification process for those impacted. [ more ]
ComputerWeekly.com
3 weeks ago
Information security

Cyber firms need to centre their own resilience | Computer Weekly

Crowdstrike's outage illustrates the critical risks associated with inadequate information security and automated updates. [ more ]
Federal Trade Commission
4 weeks ago
Privacy professionals

FTC Takes Action Against Security Camera Firm Verkada over Charges it Failed to Secure Videos, Other Personal Data and Violated CAN-SPAM Act

Verkada must implement a security program and pay a $2.95 million penalty for security failures and CAN-SPAM Act violations. [ more ]
San Francisco Bay Times
1 month ago
Privacy professionals

David Wayne Aguilar of Consult Our Source - San Francisco Bay Times

Consult Our Source specializes in information security for major clients, leveraging two decades of experience to safeguard sensitive data. [ more ]
moreinformation-security
Axios
9 months ago
Privacy professionals

Ex-Twitter exec claims X fired him for raising security concerns after Musk-led takeover

Twitter's former global head of information security is accusing the company of wrongly firing him for raising concerns about budget cuts following the Elon Musk-led takeover.
The lawsuit alleges that Musk hired an advisor who cut Twitter's products and services that supported an FTC consent decree, and both Musk and the advisor were dismissive of the decree. [ more ]
Nextgov.com
10 months ago
Privacy professionals

Nevada Dem renews push for data privacy standards

Sen. Catherine Cortez Masto reintroduced three bills aimed at adding oversight and transparency to private sector data collection.
The bills address information security standards, data collection practices, software distribution, and privacy-enhancing technologies.
Cortez Masto emphasizes the need for stronger privacy laws to protect consumers' personal information. [ more ]
ComputerWeekly.com
10 months ago
Privacy professionals

ICO alerted after technical 'issue' exposed college files to student barristers | Computer Weekly

The Inns of Court College of Advocacy (ICCA), a leading college for barristers, experienced a data breach that allowed students to access sensitive files on hundreds of other students.
The breach exposed personal information such as email addresses, phone numbers, exam marks, previous institutions attended, ID photos, and sensitive data like health records, visa status, and parental status.
The college is investigating the breach and has notified the Information Commissioner's Office. They have also sought written undertakings from the students who accessed the files to not share the data further. [ more ]
[ Load more ]