Slot machines go down in cyber-attack on MGM Resorts
Customers also report problems with payments and check-in as IT systems go down at the group's hotels......»»
Data breaches trigger increase in cyber insurance claims
Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1 mill.....»»
How nation-states exploit political instability to launch cyber operations
In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states a.....»»
Protecting the Olympics from cyber-attacks is no mean feat of athleticism
Protecting the Olympics from cyber-attacks is no mean feat of athleticism.....»»
CISOs’ strategies for managing a growing attack surface
In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including mai.....»»
Hackers take control of robovacs and use them to yell slurs
An attack using Ecovacs robot vacuums seems more mischievous than anything else, but it's still unsettling for those affected......»»
Powerful and compact optical frequency combs provide unique opportunities
Remember those big, clunky machines needed for super precise light measurements? Those days are fading thanks to tiny devices called microcombs. These chips can do the same job, but on a much smaller scale, opening doors for new applications......»»
EU adopts Cyber Resilience Act to secure connected products
The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products tha.....»»
DORA regulation’s nuts and bolts
The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market,.....»»
Data loss incidents impact patient care
92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitiga.....»»
Using ChatGPT to make fake social media posts backfires on bad actors
OpenAI claims cyber threats are easier to detect when attackers use ChatGPT. Using ChatGPT to research cyber threats has backfired on bad actors, OpenAI revealed in a report analy.....»»
Internet Archive data breach exposes 31M users; under DDoS attack
An Internet Archive data breach has been confirmed by the organisation, which has also been suffering Distributed Denial-of-Service (DDoS) attacks. The home of the Wayback Machine was previously attacked back in May. At this point, it’s being su.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
Tidal Cyber empowers organizations to improve their protection efforts
Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber Enterprise.....»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
Chinese hack of US ISPs shows why Apple is right about backdoors for law enforcement
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What’s notable about the attack is that it compromised security backdoors deliberately created t.....»»
BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is of the essence when Fortune 500 security teams find themselves waking up to a Code Red vu.....»»
Colleges could benefit from taking a data-driven look at hostility toward Jews on campus
In the year that has passed since the Oct. 7 attack by Hamas on Israel, college campuses have been embroiled in debates about the resulting conflict. A major focus of these debates has been the surge in reports of antisemitic harassment of Jewish stu.....»»
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in v.....»»
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and.....»»
Next-gen Macs with M4 silicon could be here in November
The next wave of Mac machines with the M4 silicon — which includes a refresh for the iMac, MacBook Pro, and Mac Mini lines — could hit the shelves in November......»»