The International Committee of the Red Cross (ICRC) has taken a new step to regulate the activities of civilian hackers in conflict zones. To address the rise in the involvement of civilian hackers in inter-state conflicts, the ICRC has come up with eight directives to ensure that these hackers don’t end up harming non-combatants.

According

Retool, a software development firm offering modular code for customizable enterprise software, recently notified 27 customers that a threat actor had accessed their accounts. The attacker was able to navigate through multiple layers of security controls after taking advantage of an employee through an SMS-based phishing attack. The attacker then used this access to target

CNBC surveys over 2,000 small businesses each quarter to get their thoughts on the overall business environment and their small business’ health. According to the latest CNBC/SurveyMonkey Small Business Survey, despite repeated warnings by the Cybersecurity and Infrastructure Security Agency and the FBI that U.S.-based businesses are at an increased risk of a cyber-attack following

Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types of attacks helps companies prepare for their response before the attack happens. 

More and more companies are testing their incident response plans by conducting

Another day, another governmental entity hit with a ransomware attack. If you are a resident of Bernalillo County, New Mexico, and you need a marriage license, want to conduct a real estate transaction or register to vote, you might be told there is “no access to systems and no legal filings are possible” due to

Although somewhat obvious, the World Economic Forum, in partnership with Marsh McLennan, SK Group and Zurich Insurance Group, recently issued its 16th edition of the Global Risks Report (the Report), which analyzes “the risks from societal fractures—manifested through persistent and emerging risks to human health, rising unemployment, widening digital divides, youth disillusionment, and geopolitical

The Securities and Exchange Commission (SEC) has admitted that it was the victim of a cyberattack in 2016 that exposed information that may have been used for insider trading. The hack involved the SEC’s filing database, known as EDGAR. The admission was on the heels of a Government and Accountability Office report in July that

In the wake of huge data breaches in the last year, multiple pieces of legislation have been introduced in the past few months relating to cybersecurity and the sharing of information between public and private entities in order to combat increasingly sophisticated cyberattacks.

Yesterday, the U.S. House of Representatives passed bipartisan legislation (the Protecting Cyber

Lufthansa confirmed last week that an unknown number of their customers’ accounts were hacked and the hackers were able to use illegally obtained usernames and passwords in order to use frequent flyer miles to make purchases. Lufthansa has reimbursed its affected customers. Lufthansa reported that the hackers used botnets to infect computers to log on