Avast released a free decryption tool to assist victims of the Mallox ransomware attacks. Mallox, also known as Fargo, TargetCompany, and Tohnichi, operates under a ransomware-as-a-service business model and targets Microsoft SQL servers.
The EIB‘s main site is currently down, and the bank has just released a Tweet acknowledging the issue as a ‘cyber attack.’ The EIB interconnection infrastructure has been allegedly disrupted.
It’s rare you see a case in which one party alleges the other stole nearly all of the organization’s data – a veritable library – but that seems to be the case in a complaint filed last week between two warring consulting firms.
Last month, the state of Utah appeared to be on fast track to enacting the country's fourth comprehensive state data privacy law. Now it looks like the legislation is on the cusp of being passed.
The warning, issued by the FBI and the SEC’s Office of Investor Education and Advocacy (OIEA) last week comes on the heels of a similar warning via FINRA about the rise in imposter websites.
The recommended changes build off of updates proposed back in October regarding consumer opt-out requests. Those interested in submitting a comment for the proposed regulations have until December 28.
A new U.S. Department of Defense rule goes into effect later this month that will require defense contractors and subcontractors to complete a cybersecurity self-assessment.
?Ava, a unified security company, announced the completion of the merger between Jazz Networks, an insider threat detection and response company, and Vaion, an end-to-end video security provider.
The statistics from the U.S. Department of Health and Human Services show there have been 127 breaches of U.S. hospitals and health care systems from February 1 through May 18 in 2020.
An online dashboard created by Johns Hopkins University’s Center for Systems Science and Engineering brings together data from several official bodies, including the WHO and the CDC.
Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.