New UN cyber crime convention has a long way to go in a tight timeframe
Nations around the world are hammering out a new cyber crime convention, but some UN members seek to criminalise activities that are not bona fide crimes.
Nations around the world are hammering out a new cyber crime convention, but some UN members seek to criminalise activities that are not bona fide crimes.
An apparent data breach potentially impacting hundreds of millions of users could damage Twitter's finances and operations. EU regulators pose the biggest threat to the Elon Musk-owned company.
Meta researchers say their Online Operations Kill Chain framework offers a common taxonomy to understand the threat landscape and spot vulnerabilities.
Representatives from 36 countries and the EU agree that combatting ransomware requires international collaboration but legal systems need to catch up.
The cost is too high and the risk too low to offer CISOs directors-and-officers insurance at many companies. Protective governance policies might make more sense.
The CSRB report predicts the Log4J risk will continue for years and offers best practices for mitigating the threat.
Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."
The re-emergence of REvil and anticipated convergence with business email compromise actors are among reasons why ransomware gangs are still dangerous.
Attendees urged to improve asset management, use SBOMs, and collaborate with government cyber security agencies to better ensure software integrity.
Modern agriculture depends on internet-connected machinery that is centrally controlled and collects and analyzes massive amounts of data, making it an inviting target for threat actors.
Bounties as high as $10 million dollars make hunting cryptocurrency vulnerabilities lucrative for those with the proper skillsets.
Research reveals that countries such as Belarus, India, and Columbia are responsible for significant cyber attacks.
Researchers explain how they identified -- or failed to identify -- the threat actors behind three high-profile incidents and why attribution is so difficult.
The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.
Experts argue that Apple is clearing a path for governments to gain access to their citizens' data--essentially an encryption backdoor.