KFC, Pizza Hut, and Taco Bell parent company Yum Brands has confirmed that personally identifiable information (PII) was compromised in a January 2023 ransomware attack. Initially disclosed on January 18, the cyberattack resulted in Yum taking systems offline to contain the incident and closing roughly 300 restaurants in the UK for one day. At the time, the company said that only corporate data was stolen during the attack, but a filing with the Maine Attorney General's Office reveals that PII was compromised as well. READ MORE...
The intelligence files related to the Ukraine war that appeared online aren't the first sensitive military documents shared on video game forums. Over the past few days, U.S. investigators and digital security researchers alike have probed what would seem to be the most unlikely of places to determine the origin of a major leak of classified intelligence documents: video game-focused chat servers. READ MORE...
Cybercriminals are finding ways around the official Google Play app store's security, developing tools for trojanizing existing Android applications and selling their malicious wares for up to $20,000 a piece on cybercrime markets. In an April 10 blog post, researchers from Kaspersky published the results of a broad study of nine of the most popular Dark Web forums READ MORE...
Adversaries don't need to use sophisticated methods to gain access to enterprise systems or to deploy ransomware - they can just buy or steal credentials and log in. By burdening users with the near-impossible task of maintaining "secure passwords," businesses ultimately give people a huge and unfair level of responsibility for security. As a result, many organizations are relying on what amounts to a roll of the dice to protect themselves and their customers from attackers. READ MORE...
When ransomware strikes, how much should you gamble on your resources and opponents' intentions? Here's how to deal yourself a rational, informed way to weigh your options after an attack. When it comes to the ransomware game, it's worth comparing it to another high-stakes activity, poker. It's important for organizations to understand what they're gambling with when they decide whether or not to "negotiate with terrorists." READ MORE...
A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity. Effective cybersecurity operations are as unique as the business models and technology choices of the companies they protect. Their creation and management are constantly complicated by a lack of common terminology and set of expectations, due mainly to the chaotic path our industry has taken since its relatively recent birth. READ MORE...