More frequent attacks call into question the privacy of thousands of doctors and millions of patients.
Ascension, one of the largest private healthcare systems in the United States, has been forced to shut down some of its systems to investigate what the organization describes as a...
Hundreds of thousands of people lost money by trusting the wrong online stores.
An international investigation conducted by The Guardian, Die Zeit and Le Monde has uncovered one of the largest Internet fraud schemes in history. Hundreds of thousands of people in Europe and the United States...
The high-profile hack of MOVEit Transfer still reminds us of itself with sudden information security discoveries.
A year after a high-profile cyber attack by the Clop group, during which hundreds of companies were compromised with confidential data, the University system of Georgia (USG), which...
Wichita demonstrates the dangers of cybercrime in the digital age.
In Wichita, the largest city in the state of Kansas with a population of 400,000 people, a cyberattack occurred on May 5, as a result of which the information systems of the authorities were encrypted using a ransomware program...
Hackers, as well as the malware they create and use, have shown rapid growth over the past couple of decades. When computers were big, colorful boxes, modern hackers were just learning how to walk, and their pranks were not serious - perhaps they would have created a bit of stupid malware that...
What if you could spend your time trying to access other people's networks and computer systems without getting into trouble? Of course, this is the dream of any spy and cybercriminal, but only ethical hackers, also known as" white hat hackers " or penetration testers (pentesters), can be sure...
Every day, most of us leave behind traces on the Internet, including disparate pieces of data that can later be used to learn about a person's activities and break through the veil of anonymity, writes CSO. The fight to prevent attackers from putting these pieces of the puzzle together is known...
Table of contents
How to become an Ethical Hacker
How is hacker ethics measured?
Current situation with Bug Bounty in Russia
Conclusion
Hacking is a kind of flagship of media information security. Cult films are made about hackers. Many teenagers and aspiring IT professionals are eager to...
Now it's hard to find a company that doesn't have its own website. Some people use this resource as an element of self – presentation, while others use it as the main channel for selling their products or services.
Along with the growing involvement of businesses in the Internet space, the...
This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
The path of an information security incident to widespread fame is thorny. While the world is discussing data leaks from the next major companies and government agencies in different countries, we suggest that we talk about much more modest hacks.
In this article, we will continue to deal with...
Telegram has been a leader among messengers all over the world for several years. In Russia, it has become not only a means of communication, but also a full-fledged platform through which products, services, ideas and views are promoted.
Hackers also paid attention to this messenger. Many...
On the one hand, video surveillance cameras are designed to increase the level of security and control, but on the other hand, they are vulnerable to intruders and can pose a threat to their owners. Cybersecurity experts told Cyber Media how cybercriminals gain access to cameras, what it...
What was more important – the dignity or confidentiality of customers?
In France, the Simone Weil Hospital (CHC-SV) experienced a cyberattack in April that disrupted the facility and forced staff to switch to using paper for record keeping.
Now the hospital reports that the LockBit group...
The agency is calling on federal agencies to fix the problem in their systems before it's too late.
A critical flaw in the GitLab system that allows account management to be intercepted was recently added to the catalog of known exploited CISA vulnerabilities. The issue identified as...
The media image of" evil Russians "in the West was formed in the 20th century, during the Cold War, and was often used not only in movies (the same "cranberry"), but also in public policy. The image itself has been transformed more than once, preserving its semantic core. If before the collapse...
This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
The malicious downloader has received a new method of distribution and stealth.
Attackers have started using a new tactic to spread Latrodectus malware through phishing campaigns, disguising it as notifications from Microsoft Azure and Cloudflare. This mechanism makes it more difficult for mail...
The Security Service eliminated bot farms in Kiev that carried out information sabotage in favor of Russian intelligence. During the complex events, two organizers were detained who massively spread disinformation about the war in Ukraine and tried to artificially discredit the Defense Forces...
The vulnerability affects thousands of organizations that use this language in their software.
A critical vulnerability has been discovered in the R programming language that could expose organizations using this popular open language to attacks across the software supply chain.
The...