Tag: Colonial Pipeline
US Treasury urges crypto exchanges to register with FinCEN
The Treasury says all US crypto exchanges should register with FinCEN as the industry faces pressure to align with Russian sanctions.
The post US Treasury urges crypto exchanges to register with FinCEN appeared first on Protos.
New Specops Report Reveals Passwords Are Weakest Link For Networks
Organizations’ current password usage and policies leaving businesses and employees vulnerable to cyberattacks
(PRWeb March 08, 2022)
Read the full story at https://www.prweb.com/releases/new_specops_report_reveals_passwords_are_weakest_link_for_networks/prweb18540395.htm
Industrial Systems See More Vulnerabilities, Greater Threat
LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022
Anonymous set for cyberwar with Bitcoin-powered Russian hacker crew
Hacktivist collective Anonymous has joined the global majority in backing Ukraine. Russian ransomware hackers are ready to strike back.
The post Anonymous set for cyberwar with Bitcoin-powered Russian hacker crew appeared first on Protos.
Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques
Cyber Attack Risks Poised to Soar as Russia Attacks Ukraine
Russia's military assault against Ukraine is likely to be accompanied by a wave of cyberattacks that could wreak havoc on computer systems far beyond the countries' borders, security experts warn.
Colonial Pipeline Names Adam Tice as Chief Information Security Officer
Colonial Pipeline announced on Tuesday that Adam Tice has joined the company as Chief Information Security Officer (CISO).
Tice recently led security operations, detection and response, threat intelligence, and investigations at Silicon Valley Bank.
Ransomware Adds New Wrinkle in Russian Cybercrime Market
S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript]
Are You Prepared for 2022’s More Destructive Ransomware?
We’re barely into 2022, and already we’re seeing ransomware proliferate. What we saw last year is that while most attacks continue to exploit known vulnerabilities, cybercriminals have also redoubled efforts to target new ones – such as what we saw with Hafnium and new Microsoft Exchange vulnerabilities.