Leak of 3,500 Chimera Crypto Keys Claimed by Petya Ransomware DevelopersThe Petya ransomware gang says it released 3,500 crypto keys that it stole - along with source code - from rival Chimera... Read more »
Why Employees Are the Best Lines of DefenseCEO fraud campaigns are becoming far more common. A recent attack against our company was deflected because of the alertness of a staff member who... Read more »
Protection: Up to $1,000 Per Endpoint - Subject to Terms and ConditionsSentinelOne is taking a marketing gamble by offering to reimburse customers who suffer a ransomware infection if the security firm can't... Read more »
Leading the latest ISMG Security Report, some security experts expect the United States government to retaliate against Moscow for interfering in the American presidential election if the Obama administration determines the Russian... Read more »
CISOs face the continuing challenge of how to clearly communicate information security risk to the board and senior management. But now they can take advantage of a free metrics framework designed to... Read more »
The new "No More Ransom" portal is designed to emphasize that police and security firms are doing whatever they can to disrupt ransomware gangs, as well as to help more victims get... Read more »
The Global Cyber Alliance is taking on small projects to come up with solutions to big cyber risk problems. "It's essentially using a startup approach to a much bigger problem," CEO Phil... Read more »
Police, Security Firms Debut Decryptor for Shade Ransomware, Promise MoreA new portal - NoMoreRansom.org - aims to help ransomware victims avoid having to pay ransoms to get their data back. Backed by... Read more »
The Big Question: Will the US Respond?Fallout from the leaked Democratic National Committee emails continues, with a new finding that suggests cyberattackers compromised a staffer's personal email account. The FBI also has... Read more »
Experts Debate Whether the New Policy Is Too ComplicatedCybersecurity and government policy experts disagree about whether a new presidential policy directive on how to coordinate response to a large-scale cyber incident is... Read more »