Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Major Casinos Hacked Using Social Engineering Attacks

Two giants in the gaming and hospitality industry, Caesars Entertainment and MGM Resorts, recently announced that they were targeted by cybercriminals. But here’s the catch, both ransomware attacks appear to have started with the use of social engineering tactics against IT helpdesk personnel to gain access to systems.

Non-Profit Save the Children Gets Hit By Ransomware Data Attack

Save The Children is an organization that specializes in helping children live healthy lives. The non-profit works in multiple countries, helping to provide for children's needs, especially in areas affected by war or tragedy. This organization was recently the target of a ransomware hacker group and suffered huge data losses as a result of that targeting.

Breach and Attack Simulation Helps Pipeline Operators Comply with New TSA Requirements

In July of this year, the Transportation Safety Administration (TSA) released Security Directive Pipeline-2021-02D (SD-02D) Pipeline Cybersecurity Mitigation Actions, Contingency Planning, and Testing. The directive—aimed at owners and operators of liquid and natural gas pipelines or facilities designated as critical infrastructure—outlines requirements for enhancing cyber resilience through the implementation of a TSA-approved cybersecurity implementation plan (CIP).

Caesars Entertainment Gets Hacked, Exposing Countless Gamblers

Caesars Entertainment is one of the largest casino companies in the United States and is well-known for its loyalty program. The company serves countless customers in Las Vegas and elsewhere throughout the world. The massive loyalty program takes in data from all of Caesars customers, and that program may have just backfired on the company, potentially hurting many of its customers in the process.

Cyber attackers hit the jackpot: learn why casinos aren't the only ones vulnerable

For many years, hackers and cybercriminals have used social engineering techniques to gain unauthorized access to confidential information. It is easy to predict that these attacks will continue to advance in sophistication and frequency. Whether they are using AI to create better lures or cyber criminals are just getting more adept at exploiting human nature, the success of these attacks proves the tactics are winning.

Gambling away your data: What we know about the Las Vegas cyberattacks

MGM Resorts has announced that it will be shutting down 12 of its hotels and casinos in and around Las Vegas. The reason—a ransomware attack of unknown magnitude on servers containing a goldmine of customer data. MGM reports that it managed to detect the breach at a fairly early stage and notify the authorities and law enforcement, but the damage incurred is yet to be evaluated.

As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound

Picture this: Your IT infrastructure is breached by a nefarious actor, who then encrypts critical data and holds your organization hostage until a ransom is paid. Far from hypothetical, this is exactly what happened to multi-billion-dollar casino operator MGM Resorts International last week when hit with a ransomware attack – the latest in a string of large-scale, high-profile cyber security incidents.

The Top 7 Cyberattacks on U.S. Government

In a world where ones and zeros are the new battleground, these threats, cyberattacks have become a significant threat to governments worldwide. The United States, with its vast array of government agencies and critical infrastructure, is no exception. Cybersecurity threats that impact the public sector range from state-sponsored attacks to financially motivated hacking groups. In this blog post, we’ll delve into the top 7 cyberattacks on the U.S.

5 Types of Software Supply Chain Attacks Developers Should Know

What do ambulances in the UK, the Norwegian government, and a major Russian bank have in common? They were all victims of successful supply chain attacks in July 2023. Could you be next? It’s more likely than you think. Organizations entrust more sensitive data to vendors and third parties (like government agencies and critical infrastructure operators) than ever as part of their software development and operations.