In November 2022, the Criminal Justice Information Services (CJIS) division of the FBI updated its cybersecurity policy, impacting state agencies, police departments, and other organizations that handle Criminal Justice Information (CJI). The updated policy poses challenges for organizations, especially smaller ones, to maintain compliance due to limited resources, lack of expertise and the policy’s complexity.
Researchers at Securonix are tracking an ongoing phishing campaign dubbed “TACTICAL#OCTOPUS” that’s been targeting users in the US with tax-related phishing emails.
Financial institutions (FIs) or Fintechs have historically been hotspots for fraudulent activity. The sector is a popular target for identity theft and online banking fraud, as well as financial crimes such as money laundering and terrorism funding. But, in the previous decade, its security has grown dramatically. It is now progressing to the next level of sophisticated security, Biometric Verification.
Digital transformation initiatives have pushed software development to the next level. Today's consumers demand an optimum customer experience and expect modern apps to live up to high expectations. So, the average developer in 2023 must keep up with faster delivery, more eye-catching features, and better functionality. This unprecedented growth in the software development industry has led to a massive disparity between development and security teams.
Recently, classified military documents have been showing up on social media sites around the internet. These documents are primarily about the war in Ukraine, and some released were Top Secret documents. Both the Pentagon and the Justice Department are concerned about this latest leak, and the classified documents could do real harm to the military's efforts if they keep being posted online.
Windstream Enterprise recently announced the arrival of North America’s first and only comprehensive managed Security Service Edge (SSE) solution, powered by Cato Networks—offering sophisticated and cloud-native security capabilities that can be rapidly implemented on almost any network for near-immediate ironclad protection.
Here’s a detailed list of data breaches around the world you need to know about, compiled to present as far as 2012.