Syndicated Blog

The State of Security
The State of Security is an award-winning blog featuring the latest news, trends and insights on current information security issues, including risk, compliance, incident detection and vulnerability research. Apart from our own frequent contributors, we w

The Weather Channel Suffers Ransomware Attack

Local and national weather forecast provider The Weather Channel suffered a ransomware attack that temporarily prevented it from going live on the air. Regular viewers got a surprise when they tuned into ...

Man fried over 50 college computers with weaponized USB stick

Vishwanath Akuthota's USB stick contained an unusually destructive payload. The post Man fried over 50 college computers with weaponized USB stick appeared first on The State of Security ...
Ransomware Attack Targeted Data Intelligence Firm Verint

Ransomware Attack Targeted Data Intelligence Firm Verint

Bad actors used a ransomware attack to target the Israeli offices of the customer engagement and digital intelligence company Verint. On 17 April, ZDNet received a screenshot taken by an employee who ...

Establishing Information Security in Project Management

A person recently asked me if it was possible to implement ISO 27001 using a specific project management software product. They used the tool in the past to define project plans and ...
Navicent Health Discloses Data Breach as the Result of a Digital Attack

Navicent Health Discloses Data Breach as the Result of a Digital Attack

Navicent Health, a part of Central Georgia Health System, has disclosed that it suffered a data breach as the result of a digital attack. The second-largest hospital in Georgia and the only ...

Yahoo and Verizon Sweeten Their Settlement Offer by $30 Million + Staffing/Budget Commitments

In 2013, 2014 and 2016, Yahoo suffered a series of data breaches. Yahoo reports that the largest one, in August 2013, affected all three billion user accounts then in existence worldwide. The ...
Tripwire state of cyber hygiene report stats

Managed Vulnerability Management? Yes, You Read That Right

The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can ...
Spear Phishing Campaign Targeted Ukraine Government Entities

Spear Phishing Campaign Targeted Ukraine Government Entities

Researchers observed bad actors using a spear phishing campaign to target government entities in Ukraine including military departments. In the beginning of 2019, FireEye Threat Intelligence analyzed an email sent out as ...

Women and Nonbinary People in Information Security: Liz Bell

I’ve got great news for you! My interview series continues. Last week, I spoke with Nicola Whiting, cyber hygiene specialist and Titania Chief Strategy Officer. This time, I had the privilege of ...
RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day

RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day

The ransom demands imposed by the new “RobbinHood” ransomware family increase $10,000 each day beginning on the fourth day following encryption. The creators of RobbinHood appear to be aiming their attacks at ...
Loading...