A hacking group known as Scattered Spider, which previously caused significant disruption on the Las Vegas Strip, is suspected of being behind recent cyber intrusions targeting U.K. retailers, according to reporting by The Wall Street Journal (WSJ). Get the Full Story Complete the form to...
Connecticut-based healthcare provider Yale New Haven Health System reported a data breach that affected more than 5.5 million patients. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our...
Ransomware remains the top threat to American infrastructure, with complaints in 2024 rising 9% above 2023’s total, the FBI said Wednesday (April 23). Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no...
The image of a hacker furiously typing strings of code to brute-force their way into a corporate server is becoming outdated. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins...
Cybercrime syndicates based in Southeast Asia are expanding their operations on an industrial scale, according to the United Nations. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe...
The Office of the Comptroller of the Currency (OCC) said Tuesday (April 8) that it notified Congress of a “major security incident” in which there was unauthorized access to OCC emails and email attachments. Get the Full Story Complete the form to unlock this article...
Now more than ever, cybersecurity is defined by an ongoing arms race. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By...
The concept of the organizational perimeter is a constantly evolving one. Today’s enterprise security perimeter is, and must be, everywhere, as back offices are more and more moving to the forefront of an effective cybersecurity posture. Get the Full Story Complete the form to unlock this...
Enterprise cores and business-line technology stacks have increasingly moved to the cloud. But as enterprises expand their digital footprints, the data they generate, store and transfer becomes increasingly vulnerable to interception, manipulation or outright theft. Get the Full Story Complete the form to unlock this...