When it comes to the data we provide companies, we often believe “they” are going to safeguard our information the same way we would—but this could not be further from the truth. With that said, these organizations have continued to suffer data breaches and other cybersecurity failings. So why do…
A new type of phishing scheme has gained popularity among black hat actors for its high success rate: precision-validating phishing. Instead of sending out phishing emails in bulk, this new tactic solely engages with email addresses actors have been able to verify as legitimate and high-value targets. Often, this means…
As we have discussed in a previous issue, the Cybersecurity Information Sharing Act of 2015 is set to expire at the end of September—and there is potential cybersecurity fallout with K-12 schools. Averaging five cybersecurity incidents per week, school districts across the nation have become a prime target for cybersecurity…
In what can be expected to serve as a landmark collaboration, nine leading cybersecurity and infrastructure agencies (across five countries) have contributed to a comprehensive guide to assist operational technology owners and operators in critical infrastructure sectors. This guidance helps operators to manage any device that is connected to their…
With the proliferation of artificial intelligence tools and chatbots, a prevalent question has emerged in terms of how to protect against the cybersecurity vulnerabilities to users are exposed. One example arises when users share sensitive information with models because these tools are not properly protected against attacks—accordingly, the information that…
In recent years, states and local communities have experienced a rise in cybersecurity threats aimed at critical infrastructure and other key targets. But this rise in attacks has not led to an increased ability for states to handle cybersecurity protections on their own. In fact, last year’s Nationwide Cybersecurity Review…
Here is a remarkable statistic: last year, more than 5.5 billion users had one of their personal accounts compromised as the result of a data breach. We tend to think of data breaches as the result of organizational negligence, but outside forces have a larger impact than one might think.…
As AI continues to dominate the broader internet landscape, users have begun asking questions about the legitimacy of their interactions online. In this episode, our expert talks to us about what it was like to build social media bots that, on the one hand, helped his clients gain millions of…
More than any other industry, manufacturing takes the brunt of ransomware attacks—and these hacks do not appear to be slowing down. In combination with the other most-hit industries (e.g., professional, scientific and technical services), ransomware attacks against these sectors accounted for more than 40% of all 2024 incidents. For those…
In previous issues of MyIDMatters, we have discussed the vast differences between the data protection policies of each of the 50 states (assuming such policies even exist!). We have noted that, despite the success of larger frameworks like the European Union’s cyber policy, there are no comprehensive federal laws in…
Those of us who have seen the Godfather are familiar with the concept of the “Five Families of Crime.” However, very few of us know that there is a “Five Families of Crimeware.” One of these organizations has been linked to a string of recent cybersecurity attacks leading to millions…
How well-positioned are corporations to protect consumer data? This question is on the minds of many analysts as cyberattacks become increasingly prevalent with the aid of artificial intelligence. These attempted breaches are stress-testing organizations who are tasked with safeguarding personal data, and they are also putting CISOs in uncomfortable positions.…
With the expiration of the Cybersecurity Information Sharing Act (CISA) of 2015 on the horizon, House intelligence committees have recently received briefings on the efficacy of the law, detailing to what extent private businesses have been willing to share cyber threat data with the government. However, new developments have placed…
These days, innocuous bits of personal information can be used to protect—or compromise—your cybersecurity. What may astonish readers to learn is that your postal code information is currently being used to strengthen fraud protection against cyberattacks. Having been embedded in e-commerce systems, identity verification checks and logistics operations, postal codes…