Hacking

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

Delzad P Mirza is group CISO at Shapoorji Pallonji Group

The former Head of Information Security and Compliance at Tata Technologies will spearhead cybersecurity across the Shapoorji Pallonji Group.

Supreme Court website reportedly hacked, post Justice Loya verdict

Several screenshots doing the rounds on Twitter claim the SC website was hacked by a Brazilian team of hackers.

GrayKey: What you need to know about this iPhone hacker and how to protect yourself

Updated information about a turnkey, automated cracking system marketed to law enforcement makes it clear users should pick longer passcodes.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

Government websites down; suspects Chinese hackers, and finally denies any hack

About a dozen government websites including that of the defence ministry went down for more than eight hours last Friday, with rumors that they have been hacked by the Chinese. However, the government ruled-out any hacking.

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

In the face of rampant threats, learn, implement and adapt: S Srikanth, TVS Motor

People need to understand the business and reputational impact of a data breach, says S. Srikanth, head of information security at TVS Motor Company.