Top

Phishing

How to Recognize a Business Email Compromise Attack

June 20, 2018

Via: Security Intelligence

Business email compromise (BEC) is a type of phishing scheme in which an attacker impersonates a high-level executive and attempts to trick an employee or customer into transferring money or sensitive data. This crime is particularly stealthy because it employs […]


Cloud security

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

June 19, 2018

Via: Dark Reading

Do ‘cloud-first’ strategies create a security-second mindset? Too often, I hear system administrators tell me that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems […]


Network security, Threats & Malware, Vulnerabilities

How to Overcome Cognitive Biases That Threaten Data Security

June 19, 2018

Via: Security Intelligence

Did you know the software that powers our brains contains security flaws that need to be patched? I’m talking about cognitive biases, which are the wetware vulnerabilities that collectively constitute the single greatest threat to enterprise data security. The Interaction […]


Hacker

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

June 19, 2018

Via: Security Intelligence

Humans versus machines: Who’s the better hacker? The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI, and this influx suggests the answer is likely machine. With each innovation in technology comes the […]


Network security

3 Tips for Driving User Buy-in to Security Policies

June 18, 2018

Via: Dark Reading

Teaching users why it’s important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here’s how. IT usage and security policies can be an annoyance for employees who simply see them […]


Vulnerabilities

Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control

June 18, 2018

Via: CSO Online

If you use Axis security cameras, then you really need to update the firmware as seven vulnerabilities across 390 camera models could allow an attacker to remotely take over the camera. VDOO security researchers have been looking into the security […]


Network security

Is Corporate VPN Security Dead?

June 18, 2018

Via: Security Intelligence

The use of virtual private networks (VPNs) in the enterprise has come a long way. What was once a simple way to ensure a secure connection between an external network and a company’s internal network has become increasingly difficult to […]


Vulnerabilities

A new Meltdown-like flaw tracked as LazyFP affects Intel CPUs

June 15, 2018

Via: Security Affairs

A new vulnerability involving side channel speculative execution on Intel chips, known as LazyFP, has been announced and assigned CVE-2018-3665. A new vulnerability tracked as LazyFP (CVE-2018-3665) involving side channel speculative execution affects Intel CPUs, like previous ones it could […]


Vulnerabilities

SigSpoof GnuPG flaw could be exploited to spoof message signatures

June 15, 2018

Via: Security Affairs

GnuPG, also known as GPG, is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows users to encrypt and sign data and communications. GnuPG version 2.2.8 released earlier this month […]


Cyber-crime, Malware

Experts released a free decryptor for Everbe Ransomware

June 15, 2018

Via: Security Affairs

Good news for the victims of the Everbe Ransomware, the popular malware researchers Michael Gillespie and Maxime Meignan have released a decryptor that could be used by victims to decrypt their files for free. The Everbe Ransomware encrypts files and […]