Top

Network security, Security

Firms Improve Threat Detection but Face Increasingly Disruptive Attacks

February 20, 2020

Via: Dark Reading

Organizations are more quickly detecting attackers in their networks and systems, but the majority of attacks are still being found by third parties and not by internal security groups. In 2019, companies needed 56 days, on average, to detect an […]


Hacker, Threats & Malware

Personal data of millions exposed in MGM hack

February 20, 2020

Via: The Hill

Personal information from over 10 million people who stayed at MGM Resorts was posted to a hacking forum earlier this week, NBC News reported. According to the network, no financial data was posted, but full names, birthdates, addresses, email addresses […]


Cyber-crime, Malware

Recent ransomware attacks define the malware’s new age

February 20, 2020

Via: CSO Online

History of ransomware Ransomware, a type of malware that holds data for ransom, has been around for years. In 1991, a biologist spread PC Cyborg, the first ransomware, by sending floppy disks via surface mail to other AIDS researchers, for […]


Threats & Malware, Virus & Malware

Operations at U.S. Natural Gas Facilities Disrupted by Ransomware Attack

February 19, 2020

Via: Security Week

The targeted organization has not been named and it’s unclear exactly when the incident occured. According to CISA, the cyberattack affected control and communication assets on the victim’s operational technology (OT) network. A compression facility helps transport natural gas from […]


Data loss, Threats & Malware

How to set up your network to prevent data loss

February 19, 2020

Via: CSO Online

Data. Your business and computers are full of it. While much of that data is useless to anyone else, every firm has key assets that any attacker or other competitor would love to access. Data can leave your organization in […]


Application security, Security, Threats & Malware, Vulnerabilities

APIs are becoming a major target for credential stuffing attacks

February 19, 2020

Via: CSO Online

New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even […]


Network security, Security

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

February 19, 2020

Via: Security Affairs

Artificial intelligence (AI) is an immensely helpful tool for businesses and consumers alike. By processing data quickly and predicting analytics, AI can do everything from automating systems to protecting information. In fact, keeping data secure is a significant part of […]


Cyber-crime, Malware

Council returns to using pen and paper after cyberattack

February 18, 2020

Via: Naked Security

Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Council’s IT systems will return. The first public sign of trouble appeared on the morning of Saturday, […]


Application security, Security

Microsoft Trials Election Security Solution in Wisconsin

February 18, 2020

Via: Security Week

Introduced in May 2019, the free software development kit (SDK) was created in collaboration with Galois, aiming to provide end-to-end verification of elections. Moreover, the tool opens election results to third-party organizations for secure validation. Made available last year to […]


Cyber-crime, Malware

Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

February 18, 2020

Via: Security Intelligence

The financial malware arena became a mainstream issue a little over a decade ago with the rise of malware like the Zeus Trojan, which at the time was the first commercial banking Trojan available to the cybercrime world. We have […]