September 6, 2017
Via: Aberdeen EssentialsRansomware and large-scale DDoS attacks tend to steal the limelight when it comes to cybersecurity. The problem is that,while companies are focused on securing their networks against the latest threat, they tend to overlook a serious underlying flaw that has […]
September 6, 2017
Via: Krebs on SecurityIn early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in […]
September 6, 2017
Via: Security IntelligenceIt’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive […]
September 5, 2017
Via: Help Net SecurityLocky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam campaigns in H2 2017 – as many as 23 million sent messages […]
September 5, 2017
Via: Help Net SecurityHere’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails Ransomware campaigns are usually wide-flung affairs: the attackers send out as many malicious emails as possible […]
September 4, 2017
Via: The HillThe leaders of a key Senate committee are pressing federal department heads for reports on their international cybersecurity priorities mandated by an executive order signed by President Trump in May. Sens. Ron Johnson (R-Wis.) and Claire McCaskill (D-Mo.), chairman and […]
August 4, 2017
Via: Help Net SecurityAll organizations, regardless of how well they think their walls are fortified, will at some point fall victim to an attack. How they respond to the attack could mean the difference between recovering with minimal loss to shutting the organization […]
August 1, 2017
Via: CSO OnlineThe cybersecurity market has spawned a cottage industry of new industrial control systems (ICS) and industrial Internet of Things (IIoT) companies over the past few years. These pure-plays focus primarily or exclusively on cyber-defending power grids, nuclear power plants, Supervisory […]
July 24, 2017
Via: Dark ReadingOver the last few months, I’ve had the good fortune to chat with a number of small and medium-sized businesses about their unique security issues and challenges. What did I notice during many of my conversations? That most SMBs are […]
July 21, 2017
Via: The HillA breach of a Kansas Department of Commerce system exposed more than 5 million Social Security numbers to hackers, according to a reportfrom a local news outlet. The Kansas News Service obtained information through a public records request that revealed that roughly […]
July 14, 2017
Via: Dark ReadingImagine discovering that a local hospital’s IT system has been hacked and the hackers are threatening to publish patients’ names, addresses, and medical records on the Internet. In September 2016, this happened to 6,000 patients in Oklahoma. As security professionals know, this […]
July 10, 2017
Via: Security WeekMicro markets solutions provider Avanti Markets has informed customers that their personal, payment card and biometric data may have been stolen by cybercriminals who managed to infect some of its kiosks with malware. According to the company, which serves 1.6 […]
July 10, 2017
Via: Security WeekPresident Trump’s executive order (EO) on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” is a commendable first step in bolstering the nation’s federal defenses against large-scale cyber attacks and state-sponsored cyber adversaries. The need to combat these types of threats […]
June 26, 2017
Via: The HillThe British parliament was hit by a cyberattack Friday night that left members and staffers unable to access emails as hackers attempted to exploit weak passwords and gain access to accounts. Multiple news agencies reported Saturday that the U.K. parliament […]
June 26, 2017
Via: Security WeekQuantum Dawn is an example of how complex cyber war games can be. But not all cyber attack simulations need be so involved. Even a simple rehearsal can help organizations identify gaps in their incident response processes, key decision makers […]
June 26, 2017
Via: Panda SecurityThe threat of cybercrime has moved from attacks on individuals to full-scale war in the shadowy corners of the Internet. With every major incident comes a suspicion that teams of hackers are being financed by national governments to carry out […]
June 20, 2017
Via: Help Net SecurityFor at least two whole weeks, a database containing information on 198 million potential US voters – more than half of the American population – lay exposed on the internet, accessible to anyone who stumbled upon it while looking for […]
June 7, 2017
Via: CSO OnlineA new report out from Cybersecurity Ventures estimates there will be 3.5 million unfilled cybersecurity jobs by 2021, up from 1 million openings last year. Employment figures from the U.S. and India highlight the cybersecurity labor crisis. In 2017, the […]
May 25, 2017
Via: Security AffairsTarget, the US retail giant, has entered a settlement with the US Attorneys General and it has agreed to pay $18.5 million over the 2013 data breach. Target, the US retail giant, has entered a settlement with the Attorneys General […]
May 5, 2017
Via: CSO OnlineTracking It is easy to overlook identity access management as static infrastructure in the background, and that’s the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between businesses’ multiplying employees, contractors, apps, business partners and […]