Fake News, Real Cybersecurity Risks

From fake outlandish crime stories to the reporting of fake stories tied to real events and suspected government manipulation, there was so much fake news in 2017 that the Collins...
Continue reading
0 Comments

Demystifying the Dark Web and Mitigating Risks

Monitoring a Variety of Data Dources is Important to Understand Threats, Vulnerabilities and How to Manage Risk The dark web is a hot topic right now, particularly given the speculation...
Continue reading
0 Comments

Threat Detection Firm Cynet Raises $13 Million

Cynet secures $13 million investment
Threat detection and response company Cynet on Wednesday announced that it raised $13 million in a Series B funding round, which brings the total raised to date to $20 million....
Continue reading
0 Comments

BitSight Raises $60 Million in Series D Funding Round

BitSight Logo
Security ratings firm BitSight today announced that it has closed a $60 million Series D funding round that brings the company’s total funding to $155 million. Founded in 2011, BitSight's...
Continue reading
0 Comments

SSDP Diffraction Abused for DDoS Amplification

The Simple Service Discovery Protocol (SSDP) can be abused to launch a new type of distributed denial of service (DDoS) attacks where devices respond with a non-standard port, NETSCOUT Arbor...
Continue reading
0 Comments

Identity-based Threat Detection Preempt Raises $17.5 Million

San Francisco, Calif (HQ) and Ramat Gan, Israel (R&D) threat prevention firm Preempt has raised $17.5 million in a Series B funding round supported by ClearSky, Blackstone, Intel Capital and...
Continue reading
0 Comments

Behavioral Analytics and the Insider Threat

Behavioral Analytics and the Insider Threat CA's Mark McGovern on How Organizations Are Using Mature Solutions to Nab Rogue Insiders Behavioral analytics have taken the fast lane from emerging tech to...
Continue reading
0 Comments

Identity Protection: Overcoming Hurdles

Identity Protection: Overcoming Hurdles John Dancu of IDology Analyzes Implications of Consumer Survey Results) • June 26, 2018     10 Minutes    Consumers are more concerned than ever about their...
Continue reading
0 Comments

Mozilla and 1Password Integrate 'Have I Been Pwned' Feature

Mozilla and 1Password Integrate 'Have I Been Pwned' Feature
image
image
image
image
Breach Response , Data Breach , Data Loss Expanded Audience For Breach Notification Tool Should Improve Web Security( jeremy_kirk ) • June 26, 2018    By tying into Have I...
Continue reading
0 Comments

EU Mass Surveillance Alive and Well, Privacy Groups Warn

EU Mass Surveillance Alive and Well, Privacy Groups Warn
Legislation , Privacy Campaigners Seek Court Sanctions to End Blanket Communications Data Retention( euroinfosec ) • June 26, 2018    Some of the signatories to an open letter calling on...
Continue reading
0 Comments

Former NSA Contractor Pleads Guilty to 'Top Secret' Leak

Former NSA Contractor Pleads Guilty to 'Top Secret' Leak
image
image
image
image
Cyberwarfare / Nation-state attacks , Data Loss , Fraud Management & Cybercrime Plea Deal Calls For Reality Winner to Serve 63-Month Sentence( jeremy_kirk ) • June 27, 2018    Reality...
Continue reading
0 Comments

Cybercrime Groups and Nation-State Attackers Blur Together

Cybercrime Groups and Nation-State Attackers Blur Together
image
image
Cybercrime , Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime North Korean Hackers are 'Rational Actors,' Ex-Intelligence Chief Warns( euroinfosec ) • June 28, 2018    Robert Hannigan discusses...
Continue reading
0 Comments

France Also Interested in Greece's Russian Bitcoin Suspect

France has joined the US and Russia in seeking the extradition of a Russian held in Greece for allegedly laundering $4 billion using the bitcoin digital currency, a court source...
Continue reading
0 Comments

NSA-Linked Implant Patched to Work on Windows Embedded

DoublePulsar , one of the hacking tools the Shadow Brokers supposedly stole from the National Security Agency (NSA)-linked Equation Group, can now run on Windows Embedded devices. The backdoor was...
Continue reading
0 Comments

Cyber-Espionage Campaigns Target Tibetan Community in India

Two cyberespionage campaigns targeting the Tibetan community based in India appear to be the work of Chinese threat actors, a new Recorded Future report reveals. Referred to as RedAlpha, the...
Continue reading
0 Comments

Free Thanatos Ransomware Decryptor Released

Cisco’s Talos team this week announced the availability of a free decryption tool to help victims of the Thanatos ransomware recover their files without paying the ransom. Analysis of the...
Continue reading
0 Comments

CHEW on This: How Our Digital Lives Create Real World Risks

Adults today have witnessed video stores becoming streaming services, book stores vanishing into cyberspace. Traditional, even beloved, consumer brands are being supplanted by digital replacements. Even interpersonal relationships now occur...
Continue reading
0 Comments

UK Publishes Minimum Cyber Security Standard for Government Departments

The UK government's Cabinet Office has published the first iteration of its Minimum Cyber Security Standard, which will be incorporated into the Government Functional Standard for Security. The standard is...
Continue reading
0 Comments

Fastbooking Hack Leaves Japan Hotel Red-Faced

A Japanese hotel chain has apologised after more than 120,000 items of customer information were stolen in hacks of its reservations handled by French company Fastbooking. Prince Hotel, a major...
Continue reading
0 Comments

Ping Identity Acquires API Security Firm Elastic Beam

Identity management solutions provider Ping Identity on Tuesday announced the acquisition of Elastic Beam, a company that specializes in detecting and blocking attacks aimed at application programming interfaces (APIs). Ping...
Continue reading
0 Comments