Barrage of Mobile Fraud Attacks Will Increase

Mobile, as a financial fraud threat vector, is growing dramatically. Fifty-eight percent of digital transactions now originate from mobile devices, and one-third of attacks are via mobile. It is worse...
Continue reading
0 Comments

One Year Later, Over 2 Billion Devices Still Exposed to BlueBorne Attacks

Billions of devices still vulnerable to BlueBorne attacks
One year after researchers disclosed the Bluetooth vulnerabilities dubbed BlueBorne, more than 2 billion devices are believed to still be vulnerable to attacks, either because their owners have failed to...
Continue reading
0 Comments

Leveraging Segmentation to Secure IoT

The rapid deployment of IoT devices has had a significant and lasting impact on the security of today's evolving network. BYOD, the first significant infusion of IoT devices begun over...
Continue reading
0 Comments

Talking UK Cyberwar With Sir David Omand

Talking UK Cyberwar with Professor Sir David Omand
Over the last few days, UK national press has run headlines such as "IT'S CYBER WAR! Prime Minister May vows to take on President Putinís novichok spy network" (Daily Mail);...
Continue reading
0 Comments

There's More to SOAR

Orchestrating and Automating Interactions of Security Analysts Across Disparate Security Products Can Deliver a Significant Return on Investment Ever since the industrial revolution, which began more than 200 years ago,...
Continue reading
0 Comments

New Firmware Flaws Resurrect Cold Boot Attacks

Cold boot attack
Researchers discovered that the firmware running on nearly all modern computers is vulnerable to cold boot attacks that can allow hackers to recover highly sensitive data from the device’s memory....
Continue reading
0 Comments

Kelihos Botnet Author Pleads Guilty in U.S. Court

Peter Yuryevich Levashov, a 38-year-old Russian national accused of operating the notorious Kelihos botnet, pleaded guilty on Wednesday to computer crime, fraud, conspiracy and identity theft charges. Levashov, aka “Petr...
Continue reading
0 Comments

Multi-Stage Malware Heavily Used in Recent Cobalt Attacks

The Russia-based Cobalt hacking group has made heavy use of the CobInt malware in recently observed campaigns, Proofpoint’s security researchers warn.  The Cobalt Gang appeared to have stopped using the...
Continue reading
0 Comments

New Python-based Ransomware Poses as Locky

A ransomware family used in attacks in July and August was posing as the infamous Locky ransomware that was highly active in 2016, Trend Micro researchers have discovered.  Written in...
Continue reading
0 Comments

Trend Micro, HITRUST Launch New Cyber Risk Management Firm Cysiv

Trend Micro and HITRUST launch Cysiv
Cybersecurity solutions provider Trend Micro and HITRUST, a non-profit organization that promotes the protection of sensitive data, have joined forces to launch a new company that offers cyber risk management...
Continue reading
0 Comments

Flaws Found in Fuji Electric Tool That Links Corporate PCs to ICS

Serious vulnerabilities found in Fuji Electric V-Server
Several vulnerabilities rated “high severity” have been discovered by researchers in Fuji Electric V-Server. The vendor has released updates that should address the flaws. The existence of the security holes,...
Continue reading
0 Comments

Feeling the Pulse of Cyber Security in Healthcare

Healthcare Information Security
The most recent headlines about data breaches at a broad range of healthcare providers and their third-party vendors (e.g., Legacy Health , LabCorp Diagnostics , Med Associates , LifeBridge Health...
Continue reading
0 Comments

Container Security Firm Sysdig Raises $68.5 Million

Sysdig, a company whose products help enterprises secure and monitor containers and cloud-native applications, announced on Wednesday that it raised $68.5 million in a series D funding round. The latest...
Continue reading
0 Comments

Going Beyond a 'Walled-Garden' Approach

Forcepoint CEO Matthew Moynahan on Why Old Mindsets, New Technologies Are Incompatible) • September 10, 2018     10 Minutes    Security technology innovations entering the market are getting attached to...
Continue reading
0 Comments

Threat Hunting: How to Evolve Your Incident Response

Tom Field and Ben Smith of RSA Security reflect on their recent Executive Roundtable In the wake of advanced, invasive threats that can wreak havoc before detection, security leaders are rebooting...
Continue reading
0 Comments

The Road to Business-Driven Security

Tom Field and Ben Smith of RSA Security reflect on their recent Executive Roundtable In 2017 alone, organizations worldwide spent in excess of $75 billion on cybersecurity. And yet still, senior...
Continue reading
0 Comments

Postmortem: Multiple Failures Behind the Equifax Breach

Postmortem: Multiple Failures Behind the Equifax Breach
image
image
image
Breach Preparedness , Breach Response , Data Breach 76-Day Breach Slowly Exfiltrated Data From 51 Databases, GAO Report Reveals( euroinfosec ) • September 11, 2018     Patch or perish....
Continue reading
0 Comments

RiskIQ: British Airways Breach Ties to Cybercrime Group

RiskIQ: British Airways Breach Ties to Cybercrime Group
image
image
image
image
Cybercrime , Data Breach , Fraud Magecart Gang Tweaked Script on BA's Server to Scrape Card Data, Researchers Say( euroinfosec ) • September 11, 2018    Security firm RiskIQ says...
Continue reading
0 Comments

The Role of Password Management

Authentication , Technology Gerald Beuchelt of LogMeIn on Overcoming Implementation Challenges( SecurityEditor ) • September 11, 2018     Gerald Beuchelt, CISO, LogMeIn Inc. Password management is a critical component of...
Continue reading
0 Comments

Disaster Recovery: Real-World Lessons Learned

Business Continuity Management / Disaster Recovery , Governance Tonguc Yaman on the Need for Conducting Frequent 'Dry Runs'( @nickster2407 ) • September 11, 2018     Tonguc Yaman, CIO, SOMOS CISOs...
Continue reading
0 Comments