Friday, 30 October 2020

Halloween hackers: The scariest cybersecurity stories of 2020

It’s the season of ghouls, ghosts and outrageous costumes. But for CISOs and cybersecurity professionals, a bump in the night on Halloween is more likely to be a notification warning them of data breach than a spooky ghostly visitation. In the COVID-19 era, spookiness-as-a-service providers who rent out costumes or sell party products are likely to have a difficult time as lockdowns and home-working play havoc with businesses focused on in-person interaction. Yet for hackers, the dawn of a socially-distanced new normal has opened up vast numbers of attack vectors and given them new opportunities to target businesses or individuals. So what should you be worried about this Halloween? To help you work out the answer to that question, here are some of the scariest cybersecurity stories and trends of 2020:



from Cyber Security News https://ift.tt/31Xr4a9

Digital Shadows maps out MITRE ATT&CK to SandWorm APT's campaign

Digital Shadows, throughout the years, has tracked SandWorm, and has now revisited the tactics, techniques and procedures (TTPs) behind the SandWorm APT.

from Cyber Security News https://ift.tt/2HRXITs

5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

Rigorous training as to how hackers are able to get into systems and access sensitive data and how to defend against an onslaught of cyberattacks has given rise to a specific type of training and competition for cybersecurity professionals: Capture the Flag (CTF). To find out more about these competitions, we talk to Dr. David Brumley, CEO of ForAllSecure, Inc. and Professor of Electrical and Computer Engineering and Computer Science at Carnegie Mellon University. 

from Cyber Security News https://ift.tt/3kHti4x

Phishing scam costs Wisconsin GOP $2.3 million

The Republican Party of Wisconsin recently confirmed that fraudsters used phishing emails and doctored invoices to steal $2.3 million earmarked for President Donald Trump's reelection campaign.

from Cyber Security News https://ift.tt/3jFEJZh

Don’t let your guard down over IT security during the pandemic

Healthcare providers remain firmly focused on dealing with the global pandemic, juggling the often-conflicting demands of providing care while keeping patients and staff safe. The financial impact of the pandemic has left many providers on the brink of bankruptcy amid falling patient visits deferred elective surgeries, and insufficient government aid to “fill the gap.”

from Cyber Security News https://ift.tt/2GfHVxc

The top 10 fastest-growing cybersecurity skills

A new examination of the top 10 fastest-growing cybersecurity skills shows employers are ready to pay more for workers who can prevent attacks before they occur by building a secure digital ecosystem from the ground up, according to data from Burning Glass Technologies.

from Cyber Security News https://ift.tt/2GfCIWa

Thursday, 29 October 2020

How $377 million will be lost due to ad fraud in the 2020 US campaign

The U.S. Presidential Election has, in many ways, been digital. Spend on digital ads in the race reached $2.9 billion in 2020. This was up sharply from $0.4 billion four years ago, marking the continuing prominence of digital political campaigning since President Obama's campaign manager, David Plouffe heralded the channel as a deciding factor in the election 12 years ago. However, an increasing challenge for this online ad spend has been ad fraud. In a new study, in association with the University of Baltimore, we see that marketers will $35 billion to digital ad fraud in 2020. Ad fraud is the practice of fraudulently representing online advertising impressions, clicks, conversion or data events in order to generate revenue. In the case of the political campaigns, often money is spent reaching bots rather than voters.

from Cyber Security News https://ift.tt/3kIz0TJ

93% of security operations center employing AI and machine learning tools to detect advanced threats

Security operations centers (SOCs) across the globe are most concerned with advanced threat detection and are increasingly looking to artificial intelligence (AI) and machine learning (ML) technologies to proactively safeguard the enterprise, according to a new study by Micro Focus, in partnership with CyberEdge Group.



from Cyber Security News https://ift.tt/3oPvwS6

NARUC releases cybersecurity tabletop exercise guide and Gridex V case study

The National Association of Regulatory Utility Commissioners Center for Partnerships & Innovation announced the release of the Cybersecurity Tabletop Exercise Guide and Public Utility Commission Participation in GridEx V: A Case Study. These new publications highlight the need for public utility commissions and utilities to coordinate on cybersecurity preparedness efforts.

from Cyber Security News https://ift.tt/3eadqW3

The three challenges of network tool sprawl and how to solve them

It’s easy to see how network tool sprawl gets started. The needs and challenges facing security and networking groups are immense. Network speeds have steadily increased, and there are always new demands and uses. Network conditions and requirements change weekly, if not daily. Security threats increase in number and approach. At the same time, technological advancement rapidly brings new solutions to the market that are beneficial in addressing networking and security needs.

from Cyber Security News https://ift.tt/3jJDEj8

CISA: Ransomware activity targeting the healthcare and public health sector

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.  

from Cyber Security News https://ift.tt/3ejoAb7

New poll suggests enterprises should harden systems against unconventional attack vectors

SafeGuard Cyber announced the results of a new survey of 600 senior enterprise IT and security professionals. The study revealed the need to harden unconventional attack vectors in cloud, mobile, and social media technologies. Moreover, enterprise organizations are juggling the twin demands of budget constraints and the need to drive business outcomes.



from Cyber Security News https://ift.tt/37RDdBd

Developing a playbook on how to respond to a breach

While breaches are an inevitable part of doing business, you can limit the negative impact by developing a solid playbook that charts a course to recovery. Examine potential threats, work out how to handle discrete scenarios, and spell it all out for your employees. By compiling policies and work streams, assigning responsibilities, and setting expectations you can build real resilience. Cool heads prevail in a crisis, and nothing curbs the spread of panic as well as a clearly delineated plan. But it’s not enough to craft a playbook, you also need to test it before it can serve as a critical piece of governance for your organization. Let’s take a closer look at the best way to go about developing a playbook.

from Cyber Security News https://ift.tt/3jEW1Wg

Ryuk ransomware responsible for one third of all ransomware attacks in 2020

SonicWall Capture Labs threat researchers unveiled third-quarter threat intelligence collected by the company’s more than 1 million global security sensors. Year-to-date findings through September 2020 highlight cyber criminals’ growing use of ransomware, encrypted threats and attacks leveraging non-standard ports, while overall malware volume declined for the third consecutive quarter.

from Cyber Security News https://ift.tt/3kE9tvd

Business email compromise during a pandemic: Why cyber insurance is more urgent than ever

In this ongoing virtual environment, organizations remain highly vulnerable to the significant cybersecurity risks exposed by widespread remote work - business email compromise (BEC), in particular. How did business email compromise become such a serious threat for organizations, and why should cyber insurance be top of mind right now, as a result? Let’s dive in.

from Cyber Security News https://ift.tt/35IXMgf

Wednesday, 28 October 2020

2021 healthcare cybersecurity strategy: Start at the end

With the healthcare industry expected to spend $125 billion on cybersecurity from 2020 to 2025, dollars must be spent for maximum efficiency. The question is, how to allocate those funds most effectively at a time when cybercriminals have placed a huge target on hospitals, research labs, pharmaceuticals and insurance carriers. Organizations need to take a layered approach to security to protect their organizations and sensitive patient data. The smartest approach is to start at the perimeter and work back toward existing enterprise protections – here’s how to do that.

from Cyber Security News https://ift.tt/3kDNvZ9

Eaton achieves IEC and UL cybersecurity certifications for product development processes

During its Cybersecurity Perspectives forum kicking off, power management company Eaton announced it is the first company to have its product development processes certified by both the International Electrotechnical Commission (IEC) and global safety science organization UL. The certifications underscore Eaton’s leadership in providing customers with confidence that its connected solutions comply with proven industry guidelines, says the company.

from Cyber Security News https://ift.tt/2HMZV2x

Enterprise Internet of Things (IoT) cybersecurity

IoT plays an important role that allows enterprises to go through digital transformation. However, in many cases organizations start to become aware that they do already have a large number of IoT devices which were introduced gradually over the years. One of the main concerns that an organizations face when dealing with IoT is managing risks involved in increasing number of IoT devices. Because of their ability to interact with the physical world, there are safety and privacy concerns when it comes to the security of IoT devices. This paper provides an overview of IoT components, followed by risks and sample attacks. Finally, a list of current and prospective future security solutions is discussed.

from Cyber Security News https://ift.tt/3e4etXt

IoT Security Foundation launches vulnerability disclosure platform for IoT industry

An online platform designed to help IoT vendors receive, assess, manage and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF). VulnerableThings.com aims to simplify the reporting and management of vulnerabilities whilst helping IoT vendors comply with new consumer IoT security standards and regulations.

from Cyber Security News https://ift.tt/2TFBvu5

The pressures the online gaming community faces when it comes to cybersecurity

Online games and specifically the Massive Multi-Player (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline, resulting in hundreds of thousands of dollars lost, according to Radware’s threat research team.



from Cyber Security News https://ift.tt/3jxmQM5

Strengthening the frontlines for unstructured data security: Protect it first

Traditional Enterprise Data loss prevention (DLP) tools were not initially designed for protecting unstructured data, and encryption and policy are not centralized and few have taken advantage of improvements in recent years. In the meantime, unstructured data has piled up and is growing.  To target this problem, a new set of vendors and products emerged with “data-centric” solutions adding to the confusion. So many vendors with a variety of capabilities to choose from, but how do you know which is right? What vendor do you choose? The answer to these questions is to think more about what you want to accomplish and weigh the approaches first.

from Cyber Security News https://ift.tt/3oz0WvJ

CISA releases advisory on North Korean malicious cyber activity

The Cybersecurity and Infrastructure Security Agency (CISA),  the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF) identified tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky to gain intelligence on various topics of interest to the North Korean government.

from Cyber Security News https://ift.tt/2HLfrLS

COVID-19 and the need for a national cyber director: How the response to the pandemic illustrates the importance of a leadership

If we ended up in a cyberbattle with some of the top nation-state actors, they could shut down supply chains, hospitals, the internet, oil and gas, electricity grids, water systems and more.  A national cyber director would be able to coordinate the cybersecurity flow of information to the executive branch and be able to coordinate a strategy to defend against these kinds of attacks.

from Cyber Security News https://ift.tt/2G9gaX4

Tuesday, 27 October 2020

Protect your endpoints, but don’t forget the other 70%

October is National Cybersecurity Awareness Month, and we wholeheartedly support this important initiative to focus attention on the critical security challenges facing all of us. This week’s theme focuses on the continued proliferation of IoT with, “The Future of Connected Devices.” If there’s one major cyber trend we’ve seen unfold around connected devices, it’s that there is a tendency to focus cybersecurity awareness on what we can see – phones, laptops, and IoT devices, while assuming that protecting endpoints will stop the epidemic of damaging cyberattacks.

from Cyber Security News https://ift.tt/3oGwsZ1

Security magazine announces the Top Cybersecurity Leaders contest

Security magazine and its partner for the Top Cybersecurity Leaders, (ISC)², is looking for enterprise information security executives, who have made and continue to make significant contributions in the cybersecurity space to their organizations and/or the enterprise-level information security profession.

from Cyber Security News https://ift.tt/34jRTp3

The perfect storm: How hardware security is getting weaker as the industry changes its cybersecurity models

On one hand, we have cybersecurity solutions that are not keeping pace with today’s hackers. In spite of more resources being devoted to cybersecurity, cyber compromises are at an all-time high, with even less experienced hackers now gaining access. At the same time, hardware designers are changing their industry standards and direction. This change enables hackers anytime access to hardware - even when it is powered off. The result of this combination is a perfect cyber storm, ready for disaster.

from Cyber Security News https://ift.tt/3e98HDR

The four insights network metadata can reveal about your compromise level

Modern security teams are not unlike the tenacious forensic investigators featured on many popular network television shows. In order to determine ‘who done it’ they must piece together small and seemingly unrelated strains of evidence.

from Cyber Security News https://ift.tt/37O43tY

Hackers are blackmailing Vastaamo psychotherapy patients

A company that offers psychotherapy to thousands of patients across Finland says it’s been the victim of a data breach, with the personal information of customers held for ransom. Vastaamo, which sees patients in 20 cities including Helsinki, Joensuu, Jyväskylä, Pori, Turku and Tampere, says “an unknown hostile party” got in touch with them saying they had obtained customer details.

from Cyber Security News https://ift.tt/3ouNsRH

COVID-driven work changes created turbulence for IT security stakeholders

One Identity released commissioned global survey results that reveal IT and security team attitudes regarding their responses to COVID-19-driven work environment changes.

from Cyber Security News https://ift.tt/2TqrUrf

Half of employees admit to opening emails they considered suspicious

Mimecast Limited released new research which highlights the risky behavior of employees using company-issued devices. More than 1,000 respondents in countries throughout the globe were asked about their use of work devices for personal activities and how aware they are of today’s cyber risks.

from Cyber Security News https://ift.tt/3mEF9RN

7 key IT trends during the shift to remote work

LogMeIn released findings of a new LogMeIn Central report commissioned to reveal the current state of IT in the new era of remote work. The report, “The Surprising New State of IT in a Remote World: Tackling Challenges and Redefining IT for Future Success” was conducted in partnership with Lab42 and quantifies the impact of COVID-19 on IT roles and priorities for small to medium-sized businesses.

from Cyber Security News https://ift.tt/2HDoCOY

Domestic and foreign cybersecurity threats surrounding the 2020 election

Digital Shadows released its latest research examining foreign threats to the 2020 US presidential election. After infamously compromised elements of the 2016 Election, connected to malicious actors linked to the Russian state, Digital Shadows has uncovered further evidence related to similar efforts this year.

from Cyber Security News https://ift.tt/34yDx5E

Monday, 26 October 2020

Examining software security implications for IoT device manufacturers

Over the past decade we’ve seen an increase in consumer grade IoT devices, but the security of those devices hasn’t always kept pace with the realities of the cyber threats targeting what is arguably an unmanaged computing device. These cyber threats are made more concerning when the expected lifespan of the device is factored in. After all, dishwashers, thermostats and doorbells aren’t devices like smartphones where there is social pressure to have the latest version.

from Cyber Security News https://ift.tt/2HvVCZA

5 minutes with Joan Pepin – Diversity in cybersecurity

As CSO of Auth0, Joan Pepin is responsible for the holistic security and compliance of the company's platform, products, and corporate environment. Here, we talk to Pepin, who has focused her time on mentoring and advocating for women in cybersecurity and technology, working to reconstruct the notion that women should only work within their bounds, and encouraging women to reach higher and challenge the status quo. She actively supports, advises, and works alongside women in the cybersecurity industry including participating in organizations, like Women Who Code and Women in InfoSec.



from Cyber Security News https://ift.tt/3dZ3Jtt

Donald Trump's Twitter hacked after researcher guessed password

Donald Trump’s Twitter account was allegedly hacked, after a Dutch researcher correctly guessed the president’s password: “maga2020!”, Dutch media reported.

from Cyber Security News https://ift.tt/2HwURyW

Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress

The British Interactive Media Association (BIMA) recently revealed that tech workers are five times more likely to suffer from a mental health problem than the wider population.  Nominet’s latest CISO Stress Report has also revealed that almost nine in ten (88%) chief information security officers (CISOs) consider themselves under moderate to high stress levels. The same report revealed that CISOs lose on average $35 000 a year in unpaid overtime, while increased stress levels have resulted in a 26-month tenure on average. 

from Cyber Security News https://ift.tt/37PDUdY

Infected IoT device numbers grow 100% in a year

Internet of Things (IoT) devices are now responsible for 32.72% of all infections observed in mobile networks, up from 16.17% in 2019, according to a new Nokia Threat Intelligence Report 2020. This trend lines up with the growing number of IoT devices that are now connected to mobile networks, says Nokia's Threat Intelligence Lab. 

from Cyber Security News https://ift.tt/2TsSShH

CISA and Vietnam veterans partner to raise awareness about the threat of disinformation

The Cybersecurity and Infrastructure Security Agency (CISA) and the Vietnam Veterans of America (VVA) released a series of public-awareness products designed to help veterans and other Americans identify disinformation and prevent its spread. 

from Cyber Security News https://ift.tt/3omZ1KN

Data protection report finds decline in information security training and policies may negatively impact US businesses

Shred-it announced the release of its 10th Anniversary Edition Data Protection Report (formerly known as “The Security Tracker: State of the Industry Report”), which outlines data security risks threatening U.S. enterprises and small businesses. The findings are based on a survey conducted by Ipsos, shedding light on trends in data protection practices and the risks American businesses, organizations, and consumers face related to keeping their data secure.

from Cyber Security News https://ift.tt/37Gp75n

Sunday, 25 October 2020

Why the 2020 election is already being hacked

Any apparent election interference from countries like Iran and Russia is typically met with partisan posturing. But while politicians are busy debating which candidate might benefit, there’s a good chance that someone, somewhere, is trying the same thing again right now. Foreign interference like the recent incident announced by the U.S. Director of National Intelligence John Ratcliffe is more common than ever because no online data is completely safe from hackers, and digital data is valuable for what it reveals. 

from Cyber Security News https://ift.tt/3jx6Z02

Friday, 23 October 2020

Georgia County's election infrastructure hit by ransomware attack

Hall County, Ga. confirmed it experienced a network outage as a result of a ransomware attack. The cyberattack impacted critical systems within the Hall County Government networks, including phone services. While some applications are disabled as the County works to resolve this incident, business continuity measures have been implemented.

from Cyber Security News https://ift.tt/3mkwiUP

CISA and FBI release joint advisories regarding Russian and Iranian APT actors

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released two joint cybersecurity advisories on widespread advanced persistent threat (APT) activity. Joint Cybersecurity Advisory: AA20-296A Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets Joint Cybersecurity Advisory: AA20-296B Iranian State-Sponsored Advanced Persistent Threat Actors Threaten Election-Related Systems

from Cyber Security News https://ift.tt/3mewJ2Z

Ransomware trends in Q3: a new attack every day

Digital Shadows released its quarterly research report focusing on the latest trends in ransomware. Unfortunately, for vulnerable organizations everywhere, Digital Shadows Photon Research team found that ransomware as a market and community on the dark web has expanded since Q2.

from Cyber Security News https://ift.tt/3kpydal

Iran targeting the US election

During a press conference on election security at FBI Headquarters with FBI Director Christopher Wray, Director of National Intelligence John Ratcliffe confirmed that some voter registration information has been obtained by Iran, and separately, by Russia.

from Cyber Security News https://ift.tt/2HiOVKj

NARUC Center for Partnerships and Innovations announces Smart Grid Interoperability Learning Modules

The National Association of Regulatory Utility Commissioners Center for Partnerships and Innovation today announced the release of a series of Smart Grid Interoperability Learning Modules.

from Cyber Security News https://ift.tt/3jwC1FD

Smooth digital transactions essential to business survival during and after pandemic

A new global study by the Economist Intelligence Unit and TransUnion has overwhelmingly found the key to whether or not companies go out of business hinges on providing consumers friction-right digital transactions. Nearly 85% of global executives surveyed as part of the study said they believe smooth digital transactions are “essential to business survival” rather than merely a competitive edge. 

from Cyber Security News https://ift.tt/35omWRq

5 minutes with Carolyn Crandall – Detecting and preventing insider threat attacks

Defending against insider threats is one of the biggest challenges an organization can face, and the COVID-19 pandemic has only made detection more challenging as remote employees continue to use virtual private networks (VPNs) to access sensitive company files and information. Here, we talk to Carolyn Crandall, Chief Deception Officer at Attivo Networks, to discuss how security teams can use deception technology to detect and prevent insider threat attacks. 



from Cyber Security News https://ift.tt/3jmLPSg

Thursday, 22 October 2020

The trusted supply chain and cybersecurity

There are few discussions in the physical security business that don’t at some point focus on the topic of cybersecurity. One area frequently missing from these conversations is the importance of a trusted supply chain for manufacturers. Since a product is only as good as the hardware and software inside it, examining how something is built can give us rapid insight into its potential vulnerabilities and overall cyber worthiness. The NDAA (National Defense Authorization Act) ban is particularly focused on the subject of component sourcing for security devices. What is inside that device that could be exploited? Where did it come from? What do we know about the manufacturing process? These are all important questions about the manufacturing supply chain that need to be considered by anyone who cares about cybersecurity.

from Cyber Security News https://ift.tt/37Fq0uS

Research shows mature data privacy programs have greater benefits

FairWarning announced the results of its Benefits, Attributes and Habits of Mature Privacy and Data Protection Program Report, in partnership with the International Association of Privacy Professionals (IAPP).

from Cyber Security News https://ift.tt/3dWNAVd

Center for Internet Security: Top 10 malware in September 2020

According to the Center for Internet Security (CIS), in September 2020, three malware returned to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Malware activity in September 2020, up from 78% in August 2020.

from Cyber Security News https://ift.tt/3jnoEr3

90% of fraud analysts want better resources to conduct anonymous and auditable investigations

Authentic8 released the results of its 2020 Global Financial Crimes Survey, conducted in partnership with the Association of Certified Financial Crime Specialists (ACFCS).

from Cyber Security News https://ift.tt/31zJDku

FIRST launches new code of ethics for incident response and security teams on Global Ethics Day

Following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines for incident response and security teams today on Global Ethics Day. ethicsfIRST provides guidance for cybersecurity professionals on how to conduct themselves professionally and ethically during incidents.  Inspired by Earth Day, Global Ethics Day provides an opportunity for organizations to explore the meaning of ethics in international affairs

from Cyber Security News https://ift.tt/3kkki5r

How a culture of privacy can help protect your business from ransomware

Faced with this ransomware onslaught, organizations of all kinds need to rethink how they protect themselves. Part of that rethink means merging the need to provide better privacy protection for their employees with the necessity to protect themselves from the consequences of a ransomware attack exposing both customer and employee data. With federal agencies signaling the possibility of fines for complying with ransomware demands and the liability from exposing personally identifiable data likely to rise significantly, not doing so will soon be too costly to consider.

from Cyber Security News https://ift.tt/37wkrz0

Wednesday, 21 October 2020

Many organizations have room for growth when it comes to using identity to prevent data breaches

We recently surveyed companies across the U.S. about their current cybersecurity challenges now that many have moved to a predominantly remote workforce. Unfortunately, what we found was that most organizations are only scratching the surface when it comes to identity and access management, as they may only be addressing a fraction of what identity can provide. This is leaving many organizations exposed to data breach and compliance fines.

from Cyber Security News https://ift.tt/3ocFQ6d

43% of IT and security leaders report losing revenue due to outdated remote access solutions

Remote work has left many organizations lagging in productivity and revenue due to remote access solutions. Nearly one-fifth (19%) of IT leaders surveyed said they often or always experience network performance and latency issues when using legacy remote access solutions, with an additional 43% saying they sometimes do. Those issues have resulted in a loss of productivity for 68% of respondents and a loss of revenue for 43%, according to Perimeter 81's  2020 State of Network Security Report.



from Cyber Security News https://ift.tt/31qFwHl

Address bar spoofing vulnerabilities disclosed by security researchers

Rapid 7 has disclosed a set of address bar spoofing vulnerabilities that affect a number of mobile browsers, ranging from the more common browsers, like Apple Safari and Opera Touch, to the less common, like Bolt Browser and RITS Browser. The announcement is a coordinated vulnerability disclosure publication with security researcher, Rafay Baloch. 

from Cyber Security News https://ift.tt/3mlca5l

5 minutes with Otavio Freire – How 'soft attacks' are exploiting human connection

Attacks within digital communications channels (like Slack, TEAMS, Twitter, Facebook, LinkedIn)  have grown more targeted, more social engineering-focused, and the payloads have become "softer,” and the risks are not in files and links/IP's alone anymore. Instead, recent attacks are laser-targeted and evade traditional detection by focusing on human connections. To find out more about these “soft attacks,” we talk to Otavio Freire, CTO, President & Co-Founder SafeGuard Cyber.



from Cyber Security News https://ift.tt/3jkwJNb

NSA releases advisory on Chinese state-sponsored actors exploiting publicly known vulnerabilities

The National Security Agency (NSA) has released a cybersecurity advisory on Chinese state-sponsored malicious cyber activity. This advisory provides 25 Common Vulnerabilities and Exposures (CVEs) known to be recently leveraged, or scanned-for, by Chinese state-sponsored cyber actors to enable successful hacking operations against a multitude of victim networks.

from Cyber Security News https://ift.tt/3jjAqCS

Tuesday, 20 October 2020

Artificial intelligence and national security: Integrating online data

Artificial intelligence (AI) is now a major priority for government and defense worldwide — one that some countries, such as China and Russia, consider the new global arms race. AI has the potential to support a number of national and international security initiatives, from cybersecurity to logistics and counter-terrorism.

from Cyber Security News https://ift.tt/35iZ0P9

Using chip technology to make data sharing safer in financial services

Financial services institutions and banks around the globe face monumental challenges as they look to streamline service delivery for customer transactions, manage multi-party loan processes, collaborate on industry benchmarks and indices, and eliminate fraud and cybercrime. Historically the market has primarily relied upon manual approaches for sharing and managing transaction data. But advances in confidential computing (sometimes called CC or trusted computing), combined with federated machine learning (FML), are helping financial organizations better share data and outcomes, while alleviating many privacy and security concerns.

from Cyber Security News https://ift.tt/2HrQZz1

Remote work and COVID-19 brings new challenges in securing cloud services

AppOmni, provider of SaaS Security Posture Management (SSPM), released findings of their latest survey highlighting the security concerns of cloud SaaS applications as they become more essential for enabling remote workers.

from Cyber Security News https://ift.tt/2IIPddv

How to ensure your SaaS solutions are secure

But at many businesses, the company security posture hasn’t kept pace with the volume of data flowing to and from multiple SaaS vendors. It’s an urgent issue in an environment where endpoints are proliferating and hacking techniques are getting more sophisticated. That’s why it’s never been more urgent to upgrade the security posture and reduce the risks associated with SaaS solutions.

from Cyber Security News https://ift.tt/3dGgxVr

Queens, rooks and ransomware

Proactive cybersecurity programs include comprehensive activities that involve not only the IT and security teams, but also the CEO and boards of directors. Examples of key proactive activities include identifying risk tolerance, defining governance structures, and developing comprehensive security strategies. Throughout this article, we will review key domains where organizations can proactively fortify their cybersecurity measures. COVID-19 has increased threat activity and created unique changes — and increased risk — in IT environments. Now is the time to review some “quick hit” areas where you can bolster your cybersecurity and execute your winning strategy.

from Cyber Security News https://ift.tt/34bPvBY

US indicts Sandworm, Russia's most destructive cyberwar unit

The U.S. Department of Justice (DOJ) has charged six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. The group is believed to be part of one of Russia's most elite and secretive hacking groups, known as Sandworm.

from Cyber Security News https://ift.tt/3o5Dkyx

Purdue offers new online social engineering, digital forensics and new cybersecurity certification prep courses

Purdue University is offering new cybersecurity short courses in social engineering and digital forensics as part of a growing suite of offerings through the Purdue Polytechnic Institute’s Cyber Education Network Training Resources (CENTR).

from Cyber Security News https://ift.tt/3ma0get

Monday, 19 October 2020

NSA announces SkillTree, an approach to implementing application training

The National Security Agency (NSA) announced the release of SkillTree, an internally-developed open source solution for gamifying user training. SkillTree provides a systematic and interactive way to promote user proficiency of an existing application. The service is based on industry best practices using gamification to provide awareness of tool features, promote best practices, and document user progression and expertise. By reducing an application’s training curve, SkillTree reduces traditional comprehensive training costs while providing a more enjoyable experience for the user.

from Cyber Security News https://ift.tt/37m89co

Department of Defense and National Security Agency announce new cybersecurity initiative aiming to close the cybersecurity talent gap

The Department of Defense and the National Security Agency and Department of Defense announced the kickoff of a new workforce development program that redefines the academic path to a successful career in cybersecurity. Through a collaboration with NSA’s National Centers of Academic Excellence in Cybersecurity (NCAE-C) Program Management Office and Department of Defense’s (DoD) Office of Industrial Policy, Small Business Program’s (OSBP) and Mentor Protégé Program (MPP) students graduate  “job ready”, armed with the knowledge, skills and training necessary for a successful career in cybersecurity.

from Cyber Security News https://ift.tt/31oyjHH

NASCIO honors three public servants with State Technology Innovator Award

The National Association of State Chief Information Officers (NASCIO) presented the State Technology Innovator Award to three deserving public servants during the 2020 NASCIO Virtual Annual Conference

from Cyber Security News https://ift.tt/35gYi4U

Administrator Pekoske visits TSA’s Transportation Security Operations Center for virtual town hall with employees

Transportation Security Administration (TSA) Administrator David Pekoske was at the TSA Transportation Security Operations Center (TSOC) on Tuesday, Oct. 13, to meet with the local TSA workforce and conduct one of his regular virtual town hall meetings, which was broadcast to agency employees nationwide.

from Cyber Security News https://ift.tt/37fQuTM

Security industry evangelist Derek Abdine named CTO at Censys

Derek Abdine has joined Censys, Inc. as Chief Technology Officer (CTO). An accomplished researcher, advisor and evangelist to the security community, Abdine brings over 15 years of leadership experience in the computer security industry.

from Cyber Security News https://ift.tt/2IKl6Tb

Vaccinations, not bandages

Cybersecurity is critically important in the healthcare industry. We’ve all seen the headlines about vulnerabilities disclosed, information leaked, and facilities disabled because of malware. Unfortunately, many organizations have unrealistic expectations of their security teams. These result in missed deadlines, friction with product teams, and an operational model that cannot scale and is ultimately doomed to failure. By understanding the correct functioning of a security group, organizations can reduce overall risk smoothly and effectively.



from Cyber Security News https://ift.tt/3dEhi16

Defend like an attacker: 4 required approaches

There’s a significant movement in cybersecurity right now that is seeing organizations approach the problem of cyber defense through the eyes of an attacker. T

from Cyber Security News https://ift.tt/3o0sv0V

Why hospitals can’t ignore this cybersecurity awareness month

Amidst this flurry of high-profile attacks comes National Cyber Security Awareness Month; a poignant reminder that, for hospitals and healthcare providers, cyberattack prevention and business continuity is truly a matter of life and death. Over the course of the pandemic, we have seen ransomware and phishing attacks against healthcare institutions — viewed by cybercriminals as vulnerable and profitable targets — dramatically skyrocket. But where, in an ever-evolving threat landscape, should healthcare organizations focus their attention?



from Cyber Security News https://ift.tt/37euAjM

Sunday, 18 October 2020

Why today’s organizations need a domain security council

To ensure the deployment of enterprise-class registrars and additional best practices, organizations need to establish what we can call a “Domain Security Council.” Through such a council, CISOs collaborate with corporate C-suite members to identify, implement and continuously monitor/improve upon domain security policies and procedures.

from Cyber Security News https://ift.tt/3o6NrDd

Friday, 16 October 2020

What the "Bad Neighbor" vulnerability means for enterprise security

Among the Windows 10 vulnerabilities Microsoft announced yesterday, the "Bad Neighbor" vulnerability stands out, posing a potential nightmare scenario for enterprises. With a severity score of 9.8 out of 10, the remote code execution (RCE) vulnerability would allow an attacker to run malware or launch a denial of service (DoS) attack.

from Cyber Security News https://ift.tt/3dzmiEo

Barnes & Noble gets hacked; notifies customers of possible data breach

Barnes & Noble, American bookseller, has notified customers of a possible data breach that may have affected their personal information. 

from Cyber Security News https://ift.tt/3lSd7S7

Young cybersecurity professionals fear being replaced by technology

Despite 88% of cybersecurity professionals believing automation will make their jobs easier, younger staffers are more concerned that the technology will replace their roles than their veteran counterparts, according to new research by Exabeam.

from Cyber Security News https://ift.tt/3dyNByh

Leveraging breached data to unmask cybercriminals

How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.

from Cyber Security News https://ift.tt/3j5glQm

Thursday, 15 October 2020

Zoom rolls out end-to-end encryption offering

Zoom has announced they have rolled out a new end-to-end encryption offering. Is this a step in the right direction?

from Cyber Security News https://ift.tt/3k3lrOz

Banning TikTok and Chinese apps is a national security red herring

Much like the long-standing debate around 5G, President Trump’s recent decision to sign an executive order that may see TikTok and WeChat banned, and has now evolved into a bidding war for TikTok’s U.S. operations with Oracle leading as the potential winner, has brought the world’s attention to the inherent security challenges that complex global digital communications and connectivity present.

from Cyber Security News https://ift.tt/3lRJoc9

Are you ready for AI engineering within EU data regulations?

To better regulate the use of personal data and protect citizens, the European Union adopted the General Data Protection Regulation (GDPR), which came into force on 25 May 2018. In the UK, the GDPR is tailored by the Data Protection Act 2018. Non-EU businesses with offices in Europe, or who hold or process data coming from Europe, also need to be fully appraised of GDPR. The digital revolution has made it easier for companies to collect insights on their markets to better understand their clientele's behavior. But it has also paved the way for potential abuses, creating a climate of suspicion. How can AI earn the public’s trust?

from Cyber Security News https://ift.tt/343XNvy

New vulnerabilities exposed as IT teams respond to the pandemic

A new Incident Response (IR) threat report by Secureworks reveals that cybercriminals are targeting vulnerabilities created by the pandemic-driven worldwide transition to remote work.  The report is based on hundreds of incidents the company’s IR team has responded to since the start of the pandemic.

from Cyber Security News https://ift.tt/3nRPlrv

WFH? Digital security during a pandemic

Criminals are leveraging elevated interest in COVID-19 to send emails to unsuspecting people to infect computers with ransomware, malware or other computer viruses. And why not? According to Forbes, the COVID-19 crisis has turned the U.S. workforce into a work-from-home army, giving cybercriminals new, less secure, access points for cyber viruses and phishing attacks, revealing vulnerabilities in cybersecurity strategies for the coronavirus crisis. And since there’s a tremendous curiosity for coronavirus information — people are more likely to click without checking the credibility of the source.

from Cyber Security News https://ift.tt/3lNWyqz

5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

Here, we talk to Julian Waits, General Manager of Cybersecurity at Business Unit at Devo, to find out how security operations center (SOC) leaders can create a culture of growth among their teams. 



from Cyber Security News https://ift.tt/378HKib

Meet FIN11, a financially-motivated hacker group

Mandiant Threat Intelligence researchers have identified FIN11, a financially-motivated hacking group behind bold, large and long-running malware campaigns. The hackers have expanded their range of targets the past two years while using increasingly aggressive ransomware attacks.



from Cyber Security News https://ift.tt/33XuCdH

Norway blames Russia for cyberattack on parliament

Norway has blamed Russia for the August cyberattack that targeted the email system of the country's parliament. "Based on the information the government has, it is our view that Russia is responsible for these activities," Foreign Minister Ine Eriksen Soreide said in a statement, the Moscow Times reports.

from Cyber Security News https://ift.tt/373Fo4a

Carnival ransomware attack affected three brands

Carnival Corporation has disclosed that an Aug. 15 ransomware attack accessed the personal data of guests and employees of Carnival Cruise Line, Holland America Line and Seabourn. However, Carnival said there is a "a low likelihood of the data being misused."

from Cyber Security News https://ift.tt/3196MK5

63% of government workers are worried that cyberattacks will impact the integrity of the upcoming US election

Sixty-three percent of government workers say they are worried that cyberattacks on candidates, political parties, and voting infrastructure will impact the integrity of the upcoming U.S. election, according to the Government & Election Cybersecurity Threat Index released by Morphisec, provider of Advanced Threat Prevention. In addition, more than 3-in-4 government workers (77%) believe that states and local governments need more federal funding to protect voting infrastructure better.

from Cyber Security News https://ift.tt/3777ETq

Half of industrial organizations believe IoT will transform ICS security

The digitalization of industrial infrastructure is underway, and 55% of organizations are confident that the Internet of Things, as one of its key aspects, will change the state of security in industrial control systems (ICS). According to Kaspersky’s recent report, 20% of organizations have already prioritized IoT-related incidents, but effective solutions against IoT threats are not yet widespread.

from Cyber Security News https://ift.tt/3nReS3V

Wednesday, 14 October 2020

Compliance activities and fines cost organizations nearly $4m per year

 Telos Corporation, provider of cyber, cloud and enterprise security solutions, unveiled new findings from a survey conducted by independent research firm Vanson Bourne that highlights organizations’ ongoing struggle to keep up with IT security and privacy compliance regulations.

from Cyber Security News https://ift.tt/3lLeVMO

Simple 'back-to-virtual-school' must-haves to implement in your organization

Security professionals can incorporate a few simple items to make the remote experience safer, more secure and more productive. Here’s the “shopping list” that should be on every CSO's desk right now and translates across higher education institutions, corporations and more.



from Cyber Security News https://ift.tt/3kb1pSt

NJOHSP promotes cyber safety for cybersecurity awareness month

The New Jersey Office of Homeland Security and Preparedness (NJOHSP) reaffirmed its commitment to keep the State cyber safe after Governor Phil Murphy proclaimed October as Cybersecurity Awareness Month on October 2. NJOHSP and its cyber division, the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), are also participating in National Cybersecurity Awareness Month (NCSAM).

from Cyber Security News https://ift.tt/3nLOUyJ

Tuesday, 13 October 2020

To keep pace with digital devices used in the course of crimes, Argentina’s border guard force uses a combination of technology and teamwork

Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. The GNA, as well as their border force colleagues in neighboring countries, must also grapple with cross-border crime that take advantage of the close ties among the region’s economies. According to Interpol, illicit markets in these border regions may be worth tens of billions of dollars.

from Cyber Security News https://ift.tt/3144Tyh

Remote work lingers: Top 3 ways to keep employee devices secure

Today, as an increasing number of organizations, including top tech companies like Google, Twitter and Facebook, have announced extended remote work plans, IT teams must ensure employee devices are secured to sustain the long haul. With IT burnout high, user awareness low, and malicious activity rising, this is often easier said than done. Here are top three tips for IT teams to ensure employee devices remain secure as remote work looms.



from Cyber Security News https://ift.tt/2SRUWQb

Fraud continues to grow for financial services and lending firms, both before and during the pandemic

LexisNexis Risk Solutions released its LexisNexis Risk Solutions 2020 True Cost of Fraud Study: Financial Services & Lending for the United States and Canadian financial services and lending sectors.



from Cyber Security News https://ift.tt/37aLgZc

How cyberattackers use Microsoft Office 365 tools against organizations to steal data

Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.

Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.

from Cyber Security News https://ift.tt/3iVgp5t

Americans report 168k imposter scam cases amounting to $300M in losses YTD

According to data extracted and analyzed by Atlas VPN, the United States residents reported 168,818 imposter scam cases amounting to $299.9 million in losses in the first half of 2020 with a median loss of $694. That is more than two times less than in H1 2019 when the US consumers reported 355,866 imposter fraud cases.

from Cyber Security News https://ift.tt/3nO5FJN

Microsoft takes down massive hacking operation

Microsoft has taken action to disrupt a botnet called Trickbot, one of the world’s most infamous botnets and prolific distributors of ransomware. Trickbot has infected over a million computing devices around the world since late 2016. 

from Cyber Security News https://ift.tt/3lGpEbf

Monday, 12 October 2020

APT actors chaining vulnerabilities against SLTT, critical infrastructure and elections organizations

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint cybersecurity advisory regarding advanced persistent threat (APT) actors chaining vulnerabilities — a commonly used tactic exploiting multiple vulnerabilities in the course of a single intrusion — in an attempt to compromise federal and state, local, tribal, and territorial (SLTT) government networks, critical infrastructure, and elections organizations.

from Cyber Security News https://ift.tt/3dnrrPy

Average ransomware demand increases 100% from 2019 through Q1 2020

Coalition announced the results of its H1 2020 Cyber Insurance Claims Report. The report explores top cybersecurity trends and threats facing organizations today, in addition to data showing the impact of COVID-19 on cyber insurance claims. The report garners insights from the incidents reported across 25,000 small and midsize organizations.



from Cyber Security News https://ift.tt/3dsXei7

Amazon Prime Day leads to spike in phishing attempts

Ahead of Amazon Prime Day, a highly-anticipated two-day online event, Bolster Research analyzed hundreds of millions of web pages and tracked the number of new phishing and fraudulent sites using the Amazon brand and logos. T

from Cyber Security News https://ift.tt/2GPzLf9

BlackBerry uncovers massive hack-for-hire group BAHAMUT

BlackBerry released new research highlighting the true reach and sophistication of one of the most elusive, patient, and effective publicly known threat actors – BAHAMUT. In the report, BlackBerry researchers link the cyberespionage threat group to a staggering number of ongoing attacks against government officials and industry titans, while also unveiling the group’s vast network of disinformation assets aimed at furthering particular political causes and hampering NGOs. 

from Cyber Security News https://ift.tt/30YxAN5

Sunday, 11 October 2020

Threat actors, TA505 and MERCURY, exploiting ZeroLogon to attack and gain account control privileges

Microsoft recently warned that more cybercriminals have started to incorporate exploit code for the ZeroLogon vulnerability in their attacks.  Threat actor TA505, a financially motivated threat group that has been active since at least 2014, is now exploiting this vulnerability. 

from Cyber Security News https://ift.tt/3jRkbhr

Friday, 9 October 2020

Militia group that planned to kidnap Michigan governor used operational security measures to avoid detection

The Department of Justice announced that six men have been arrested and charged federally with conspiring to kidnap the Governor of Michigan, Gretchen Whitmer.  According to a complaint, this group used operational security measures, including communicating by encrypted messaging platforms and used code words and phrases in an attempt to avoid detection by law enforcement.



from Cyber Security News https://ift.tt/2I3upNx

National Security Agency launches the Center for Cybersecurity Standards

The National Security Agency announced the official launch of the Center for Cybersecurity Standards (CCSS) in the Cybersecurity Directorate. This office will lead NSA’s Cybersecurity mission to engage with standards bodies to communicate security requirements and influence standards to secure our National Security Systems and provide support to the Defense Industrial Base (DIB).

from Cyber Security News https://ift.tt/34CJnlu

Study finds MITRE ATT&CK improves cloud security, yet security leaders struggle to implement it

McAfee and the University of California, Berkeley’s Center for Long-Term Cybersecurity (CLTC) released a new research study, MITRE ATT&CK as a Framework for Cloud Threat Investigation, developed by CLTC researchers. The report focuses on threat investigation in the cloud through the lens of the most widely adopted framework, MITRE ATT&CK.

from Cyber Security News https://ift.tt/2GxigjL

Department of Homeland Security releases Homeland Threat Assessment

Acting Secretary of Homeland Security Chad F. Wolf released the Department of Homeland Security’s (DHS) Homeland Threat Assessment (HTA). This first-of-its-kind report synthesizes threat information across DHS including intelligence and operational components.

from Cyber Security News https://ift.tt/33LzR0a

George Campbell wins US OSPA Lifetime Achievement Award

SEC emeritus faculty George Campbell has been recognized with the 2020 U.S. Outstanding Security Performance Award (OSPA) for Lifetime Achievement. The winners were announced September 25.

from Cyber Security News https://ift.tt/3deUrJu

Thursday, 8 October 2020

Rise in mercenary hacking groups and cyber espionage

As the 2020 U.S. presidential election nears, there has been a rise in mercenary hacking groups and cyber espionage. Some say this a direct result of the current administrations’ increasingly isolationist global foreign policy, and that the U.S.’ status in the global cyber domain should be a major discussion point before November.

from Cyber Security News https://ift.tt/30Np0kp

CSUSB receives national cybersecurity designation & $10.5 million grant

The National Security Agency (NSA) has chosen Cal State San Bernardino to be a leader of its core workforce development initiative, selecting it for a $10.5 million grant and naming the university’s Cybersecurity Center as the Community National Center for Cybersecurity Education. This prestigious designation illustrates CSUSB’s continued prominence as the premier institution of higher education for cybersecurity education and took effect Sept. 18, 2020. 

from Cyber Security News https://ift.tt/3nuPKjq

CISA warns of resurgence of Emotet cyberattacks

Emotet — a sophisticated Trojan commonly functioning as a downloader or dropper of other malware — resurged in July 2020, after a dormant period that began in February. Since August, CISA and MS-ISAC have seen a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.

from Cyber Security News https://ift.tt/3lsKt9U

Threat of fines, not FUD, drives board decisions on cybersecurity spend

Thycotic, provider of privileged access management (PAM) solutions, released its CISO Decisions survey. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months. 



from Cyber Security News https://ift.tt/3iHh4He

Wednesday, 7 October 2020

CISA releases FY2019 Risk Vulnerability Assessment Infographic

The Cybersecurity and Information Security Agency (CISA) has released an infographic mapping analysis of 44 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2019 to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework.

from Cyber Security News https://ift.tt/3nsaWpX

Digital Guardian appoints Tim Bandos as Chief Information Security Officer

Digital Guardian announced Tim Bandos will become Chief Information Security Officer (CISO). Bandos will bring more than 15 years of experience to the position including his five years as VP of Cybersecurity at Digital Guardian. Prior to joining Digital Guardian, Bandos was Director of Cybersecurity for Dupont where he was responsible for overseeing internal controls, incident response and threat intelligence.

from Cyber Security News https://ift.tt/30GYokK

Skyfire names Michael Briant as Chief Security Officer and Michael Rogers as Director of Public Safety

Skyfire Consulting, a public safety UAS consulting group, announced the appointment of Michael Briant as Chief Security Officer (CSO) and Michael Rogers as Director of Public Safety. Both will team up and bring their experience to the Skyfire Academy, which has just released its latest suite of law enforcement training programs, as they lead a robust training programs in the industry. 

from Cyber Security News https://ift.tt/2I61fNX

CISA and CNMF identify a new malware variant

The Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Defense (DOD) Cyber National Mission Force (CNMF) have identified a malware variant — referred to as SLOTHFULMEDIA — used by a sophisticated cyber actor. In addition, U.S. Cyber Command has released the malware sample to the malware aggregation tool and repository, VirusTotal.

from Cyber Security News https://ift.tt/3lnvHkV

NIST crowdsourcing challenge to de-identify public safety data sets

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The Differential Privacy Temporal Map Challenge includes a series of contests that will award a total of up to $276,000 for differential privacy solutions for complex data sets that include information on both time and location. 

from Cyber Security News https://ift.tt/34sJuQo

Tuesday, 6 October 2020

New research indicates over two thirds of businesses experienced increase in endpoint and IoT security incidents in the past 12 months

According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT security incidents in the last year, while 56% anticipate their organization will likely be compromised due to an endpoint or IoT-originated attack with the next 12 months. 

from Cyber Security News https://ift.tt/3d7jcHs

Monday, 5 October 2020

ISC West opens virtual conference with keynote on securing the IoT

ISC West began this week with a keynote from Michael MacKenzie, general manager of IoT connectivity & control services at Amazon Webservices IoT.

from Cyber Security News https://ift.tt/3nv8zD4

The importance of a cybersecurity framework

A framework allows for standardization of service delivery that improves efficiency and margin. Many organizations implement frameworks to establish a common language among themselves and clients. For example, frameworks allow you to align conversations with customers on what they want “good” to look like. Why is having a cybersecurity framework so important?  When it comes to cybersecurity, a framework serves as a system of standards, guidelines, and best practices to manage risks that arise in a digital world. A cybersecurity framework prioritizes a flexible, repeatable and cost-effective approach to promote the protection and resilience of your business. It’s important to realize that cybersecurity helps with the growth of your business. Using a framework to align controls like local, offline, and cloud backups will improve resilience from any attack or reliance on hardware. As an MSP, the extra work of building out a process will fall onto you, but will allow you to hold your clients accountable and vice versa.  



from Cyber Security News https://ift.tt/2SuzDUE

Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

One of the enduring truths about the Internet lies in its power to connect – to information and applications, to our homes, and of course, to one another. The flip side of course, is that the more we facilitate these connections, the more vulnerable we become. The forthcoming rollout of 5G and continued mass adoption of IoT represent two distinct yet converging macro technology trends that promise to transform the way we work and live. Moreover, as bandwidth capacity surges and more connected things come online, we will witness the further dissolution of the network perimeter as more applications and data get pushed to ‘the Edge’. But with this untold potential also comes an assortment of risk factors and novel attack vectors that threat actors are already finding ways to exploit. As the age-old security axiom goes, ‘you’re only as secure as your weakest link’ – as we accelerate the speed and volume of connected devices and people, one thing is for certain: there will be no shortage of weak links.

from Cyber Security News https://ift.tt/2GliQRA

SASE is the security trend of the decade

Security Access Service Edge (SASE) is the latest security trend to hit the world of cybersecurity for enterprises. But unlike meaningless buzzwords, SASE looks set to become an essential toolkit for any cybersecurity framework. SASE moves away from data center-orientated security. Instead, it unifies your network and security tools into a single service delivered via the cloud and provides edge-to-edge protection for remote users and data centers. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released chapter 2 of their Cyber Essentials Toolkit. CISA's Cyber Essentials is a guide for businesses and government agencies. It educates them on critical fundamental foundations needed for a robust cybersecurity framework, such as how to implement organizational cybersecurity practices and essential tools required. They specifically mention that for an organization to reduce its risk from online threats, they need to embrace a holistic approach. The main drawback of this policy is that it relies on multiple point solutions; typically, point solutions only fix one specific problem. The result is a technology stack that grows and grows as more threats and situations arise, and more point solutions are added.

from Cyber Security News https://ift.tt/33xDcji

CISA and MS-ISAC release joint ransomware guide

The Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing a joint Ransomware Guide meant to be a one-stop resource for stakeholders on how to be proactive and prevent these attacks from happening and also a detailed approach on how to respond to an attack and best resolve the cyber incident. CISA and MS-ISAC observed there are vast products and resources available, but very few that have them all in one place.

from Cyber Security News https://ift.tt/3ljmI43

ESET researchers discover XDSpy, an APT group stealing government secrets in Europe since 2011

ESET researchers uncovered a new APT group that has been stealing sensitive documents from several governments in Eastern Europe and the Balkans since 2011. Named XDSpy by ESET, the APT group has gone largely undetected for nine years, which is rare. The espionage group has compromised many government agencies and private companies. The findings were presented today at the VB2020 localhost conference.

from Cyber Security News https://ift.tt/3nqEKUf

Sunday, 4 October 2020

Six cybersecurity threats the financial services sector faces

Security teams in the financial services sector are experiencing even more exacting demands as they defend their organizations in a world under a new and unexpected threat — a global pandemic, says a new Accenture report, "2020 Future Cyber Threats: The latest extreme but plausible threat scenarios in financial services."

from Cyber Security News https://ift.tt/3cYkh48

Department of Treasury releases advisory on potential sanctions risks for facilitating ransomware payments

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing an advisory to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. This advisory highlights OFAC’s designations of malicious cyber actors and those who facilitate ransomware transactions under its cyber-related sanctions program.

from Cyber Security News https://ift.tt/33tww5y

Friday, 2 October 2020

Security magazine announces the Top Cybersecurity Leaders contest

Security magazine and its partner for the Top Cybersecurity Leaders, (ISC)², is looking for enterprise information security executives, who have made and continue to make significant contributions in the cybersecurity space to their organizations and/or the enterprise-level information security profession.

from Cyber Security News https://ift.tt/34jRTp3

DOJ charges two men for involvement in hacking of NFL and NBA players social media accounts

Two men will appear in federal court to face charges that they were involved in the unauthorized takeover of social media and other personal online accounts belonging to professional and semi-professional athletes, U.S. Attorney Craig Carpenito announced.

from Cyber Security News https://ift.tt/3cTfmSc

Thursday, 1 October 2020

Cryptographic vulnerabilities, data leakage and other security breaches in healthcare apps

According to Intertrust's 2020 Security Report on Global mHealth Apps, 71% of healthcare and medical apps have at least one serious vulnerability that could lead to a breach of medical data. The report investigated 100 publicly available global mobile healthcare apps across a range of categories—including telehealth, medical device, health commerce, and COVID-tracking—to uncover the most critical mHealth app threats.

from Cyber Security News https://ift.tt/3impST4

92% of businesses believe going passwordless is the future

LastPass by LogMeIn released findings of a new report commissioned to better understand the current state of passwords in organizations today, and how these trends are driving passwordless authentication models moving forward.

from Cyber Security News https://ift.tt/3ih2ndW

65% of leaders say that security awareness training is not a top priority

 nVisium released the findings of their recent research which explores the current state of cybersecurity awareness and security training initiatives within today’s remote workforce. The research reveals that only 35% of respondents classify security awareness training as a ‘top priority’ while working remotely, and nearly half say that their DevOps teams are not experts in understanding how to protect at home wireless networks.

from Cyber Security News https://ift.tt/2GqqWI8

New York’s investigation of Dunkin Donuts results in a promise to abide by the SHIELD Act’s requirements

The New York Attorney General’s Office (NYAG) reached a Consent and Stipulation Agreement with Dunkin’ Brands, Inc. (Dunkin), which obligates the company to implement and maintain a comprehensive information security program to protect customers’ private information. The terms of the consent agreement are similar to the terms New York reached with Zoom earlier this year regarding inadequate data security practices, and strongly resemble the reasonable security measures described in the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act).

from Cyber Security News https://ift.tt/3jmfufn

61% of business don’t apply basic password security techniques, here’s how to

Specops Software discovered that 41% of employees had not been provided with adequate cybersecurity training while working from home, and they were keen to discover which sectors were experiencing the most threats during this time. They found that 54% of businesses across 11 sectors have seen a rise in cybercrime threats since working from home, with phishing being the most prevalent attack.

from Cyber Security News https://ift.tt/33lABc8

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners — including the National Cyber Security Alliance — to ensure every American has the resources they need to stay safe and secure online.

from Cyber Security News https://ift.tt/3jlJrvR

ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram

ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East. The new spyware, detected by ESET security products as Android/SpyC23.A, builds upon previously reported versions with extended espionage functionality, new stealth features and updated C&C communication.

from Cyber Security News https://ift.tt/3n6kd72