Tuesday, 31 August 2021

Top 25 College Football Teams found on breached password lists

Specops researchers analyzed more than 800 million compromised passwords to determine the popularity of Division 1 Football Bowl Subdivision programs and their team mascots and nicknames appearing on breached passwords lists.  



from Cyber Security News https://ift.tt/3sZLj3f

FCC’s proposed ban on Chinese camera and video surveillance components

Following the National Defense Authorization Act (NDAA) 2019 Section 889 and the ban of cameras and components made by certain Chinese companies, the Federal Communications Commission (FCC) has proposed a rule to ban products from Chinese electronics companies. 



from Cyber Security News https://ift.tt/3jwK3Br

CISA opens registration for third annual President’s Cup Cybersecurity Competition

The Cybersecurity and Infrastructure Security Agency (CISA) opened registration for the third annual President’s Cup Cybersecurity Competition.



from Cyber Security News https://ift.tt/3Bp1R7J

Five tips for building an effective security champions program

Instead of disrupting development with gates, organizations can implement a security champions program to build security guardrails into development. Here are five considerations for implementing an effective security champions program.



from Cyber Security News https://ift.tt/3DB3j8G

Making sure customers’ voices are heard — and scammers’ voices are silenced

Any organization handling personally identifiable information through an IVR or contact center must secure its systems and implement proper risk management protocols. If they don’t, they and their customers may well suffer severe financial and reputational damage in the years to come.



from Cyber Security News https://ift.tt/3yqUPgM

Monday, 30 August 2021

Fermin Serna joins Databricks as Chief Security Officer

Fermín Serna has been appointed Chief Security Officer (CSO) at Databricks, where he will lead Databricks' network, platform and user security programs, and governance and compliance efforts.



from Cyber Security News https://ift.tt/3BtDw0D

Vulnerability in Bumble dating app reveals user's exact location

A security vulnerability in popular dating app Bumble enabled attackers to pinpoint other users’ precise location. Using fake Bumble profiles, security researcher Robert Heaton fashioned and executed a ‘trilateration’ attack that determined an imagined victim’s precise location.



from Cyber Security News https://ift.tt/3kGxvXH

Azure customers warned of critical Cosmos DB vulnerability

A critical security vulnerability in Microsoft’s Azure cloud database platform – Cosmos DB – could have allowed complete remote takeover of accounts, with admin rights to read, write and delete any information to a database instance.



from Cyber Security News https://ift.tt/2Y4LYVv

How executive order requirements will change the scope of business

President Biden’s executive order on improving the nation’s cybersecurity will impact device manufacturers—even those that don’t sell to the Federal government.



from Cyber Security News https://ift.tt/3yu8GDd

Sunday, 29 August 2021

A back-to-school plan for reaching the next generation of cybersecurity professionals

Current cybersecurity professionals and educators can change the narrative, but only if we take individual responsibility to engage with others and be visible members of our communities. Otherwise, the issue of a lack of diversity in the field won’t address itself.



from Cyber Security News https://ift.tt/3mFtEN3

Friday, 27 August 2021

Critical F5 bug could lead to wide range of security vulnerabilities

F5 has fixed more than a dozen high-severity security vulnerabilities in its networking device, with one of them being elevated to critical severity and CVSS score of 9.9 under specific conditions. All vulnerabilities are part of this month’s delivery of security updates, addressing almost 30 vulnerabilities for multiple F5 devices.

from Cyber Security News https://ift.tt/2WA2r3w

ShinyHunters threat group makes their return

ShinyHunters, a financially motivated threat group that emerged in May 2020, has made their return to push a trove of data allegedly stolen from U.S. telecommunications company AT&T, according to Digital Shadows, who could not independently verify the integrity of ShinyHunters’ claims. 

from Cyber Security News https://ift.tt/3jiF4nQ

Thursday, 26 August 2021

Risk assessment needs a redo

Risk assessments aren’t being done the right way – and that can lead to multiple problems for businesses. It’s time for a risk assessment redo.



from Cyber Security News https://ift.tt/3gBZ96I

Tech companies pledge billions to bolster cybersecurity investments

Some of the country’s leading technology companies have committed to investing billions of dollars to strengthen cybersecurity defenses and to train skilled workers, the White House announced, following President Joe Biden’s private meeting with top executives. Some of the country’s leading technology companies have committed to investing billions of dollars in strengthening cybersecurity defenses and in training skilled workers, the White House announced, following President Joe Biden’s private meeting with top executives.

from Cyber Security News https://ift.tt/3krhPHu

Taking stock of your disaster response plan during hurricane season

With hurricane season quickly approaching us, it gives us a chance to stop and think about how well prepared we are for disasters of all kinds. A solid, well-tested disaster recovery (DR) plan is the difference between your company surviving a natural disaster – or ceasing to exist the moment it happens.

from Cyber Security News https://ift.tt/3jhKcsg

5 minutes with Troy Gill - Putting together the perfect threat hunter team

How do you find, hire and create the perfect threat hunter team? Troy Gill, Manager of Security Research and Zix’s AppRiver Threat Research Team speaks to what it takes to be an exceptional threat hunter and what qualities they need to be successful.

from Cyber Security News https://ift.tt/3BeQbUZ

Jesse Kinser named CISO of Pathwire

Jesse Kinser has been named Chief Information Security Officer (CISO) at Pathwire. Kinser will report to Pathwire CEO Will Conway and will lead a team of security professionals in establishing a creative approach to grow the security posture of the organization.

from Cyber Security News https://ift.tt/3B9sQnw

Whack-a-mole is not remediation

Vulnerability remediation can feel like an ever-escalating game of whack-a-mole. Security teams need to work smarter, not harder, to stay ahead of the onslaught of new vulnerabilities. Effective prioritization is a key step to identify the big rocks that need to be fixed first.

from Cyber Security News https://ift.tt/3sMKKtr

Wednesday, 25 August 2021

US State Department suffers cyberattack

Though not officially confirmed, the U.S. State Department was reportedly a victim of a cyberattack. 

from Cyber Security News https://ift.tt/3sNHnCg

5 minutes with Heath Anderson - Building an effective governance, risk management and compliance program

Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program.

from Cyber Security News https://ift.tt/3Dh54I1

Four ways SMBs can protect themselves from cybersecurity threats

With a strong, well-executed cybersecurity strategy, using these four techniques, SMBs have a better chance at keeping the hackers and attackers out.



from Cyber Security News https://ift.tt/38a6mXh

Tuesday, 24 August 2021

ProxyShell flaws being actively exploited

According to the Cybersecurity and Infrastructure Security Agency (CISA), malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-3447, CVE-2021-3452, and CVE-2021-3120. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine. 

from Cyber Security News https://ift.tt/3sKBsxO

Hackers targeting outdated versions of Linux in the cloud

New research Linux Threat Report 2021 1H from Trend Micro found Linux operating systems are being targeted – with nearly 13 million detections from the first half of 2021 – as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape. 

from Cyber Security News https://ift.tt/3muU8ko

80% of global businesses expect a breach of customer records in the next year

According to a new survey, 80% of global organizations report they will experience a data breach that impacts customer data in the next 12 months.

from Cyber Security News https://ift.tt/3gvwVdP

Average time to fix severe vulnerabilities is 256 days

In this month's AppSec Stats Flash, the “Management of Companies and Enterprises” sector continued its run to become the most vulnerable sector. 

from Cyber Security News https://ift.tt/3kjXO5N

5 minutes with Doug Dooley - Full-stack application attacks

Doug Dooley, Chief Operating Officer at Data Theorem, discusses full-stack application attacks, and why organizations are vulnerable to this type of security breaches.

from Cyber Security News https://ift.tt/3zgvQxM

Monday, 23 August 2021

17.2million request-per-second DDoS attack successfully thwarted

Recently, Cloudflare detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than previously ever reported.

from Cyber Security News https://ift.tt/3kfQUyq

Why traditional SIEM is dead

Since its emergence in 2005, security information and event management (SIEM) has come to define enterprise-grade cybersecurity. SIEM dashboards are a mainstay of almost every business IT infrastructure security solution. However, does traditional SIEM still offer the robust protection it did back in the ’00s? Despite its reputation as a data security essential, traditional SIEM dashboards are leaving companies across the globe unknowingly vulnerable.

from Cyber Security News https://ift.tt/3mqUI2C

5 minutes with Nick McKenzie - The state of cybersecurity in financial services

Bugcrowd’s Chief Information & Security Officer Nick McKenzie, who oversees all aspects of the company’s information technology and security strategy, architecture, operations and governance, discusses the top cybersecurity challenges facing financial institutions.

from Cyber Security News https://ift.tt/2WcGSFQ

Zero-day vulnerability affects Cisco small business routers

A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.

from Cyber Security News https://ift.tt/3gJp78H

Attackers help victims pay their ransoms, even offer tips to prevent future attack

Beyond the ransom, victims must shoulder the heavy burden of business interruption, insurance policy consequences, mitigation, potential regulatory fines, third-party crossover harm and reputational damage. Every organization must prepare for this threat. The question is how best to do it. As an added measure, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves.  



from Cyber Security News https://ift.tt/3sH4Kha

Friday, 20 August 2021

Register for the 2021 Insider Threat Virtual Security Conference

The 2021 Insider Threat Virtual Conference, hosted jointly by the Defense Counterintelligence Security Agency and the Office of the Under Secretary of Defense for Intelligence and Security, will bring together security professionals and policy makers across U.S. government and industry to kick off the National Insider Threat Awareness Month (NITAM) campaign. The theme for this year's conference and campaign is Cultural Awareness and Insider Threat.

from Cyber Security News https://ift.tt/3kd1Igy

New book aims to transform communication between CISOs and corporate boards

"The Perfect Scorecard: Getting An 'A' in Cybersecurity From Your Board Of Directors" book offers best practices in closing the communications gap between security experts and the board members tasked with the organization's governance and oversight activities.



from Cyber Security News https://ift.tt/3j3Nu2o

Phishing could have cost businesses $354m in potential direct losses

As detailed in a new Area 1 Security report, threats ranging from ransomware, credential harvesters to difficult-to-discover but costly business email compromise targeted inboxes, could have resulted in over $354 million in direct losses had they been successful.



from Cyber Security News https://ift.tt/3j04GWi

Thursday, 19 August 2021

Confronting your fear of ransomware

With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing on one of the most common attack vectors: Active Directory.

from Cyber Security News https://ift.tt/3svkWSm

US Census Bureau cyberattack was unsuccessful

According to a watchdog report, U.S. Census Bureau computer servers were exploited in January 2020 during a cybersecurity attack, but hackers’ attempts to keep access to the system were unsuccessful.

from Cyber Security News https://ift.tt/3ssUB7y

72% of IT execs fear trickle-down of nation state tools and techniques will hurt their business

HP Wolf Security released the findings of a global survey of 1,100 IT Decision Makers (ITDMs), examining their concerns around rising Nation State attacks: 72% of respondents said they worry that nation-state tools, techniques, and procedures (TTP) could filter through to the dark net and be used to attack their business.

from Cyber Security News https://ift.tt/3sxwg08

Kubernetes runtime security is a growing concern

Kubernetes runtime security is a growing concern, according to NeuVector's 2021 EU Container Security Survey.



from Cyber Security News https://ift.tt/3z17qrX

5 minutes with Bill Wright - Why federal organizations are leaning into zero trust

With the new cybersecurity bill on the horizon, the federal government is taking a pivotal step in making resilient, remote cybersecurity measures more of a reality with a zero trust framework.  Here, Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.



from Cyber Security News https://ift.tt/3xZ17E7

Minimizing fraud while maximizing customer satisfaction

Today’s technological advancements have made it possible for merchants to strike an effective balance between minimizing fraud and maximizing customer satisfaction. The following three tips can help companies balance strong payment fraud prevention while providing an exceptional shopping experience.

from Cyber Security News https://ift.tt/3z49f7D

Wednesday, 18 August 2021

Security vulnerability in COVID-19 testing website allowed access to user information

According to news reports, California-based medical startup Total Testing Solutions has removed a website that allowed customers to access their test results after a customer found a vulnerability that allowed access to other people’s personal information.

from Cyber Security News https://ift.tt/3CRRB9D

BadAlloc vulnerability affects BlackBerry QNX Real Time Operating System

BlackBerry publicly disclosed that its QNX Real Time Operating System (RTOS) is affected by a BadAlloc vulnerability—CVE-2021-22156, with a CVSS score of 9. BadAlloc is a collection of 25 vulnerabilities affecting multiple RTOSs and supporting libraries of critical infrastructure organizations and other organizations developing, maintaining, supporting, or using affected QNX-based systems.

from Cyber Security News https://ift.tt/3AQsXEh

5 minutes with Rick McElroy - What CISOs should know about returning to the office

As the vaccine rollout continues and organizations are planning their hybrid work plans, they must ensure this return to a physical office, even if it’s partial, doesn’t open them up to cybersecurity threats. Here, Rick McElroy, Principal Cyber Security Strategist at VMware Security Business Unit, discusses what chief information security officers (CISOs) should keep in mind as we get closer to returning to physical offices. 

from Cyber Security News https://ift.tt/3yZPoXl

Looking at zero trust from an attacker’s perspective

Zero trust has become the latest buzzword in the security industry. It’s helpful to analyze the model from the attacker’s perspective to identify assumptions or actions that could provide a foothold for cybercriminals.



from Cyber Security News https://ift.tt/37T2VnB

Tuesday, 17 August 2021

More than a third of organizations have experienced a ransomware attack or breach

A recent International Data Corporation (IDC) survey found that more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months.

from Cyber Security News https://ift.tt/37SixYk

T-Mobile's data breach affects nearly all its US customers

Mobile telecommunication company T-Mobile has confirmed a data breach that reportedly affects nearly all of its U.S. customers. Hackers gained access to the company’s systems and hacked servers and databases containing the personally identifiable information of approximately 100 million customers.

from Cyber Security News https://ift.tt/3yUeOpd

Secret Service agents and task force partners awarded for work combating financial crimes

U.S. Secret Service agents and agency task force of partners have been named in multiple categories of awards as announced by the International Association of Financial Crimes Investigators. 

from Cyber Security News https://ift.tt/3sCb9Kx

5 minutes with Dr. Tommy Gardner - How to accelerate U.S. supply chain and security innovation

Dr. Tommy Gardner, Chief Technology Officer of HP Federal, believes a proactive mindset that bridges the digital divide, recruits top talent and implements the right policies is needed for the U.S. to achieve success and remain competitive on a global scale. Here, he discusses how a national strategy for critical technologies can shape the industries of the future as well as address national security and global challenges.

from Cyber Security News https://ift.tt/2UpU0H3

Elevating governance, risk and compliance throughout the software development life cycle with digital risk management

As a more encompassing and modern approach that extends not only governance, risk and compliance capabilities but also Integrated Risk Management and Enterprise Risk Management, digital risk management provides new tools and techniques risk professionals can interweave into operations and technology with unprecedented detail to strengthening the enterprise.

from Cyber Security News https://ift.tt/2XAkkj5

The Tokyo Olympics are a cybersecurity success story

Over the course of these games, it’s become increasingly clear that the organizers did indeed exercise preventative measures and that despite the challenges and limitations of holding an Olympics during a pandemic, the Tokyo Olympics have been a real success story from a cybersecurity perspective. Organizers of all large-scale, televised sporting events—and indeed just all organizations in general—should look to this year’s games as a model to emulate.

from Cyber Security News https://ift.tt/37PjQY5

Categorizing fraud types is the key to addressing risk

As businesses continue to navigate the current economic environment, it’s critical they also strategize for the future to position themselves for success once the environment improves. This means implementing robust fraud prevention strategies and tools that accurately separate fraud types to treat them correctly and address risk.

from Cyber Security News https://ift.tt/3APxUxq

Monday, 16 August 2021

CISA releases new cybersecurity workforce training guide

The Cybersecurity and Infrastructure Security Agency (CISA) released a new downloadable Cybersecurity Workforce Training Guide to assist future and current cybersecurity and information technology (IT) professionals chart a successful career path. 

from Cyber Security News https://ift.tt/3CLMN5D

National Cyber Security Alliance launches new cyber initiative

On a mission to empower a more secure, interconnected world, the National Cyber Security Alliance has partnered with cybersecurity organizations to launch a resource initiative aimed at raising diversity and closing the cybersecurity talent gap.



from Cyber Security News https://ift.tt/37OZgHe

Effective cyber risk mitigation requires a holistic mindset-shift

Companies need to create a digital ecosystem where cybersecurity is an expectation, not an ‘add-on,’ writes Tim Grieveson, Chief Information Security Officer at AVEVA.

from Cyber Security News https://ift.tt/3COV093

Machine identities: What they are and how to use automation to secure them

Security teams who aim to control secure access to networked applications and sensitive data often focus on the authentication of user credentials. Yet, the explosive growth of connected devices and machines in today’s enterprises exposes critical security vulnerabilities within machine-to-machine communications, where no human is involved. 

from Cyber Security News https://ift.tt/37JRoXC

4 steps to prepare for a ransomware attack: A C-suite guide

Organizations should ready a comprehensive ransomware preparedness strategy ahead of time that is adapted depending upon the severity of an attack. Here are four steps leadership should follow in developing a ransomware response strategy. 



from Cyber Security News https://ift.tt/3yRL5gF

Tuesday, 10 August 2021

Health leaders, it’s time to prioritize cybersecurity culture and employee awareness

Here are three steps healthcare leaders across the U.S. should be considering immediately to secure and fortify their organization: 

from Cyber Security News https://ift.tt/37vuCCI

Why cybersecurity infrastructure must be prioritized in light of the IRS leak

As infrastructure trends as one of the top national priorities, the IRS leak is an important reminder that we need to prioritize innovation and security in our digital infrastructures. 



from Cyber Security News https://ift.tt/3jLdlLC

Monday, 9 August 2021

Plan cybersecurity guidance: DOL enforcement warrants plan sponsor action

Benefit plan sponsors and plan fiduciaries should take note and act quickly – the Department of Labor (DOL) has issued a new cybersecurity guidance package with far-reaching effects and has already begun including this in its enforcement efforts.

from Cyber Security News https://ift.tt/3ixxvcl

Sunday, 8 August 2021

Firewalls, you’re fired

Even in progressive organizations, network-based security practices still linger and they can lead to a dangerously flawed cloud strategy.

from Cyber Security News https://ift.tt/2VD0Edx

The dangers within: What’s hiding in your network?

Sumo Logic research reports that 56% of companies with more than 10,000 employees receive more than 1,000 security alerts every day, and 93% say they cannot address all alerts the same day. Cybercriminals are also aware of alert fatigue and count on IT to ignore many security alerts.  So, what can you do? 



from Cyber Security News https://ift.tt/3CvwxVZ

Friday, 6 August 2021

New cyber-campaign targeting SE Asia critical infrastructure organizations

Four critical infrastructure organizations in a South East Asian country were targeted in an intelligence-gathering campaign that continued for several months, Symantec Threat Hunter Team has found. Among the organizations targeted were a water company, a power company, a communications company, and a defense organization, with evidence the attackers were interested in information about SCADA systems.

from Cyber Security News https://ift.tt/3jwK8Uq

Establishing a comprehensive cloud governance strategy

The latest Forrester Research report, Best Practices: Cloud Governance, gives cloud leaders a blueprint and best practices for cloud governance and accounts for stakeholders, workload targets, processes and tools.

from Cyber Security News https://ift.tt/3AjgUzi

Thursday, 5 August 2021

Passwords aren’t enough: Why businesses need to build more comprehensive security

In the past, passwords were the key to accessing systems and platforms, and they held much value as a security measure for businesses. But over time, the threat landscape has evolved, and weaknesses have been discovered in standard encryption methods that have diminished the password’s value.

from Cyber Security News https://ift.tt/2VvYjAQ

People continue to be the most critical factor in today’s cyberattacks

Proofpoint, Inc. unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk—vulnerability, attacks, and privilege—and how the extraordinary events of 2020 transformed the current threat landscape.

from Cyber Security News https://ift.tt/3jv3Akq

Initial access brokers have become a key figure in the RaaS business model

A new Digital Shadows report reveals Initial Access Brokers (IABs) have consolidated their role in the cybercriminal landscape and have now become a central figure in the Ransomware-as-a-Service business model. 

from Cyber Security News https://ift.tt/3fz2rqN

CYBER.ORG releases first national K-12 cybersecurity learning standards

CYBER.ORG announced the release of the nation’s first voluntary K-12 cybersecurity learning standards to be used to in schools and districts around the country.

from Cyber Security News https://ift.tt/3xnLk1j

Global cyber intrusion activity more than doubled in first half of 2021

The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber Investigations, Forensics & Response (CIFR) mid-year update from Accenture.

from Cyber Security News https://ift.tt/3jn9HHz

Wednesday, 4 August 2021

Overcoming security metrics challenges to measure what matters

While many organizations may realize they can’t entirely eliminate cyber risk, they still need to quantify their security efforts and set thresholds to show whether they’re trending positively or introducing more risk. The right metrics help to shed light on a company’s current security posture and, more importantly, where it might have gaps, shortcomings, or areas to prioritize for future improvement.

from Cyber Security News https://ift.tt/3CeLdsB

Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

Software as a service (SaaS) has taken over, and the average enterprise now uses hundreds of unique SaaS applications to accelerate their digital transformation and business velocity. However, while SaaS has fulfilled its growth-enabling potential, most organizations have lost their grip on its consumption and use. IT and security teams can no longer depend on network or endpoint controls to govern application access.



from Cyber Security News https://ift.tt/3rV3yGf

DevOps tools proliferation – A whole new world of vulnerabilities

With more than a hundred continuous integration and continuous deployment (CI/CD) tools to choose from and hundreds of plugins and services connected to those tools, no wonder security teams have a hard time grasping the amount of information and security requirements of these environments.

from Cyber Security News https://ift.tt/2TXJWoA

Malcom Harkins joins Epiphany Systems as CSO

Malcolm Harkins will be joining the Epiphany Systems executive team as Chief Security Officer. With deep cybersecurity domain experience, along with substantial operational understanding on the challenges CISOs face, Harkins will be infusing his expertise into expanding the company's footprint globally.

from Cyber Security News https://ift.tt/3CeL9Jn

Cybercriminals take down Italian vaccine-scheduling website

A cyberattack brought down a COVID-19 vaccine scheduling website for the Italian region of Lazio.

from Cyber Security News https://ift.tt/2VnQ1ev

Data breaches in the first half of 2021 exposed 18.8 billion records

There were 1,767 publicly reported breaches in the first six months of 2021, which exposed a total of 18.8 billion records, according to a new Risk Based Security 2021 Mid Year Data Breach QuickView Report.

 



from Cyber Security News https://ift.tt/3CirmbS

New research highlights significant AWS security blindspots

New Vectra report finds 100% of companies have experienced a security incident, but continue to expand their footprint as 64% report deploying new AWS services weekly.

from Cyber Security News https://ift.tt/3Cp4ub5

Emerging technology, evolving threats — Part I: Quantum computing

As technology grows and advances, potential cyber threats grow with it. While this notion is nothing new, the current speed of innovation makes it more important than ever to consider the implications these developments will have on our cybersecurity capabilities — especially with cybercriminals becoming more sophisticated and more adept at using emerging blind spots to their advantage.



from Cyber Security News https://ift.tt/3jjqMlQ

Tuesday, 3 August 2021

Three ways AI can fix the security industry’s skills shortage

The cybersecurity industry is in the midst of a skills crisis. With a cyberattack occurring approximately every 39 seconds, every business needs a well-trained staff to protect it. How can the void be filled? Artificial intelligence (AI). It’s one of the best hopes for the industry and has the potential to ease the pressures of the security skills shortage. 



from Cyber Security News https://ift.tt/37iAaAr

Reindeer leaked the sensitive data of more than 300,000 people

WizCase’s security team, led by Ata Hakçıl, found a significant breach affecting Reindeer, an American marketing company previously associated with Patrón Tequila, Tiffany & Co. and other brands. This breach exposed customers’ names, date of birth, email addresses, physical addresses, phone numbers and more. 

from Cyber Security News https://ift.tt/2WQcod7

44% of cloud privileges are misconfigured

An estimated 44% of cloud user privileges are misconfigured, leaving companies at risk, according to Varonis’s 2021 SaaS Risk Report.

from Cyber Security News https://ift.tt/3jfiXxu

Monday, 2 August 2021

NSA issues guidance on securing wireless devices in public settings

NSA released the Cybersecurity Information Sheet, “Securing Wireless Devices in Public Settings,” to help National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) teleworkers identify potential threats and minimize risks to their wireless devices and data.



from Cyber Security News https://ift.tt/3lp9aaP

How to protect against DDoS attacks in a distributed workforce model

It’s important that businesses understand that DDoS attacks aren’t just a blip on the radar; if not handled properly, they can be devastating to the long-term prospects of a business.

from Cyber Security News https://ift.tt/3Cd0bPG

Intelligence failures regularly occur at large US companies, resulting in physical threats

As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are occurring at an unsettling, record-high pace, according to a new study commissioned by the Ontic Center for Protective Intelligence.



from Cyber Security News https://ift.tt/2WNqbkD