Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better time. In the wake of the COVID-19 pandemic, security has become a top priorit…Read More For SOC teams, the analytics and automation hype is real
2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is that managed service providers (MSPs) saw tremendous growth both due to the …Read More 5 cybersecurity trends MSPs must address in 2021
The number of phishing attacks grew through 2020, fully doubling over the course of the year. Attacks peaked in October 2020, with a high of 225,304 new phishing sites appearing in that month alone, breaking all previous monthly records, according to A…Read More Successful BEC attacks become 56% more costly
All of the 30 popular mHealth apps that were tested are vulnerable to API attacks that can allow unauthorized access to full patient records including protected health information (PHI) and personally identifiable information (PII), Approov reveals. Th…Read More mHealth apps consistently expose PII and PHI through APIs
CEO Fraud / BEC is a type of targeted attack. It commonly involves a cyber criminally pretending to be your boss, then tricking or fooling you into sending the criminal highly sensitive information or initiating a wire transfer. Be highly suspicious…Read More CEO Fraud
2020 vulnerability disclosures are on track to exceed 2019 despite a sharp decrease of 19.2% observed earlier in the year, according to Risk Based Security. The team aggregated 23,269 vulnerabilities disclosed during 2020. Despite the initial disruptio…Read More 2020 vulnerability disclosures on track to exceed those from 2019
The COVID-19 pandemic continued to influence the cybercrime landscape in 2020, ESET reveals. Most notably, the new attack surface created by the shift to work from home brought further growth of Remote Desktop Protocol (RDP) attacks, albeit at a slower…Read More Researchers spot massive increase in RDP attack attempts
New Relic introduced New Relic Explorer, its reimagined Full-Stack Observability experience that delivers innovative new visualizations and capabilities to give engineers unprecedented visibility into their complete estate. With zero configuration requ…Read More New Relic Explorer gives engineers visibility into their complete estate
Everyone loves a tax refund – just don’t get so excited that you forget to check for telltale signs of a scam.Read More SMS tax scam unmasked: Bogus but believable – don’t fall for it!
WatchGuard has announced new capabilities that make WatchGuard Cloud the ideal security platform for managed service providers (MSPs). With a new single, centralised interface for delivering and managing network security, advanced threat detection, MFA…Read More WatchGuard Cloud: Delivering simplified security management for MSPs
Enzoic announced updates to Enzoic for Active Directory. The product is the only Active Directory plugin to check credentials at installation and password creation, and continuously monitor for and detect compromised credentials. The automated tool scr…Read More Enzoic for Active Directory updates help orgs prevent use of compromised credentials
Yugabyte announced the general availability of YugabyteDB 2.4 with hardened enterprise-grade security features, enhanced multi-region deployment capabilities, and performance improvements. The newest iteration of Yugabyte’s open source database improve…Read More YugabyteDB 2.4 provides default distributed SQL database for cloud-native apps in a multi-cloud world
Tripwire announced expanded multi-cloud capabilities for Tripwire Configuration Manager. Tripwire’s SaaS application now helps organizations effectively manage security across AWS (Amazon Web Services), Microsoft Azure and GCP (Google Cloud Platform), …Read More Tripwire expands multi-cloud capabilities for Tripwire Configuration Manager
Dynatrace announced enhancements to its Application Security Module, which the company released in December 2020. These include extending Dynatrace’s AI-powered risk assessment for applications running on Node.js, the runtime environment underpinning t…Read More Dynatrace extends its AI-powered risk assessment for applications running on Node.js
Entrust has announced a partnership with Netcetera to help financial institutions combat fraud associated with card-not-present (CNP) transactions. The combined solution allows issuing banks to perform real-time risk analysis of online transactions bas…Read More Entrust and Netcetera help financial institutions combat CNP transactions fraud
Qualys announced it is expanding Qualys VMDR (Vulnerability Management, Detection and Response) to mobile devices with support for Android and iOS/iPadOS delivering an end-to-end solution for mobile device security. Qualys’ all-in-one VMDR provid…Read More Qualys expands VMDR to mobile devices with support for Android and iOS/iPadOS
Accenture and VMware announced an expanded partnership and the launch of a dedicated business group that will help organizations adopt a ‘cloud first’ strategy — accelerating migration to the cloud, building modern apps more rapidly, and using the clou…Read More Accenture and VMWare launch business group to help orgs accelerate cloud migration
Like their global peers, CIOs of Canadian organizations faced the humanitarian catastrophe of the coronavirus pandemic as managers, technology providers, executives and people.
The post What Canadian CIOs need to know in 2021 first appeared on IT World…
Ordr announced that the company has expanded its partnership with Fortinet to deliver integrated solution to address the security challenges posed by widespread IoT and unmanaged devices. The integration of Ordr Systems Control Engine (SCE) with the Fo…Read More Ordr and Fortinet offer businesses visibility and security for all connected devices
Farsight Security launched Farsight DNSDB for IBM Security SOAR, which integrates Farsight DNSDB with IBM Security SOAR, formerly Resilient, the company’s security orchestration, automation, and response solution. Through this integration, Farsight DNS…Read More Farsight DNSDB for IBM Security SOAR accelerates incident response
CYE announced that it has raised a $100 million financing round, led by the global investment organization EQT, with participation from existing investor, 83North. The investment – EQT’s first in an Israeli company – follows five years of partner…Read More CYE raises $100M to continue growth in the global market
SecuriThings announced it has raised a $14 million Series A financing round. Aleph led the round, with participation from existing investors Firstime VC and angel investors. SecuriThings Horizon is the first IoTOps solution that enables organizations t…Read More SecuriThings raises $14M to expand functionality of its IoTOps platform, build out global sales
The Avaddon ransomware gang has fixed a bug that let victims recover their files without paying the ransom. The flaw came to light after a security researcher exploited it to create a decryptor. […]Read More Avaddon ransomware fixes flaw allowing free decryption
Semperis announced the appointment of Guido Grillenmeier as chief technologist. In this role, Germany-based Grillenmeier will apply his domain expertise to help scale the company’s rapid expansion, enabling more organizations across EMEA and around the…Read More Semperis appoints Guido Grillenmeier as chief technologist
In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human trust and compromise businesses of all sizes. What’s more, they often hide in plain sight, using both covert and overt tactics to cause disruption, steal money and data, and […]
The post Hacker Personas Explained: Know Your Enemy and Protect Your Business appeared first on Webroot Blog.Read More Hacker Personas Explained: Know Your Enemy and Protect Your Business
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it inefficient. The Spanish student Javier Yuste has released a free decryption tool for the Avaddon ransomware that can be used by the victims to recover their encrypted files for free. Yuste is a student at […]
The post Avaddon ransomware decryptor released, but operators quickly reacted appeared first on Security Affairs.Read More Avaddon ransomware decryptor released, but operators quickly reacted
When workers need to get things done in a dangerous locale, sometimes they have to be distant. This opens up plenty of cybersecurity hazards. We spoke with one expert about how to achieve that security.Read More Working at a safe distance, safely: Remote work at industrial sites brings extra cyber risk
Ransomware has begun to target data-heavy SaaS applications, open source, and Web and application frameworks.Read More Ransomware Attackers Set Their Sights on SaaS
Workshop title: Spectrum Sharing Technology for Next Generation Communications Call for Papers: Due to the ever-increasing demands on wireless communications and limited spectrum resources, spectrum sharing (SS) is being developed as a key solution to …Read More IEEE International Workshop on Spectrum Sharing Technology for Next Generation Communications
Global Cybercrime Market Revenue Surged to $1.7 Billion in 2020, Chainalysis ReportsDarknet markets just had their best year ever, led by Hydra, which accounted for 75% of the $1.7 billion in 2020 revenue such markets generated, Chainalysis reports. On…Read More Led by Hydra, Darknet Markets Logged Record Revenue
First Patch for ‘Zerologon’ Flaw Had Been Issued Last AugustMicrosoft has finally pushed out the second half of the software patch for the “Zerologon” privilege escalation vulnerability in the Windows Netlogon Remote Protocol more than five months afte…Read More Microsoft Issues Second Patch for Netlogon Vulnerability
Warner and Rubio Call for Designation of Leader of Four-Agency EffortCiting a lack of coordination and transparency, U.S. Sens. Mark Warner and Marco Rubio of the Intelligence Committee are urging the four federal agencies investigating the cyberattack…Read More Senators Demand More Coordination in SolarWinds Investigation
The FDIC has announced a series of steps intended to provide regulatory relief to financial institutions and facilitate recovery in areas of Illinois affected by severe storms, straight-line winds, and tornadoes.Read More FDIC Issues Guidance to Areas in Illinois Impacted by Severe Storms
Five federal regulatory agencies encourage financial institutions to work with customers affected by the federal government shutdown.Read More FDIC: Institutions Encouraged to Work with Borrowers Impacted by Shutdown
The FFIEC on Oct. 7 issued a joint statement concerning Microsoft’s discontinuation of support for its Windows XP operating system as of April 8, 2014.Read More FFIEC: Statement on End of Microsoft Support for Windows XP
The FDIC is clarifying its policy and supervisory approach related to facilitating payment processing services directly, or indirectly through a third party, for merchant customers engaged in higher-risk activities.Read More FDIC: Supervisory Approach to Payment Processing Relationships with Merchant Customers
Flavio Aggio: SolarWinds-Type Attacks Are Far More Than a ‘Patching Problem’Flavio Aggio, CISO of the World Health Organization, has had a long career across many sectors. He understands supply chain risk, and he sees the SolarWinds hack as “resumption…Read More World Health Organization CISO on Supply Chain Risk
SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.Read More Account Takeover: 2021 – and How to Prevent it
The latest edition of the ISMG Security Report features an analysis of the persistent threat of ransomware. Also featured: Sorting out breaches tied to Accellion’s File Transfer Appliance; an update on fraud trends in 2021.Read More Analysis: The Persistent Ransomware Threat
The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology.Read More Analysis: Emotet and Netwalker Takedowns
When he co-founded ThreatMark nearly six years ago, Michal Tresner saw it as a threat detection solution for online banking. Very quickly, he realized the future was in behavior profiling and fraud prevention. Tresner discusses the emergence of this sc…Read More Behavior Profiling & Fraud
Oldsmar Used Windows 7, Shared TeamViewer Password, Didn’t Have a FirewallThe Florida city that experienced a breach of its water treatment system used now-unsupported Windows 7 machines, shared the same password for remote access and had no firewall. …Read More Florida City’s Water Hack: Poor IT Security Laid Bare
Regulation Requires Russians to Disclose Their Cryptocurrency Transactions – Or ElseDid Russia pass a tough new cryptocurrency law to help authorities recruit or compel criminal hackers to assist the government? That’s the thesis of a new report, which…Read More Will Russian Cryptocurrency Law Drive Hacker Recruitment?
Big Step Back: Move Carries Steep Bureaucratic and Usability CostsAfter being hit by SolarWinds hackers, the Administrative Office of the U.S. Courts instructed the nation’s district courts to restrict the filing of sensitive information to hard copy o…Read More After SolarWinds Attack, Courts Revert to Paper for Secrets
Deputy National Security Adviser Anne Neuberger to Oversee InvestigationThe Biden administration has appointed Anne Neuberger, the deputy national security adviser for cyber and emerging technology, to coordinate the investigation into the cyberattack …Read More White House Taps Neuberger to Lead SolarWinds Probe
Emails pretending to confirm hefty orders from lingerie shop Ajour Lingerie and flower store Rose World are actually spreading the BazaLoader malware.Read More Pre-Valentine’s Day Malware Attack Mimics Flower, Lingerie Stores
Expect increase in ransomware and ‘triple extortion’ attacks, Cyber Threat Intelligence League says.Read More Growing Collaboration Among Criminal Groups Heightens Ransomware Threat for Healthcare Sector
Security service provider Herjavec Group has signed a definitive agreement with funds advised by the U.K. private equity firm Apax Partners to sell Apax a majority stake in the company.
The post Herjavec Group to be acquired by U.K.-based Apax Funds fi…
As a senior executive or CIO, how can you assure yourself that Artificial intelligence (AI) or Machine Learning (ML)-derived recommendations are reasonable and flow logically from the project work that has been performed?
The post Skeptical about the m…
I define responsible leadership combined with innovation operationalization as taking principles into useful practice and thus requiring prioritization for businesses. The challenge is learning from good examples to emulate.
The post What you need for …
Vulnerability disclosure started off slow but caught up by the end of the year, according to a new report.Read More Pandemic Initially Led to Fewer Disclosed Vulnerabilities, Data Suggests
An Internet Explorer 11 zero-day vulnerability used against security researchers, not yet fixed by Microsoft, today received a micropatch that prevents exploitation. […]Read More Internet Explorer 11 zero-day vulnerability gets unofficial micropatch
An Internet Explorer 11 zero-day vulnerability used against security researchers, not yet fixed by Microsoft, today received a micropatch that prevents exploitation. […]Read More Internet Explorer 11 zero-day vulnerability gets a free micropatch
Pricing starts at CA$1,869
The post Microsoft Surface Duo smartphone arrives in Canada first appeared on IT World Canada.
A worldwide shortage of semiconductors is hurting the sales of everything from smartphones to cars. Apple said the chip shortage affected sales of its latest iPhones. Automakers, who also rely on semiconductors in newer car models, expect to take a …Read More Podcast: Worldwide chip shortage affects the iPhone 12; Apple Car rumors
What’s the future of security operations? Dave Kennedy, Founder of Binary Defense, shares his insights on threat hunting, incident response, and more with Microsoft.Read More A playbook for modernizing security operations
In November last year, we lost our much-loved family dog. We were all so devasted. Harley was a very handsome black and white Cavoodle who died from a paralysis tick bite after giving us 12 years of love. After lots of tears and weeks of sadness, we have decided it’s time to start our search […]
The post Here’s What I’m Doing to Avoid Being Caught Up in A Puppy Scam appeared first on McAfee Blogs.Read More Here’s What I’m Doing to Avoid Being Caught Up in A Puppy Scam
The Netlogon remote code execution vulnerability, disclosed last August, has been weaponized by APT groups.Read More Microsoft Launches Phase 2 Mitigation for Zerologon Flaw
Microsoft has released an emergency KB5001028 out-of-band update to fix a bug causing Windows 10 to crash when connecting to WPA3 Wi-Fi networks. […]Read More Microsoft releases emergency fix for Windows 10 WiFi crashes
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile security firm Lookout have provided details about two recently discovered Android spyware families, dubbed Hornbill and SunBird, used by an APT group named Confucius. Confucius is a pro-India APT group that has been active since […]
The post Experts spotted two Android spyware used by Indian APT Confucius appeared first on Security Affairs.Read More Experts spotted two Android spyware used by Indian APT Confucius
Microsoft says that the number of monthly web shell attacks has almost doubled since last year, with an average of 140,000 such malicious tools being found on compromised servers every month. […]Read More Microsoft warns of an increasing number of web shell attacks
Indian government slams micro-blogging company for “double standards” over violence at Red Fort and Capitol HillRead More India Calls Out Twitter for Differential Treatment
Video games are poised for a revolution, but benefits will come to fruition only if the industry can guarantee consistent performance and availability.Read More Game Over: Stopping DDoS Attacks Before They Start
Singtel and the QIMR Berghofer Medical Research Institute are the latest companies to disclose data breaches caused by a vulnerability in the Accellion FTA secure file transfer software. […]Read More Singtel, QIMR Berghofer report Accellion-related data breaches
Developers must stop saving secrets in code. One way to avoid that is to use HashiCorp’s Vault. Jack Wallen shows you how to install this tool and take your first steps in its usage.Read More How to use the Vault command line tool to store your code secrets
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.Read More 7 Things We Know So Far About the SolarWinds Attacks
Apax Partners signs agreement to acquire majority stake in Herjavec GroupRead More Apax to Acquire Herjavec Group
Critical and high severity vulnerabilities in the Responsive Menu WordPress plugin exposed over 100,000 sites to takeover attacks as discovered by Wordfence. […]Read More Buggy WordPress plugin exposes 100K sites to takeover attacks
Illinois has the highest concentration of cybercrime victims in the United StatesRead More Illinois Is State Hit Hardest by Cybercrime
A year ago, we reported the steady increase in the use of web shells in attacks worldwide. The latest Microsoft 365 Defender data shows that this trend not only continued, it accelerated. Read our investigation into the escalating prevalence of web shells.Read More Web shell attacks continue to rise
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]Read More How IT Will Prevail in the 2021 Cyber-Demic
IBM is awarding grants totalling $3 million in value to help six public school districts in the United States prepare for and respond to cyberattacks. The grants are for U.S. public schools only.
The post IBM hands out $3M in cybersecurity funding fo…
With the pandemic as a backdrop, cybercriminals have recognized an unprecedented opportunity to steer billions of dollars in unemployment claims into the own accounts.Read More Unemployment Fraud: As If Being Out of Work Wasn’t Bad Enough
Two new Android surveillanceware families have been found to target military, nuclear, and election entities in Pakistan and Kashmir as part of a pro-India, state-sponsored hacking campaign.
Dubbed Hornbill and Sunbird, the malware impersonates legitim…
Apple seems focused on building Safari to become the world’s leading privacy-focused web browser, continuing development of under-the-hood enhancements to protect private lives.Better privacy by proxy
Beginning with (currently in beta) iOS 14.5, App…
Launchers are one of Android’s most powerful and unusual features — and yet, they’re also one of the platform’s least understood elements.Ask an average Android phone owner what launcher they’re using, and odds are, you’ll get little more than a qui…Read More Android launchers are officially exciting again
The attackers ported victims’ cell phone lines and then defeated 2FA to access accounts and apps.Read More Celeb SIM-Swap Crime Ring Stole $100M from U.S. Victims
What can municipalities do to better protect their water supply systems?
The post Protecting the water supply – hacker edition appeared first on WeLiveSecurity
The money being wire transferred by business email compromise victims is on the rise, as cybersecurity criminals evolve their tactics.Read More How Email Attacks are Evolving in 2021
I’m a big fan of digital assistants and have an Amazon Echo device in almost every room. They turn on faucets, turn off lights, answer questions (though often not accurately), and I can even have conversations with them. But when it comes to applyin…Read More iGenius’ Crystal: An enterprise-class digital assistant at last?
Research from Zscaler ThreatLabZ shows attackers using spam emails and legitimate-looking links to gaming software to serve up Epsilon ransomware, the XMRrig cryptominer and various data and token stealers.Read More Various Malware Lurks in Discord App to Target Gamers
Intel addressed 57 vulnerabilities during this month’s Patch Tuesday, including high severity ones impacting Intel Graphics Drivers. […]Read More Intel fixes vulnerabilities in Windows, Linux graphics drivers
Cloud-native deployments tend to be small, interchangeable, and easier to protect, but their software supply chains require closer attention.Read More Cloud-Native Apps Make Software Supply Chain Security More Important Than Ever
Forescout researchers have discovered nine vulnerabilities affecting nine different TCP/IP stacks widely used in IoT and OT devices. The vulnerabilities are due to weak Initial Sequence Number (ISN) generation, and could be exploited to mount limited D…Read More Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack
Public invited to contribute to draft rules around data protection, security and inclusivityRead More UK Govt Reveals Plans to Build Trust in Use of Digital Identities
Twingate is a developer of zero-trust access (ZTA) technology, which delivers remote access in a more secure fashion than virtual private networks (VPNs). It delivers its technology as a service. As a fully managed SaaS product with multiple product ti…Read More On the Radar: Twingate Offers an Easy-to-Use Zero-Trust Access Service
Microsoft has fixed a privilege escalation vulnerability in Microsoft Defender Antivirus (formerly Windows Defender) that could allow attackers to gain admin rights on unpatched Windows systems. […]Read More 12-year-old Windows Defender bug gives hackers admin rights
Microsoft on Tuesday issued fixes for 56 flaws, including a critical vulnerability that’s known to be actively exploited in the wild.
In all, 11 are listed as Critical, 43 are listed as Important, and two are listed as Moderate in severity — six of whi…
British police have arrested eight men in connection with a series of SIM-swapping attacks which saw criminals hijack the social media accounts of well-known figures and their families.
Read more in my article on the Tripwire State of Security blog.Read More Eight men arrested following celebrity SIM-swapping attacks
Latest episode (includes 111,848 “free” cups of coffee) – listen now!Read More S3 Ep19: Chrome zero-day, coffee hacking and Perl.com stolen [Podcast]
British police have arrested eight men in connection with a series of SIM-swapping attacks which saw criminals hijack the social media accounts of well-known figures and their families. The UK’s National Crime Agency (NCA) says it made arrests in…Read More Eight men arrested following celebrity SIM-swapping attacks
NCSC reveals high uptake of 2021 CyberFirst Girls CompetitionRead More #WomenInScience: High Number of Girls Sign Up for Codebreaking Contest
The risk of being targeted with email-based phishing and malware attacks is not evenly spread across geographic and demographic boundaries, Google and Stanford University researchers have discovered. Australian users are, for example, at a higher risk …Read More Which users are at higher risk of email-based phishing and malware?
New studies illuminate debate on social media echo chambersRead More Political Bias and Impulsive Behavior Open Door to Misinformation
The two malware families have sophisticated capabilities to exfiltrate SMS messages, WhatsApp messaging content and geolocation.Read More Military, Nuclear Entities Under Target By Novel Android Malware
As part of an effort to help users apply its well-known Cybersecurity Framework (CSF) as broadly and effectively as possible, the National Institute of Standards and Technology (NIST) has released finalized cybersecurity guidance for positioning, navig…Read More NIST Finalizes Cybersecurity Guidance for Positioning, Navigation and Timing Systems