Category Archives: Don’t miss

Quantum computing: The new moonshot in the cyber space race

In 2016, China launched Micius, the world’s first quantum communications enabled satellite. For some, that launch eerily echoed the launch of the Soviet Union’s Sputnik satellite in 1957, which caught the United States off guard and spurred a decades-long contest to regain and maintain global technological and military supremacy. The parallel wasn’t lost on the Chinese. Jian-Wei Pan, the lead researcher on the Micius project, hailed the start of “a worldwide quantum space race.” Indeed, … More

The post Quantum computing: The new moonshot in the cyber space race appeared first on Help Net Security.

Facebook phishing surges, Microsoft still most impersonated brand

Vade Secure published the results of its Phishers’ Favorites report for Q2 2019. According to the report, which ranks the 25 most impersonated brands in phishing attacks, Microsoft was by far the top target for the fifth straight quarter. There was also a significant uptick in Facebook phishing, as the social media giant moved up to the third spot on the list as a result of a staggering 176 percent YoY growth in phishing URLs. … More

The post Facebook phishing surges, Microsoft still most impersonated brand appeared first on Help Net Security.

Should you block newly registered domains? Researchers say yes

7 out of 10 newly registered domains (NDRs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access to them with URL filtering. “While this may be deemed a bit aggressive by some due to potential false-positives, the risk from threats via NRDs is much greater. At the bare minimum, if access to NRDs are allowed, then alerts should be set up for additional visibility,” … More

The post Should you block newly registered domains? Researchers say yes appeared first on Help Net Security.

New infosec products of the week: August 23, 2019

YubiKey 5Ci: First security key designed with both USB-C and Lightning connectors This unique dual-connector functionality makes the YubiKey 5Ci the perfect solution for consumers or enterprises looking for strong hardware-backed authentication across iOS, Android, MacOS, or Windows devices. The YubiKey 5Ci is available at a retail price of $70 USD. 400G Triton cyber warfare simulation tool can replicate any attack Mimicking attacks from all over the world, Triton 400 utilizes a comprehensive understanding of … More

The post New infosec products of the week: August 23, 2019 appeared first on Help Net Security.

Cybersecurity salary, skills, and stress survey

Exabeam is conducting an annual survey to understand skills, compensation trends and workplace trends among SOC and security analysts. All participants will receive the results of the survey. Questions include certifications, security responsibilities, compensation ranges, and perceptions around new tech like machine learning and AI. Completing the survey takes 7 minutes (less if you are a really fast reader). The results of the survey are anonymous. Prizes for participants They will randomly select 10 winners … More

The post Cybersecurity salary, skills, and stress survey appeared first on Help Net Security.

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches

Cisco has fixed over 30 vulnerabilities in various solutions, including Cisco UCS Director, Cisco UCS Director Express for Big Data, Cisco IMC Supervisor, and the Cisco 220 Series smart switches. Updates by product Users of Cisco UCS Director and Cisco UCS Director Express for Big Data are advised to upgrade to versions 6.7.3.0 and 3.7.3.0, respectively, as they fix, among other things: CVE-2019-1938, an API authentication bypass vulnerability that could be triggered by a specially … More

The post Cisco warns about public exploit code for critical flaws in its 220 Series smart switches appeared first on Help Net Security.

Unlocking the future of blockchain innovation with privacy-preserving technologies

The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision of a new financial system underscored by cryptography and trust in code. Throughout the past decade, iterations of this technological infrastructure have gradually built out a diverse industry ecosystem, allowing for use cases that extend beyond cryptocurrencies and peer-to-peer transactions. From smart contracts to asset … More

The post Unlocking the future of blockchain innovation with privacy-preserving technologies appeared first on Help Net Security.

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses

The dream of an AI-influenced world is finally here. After decades of writing about it, AI has reached a point where it’s ingrained into our daily lives. From the days of SmarterChild – for many, the AIM messenger bot was the first foray into AI – to now the ubiquitous presence of the AI-enabled digital assistant such as Siri, the vision of artificial intelligence transforming
 from sci-fi to reality has come to fruition. But instead … More

The post From SmarterChild to Siri: Why AI is the competitive advantage securing businesses appeared first on Help Net Security.

Identifying vulnerable IoT devices by the companion app they use

For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a slew of security vulnerabilities that could turn them into a nightmare. Until legislation catches up and manufacturers start caring about implementing security from the start, security researchers are our only hope when it comes to improving IoT security. Consequently, every approach that makes the process of identifying as … More

The post Identifying vulnerable IoT devices by the companion app they use appeared first on Help Net Security.

Identifying evasive threats hiding inside the network

There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting savvier. They are better at blending in without tripping any alerts. They skip over tools and techniques that trigger standard security systems. How can a company tell them apart from the noise created by legitimate logins to the network that day? The answer lies in context. It … More

The post Identifying evasive threats hiding inside the network appeared first on Help Net Security.

New infosec products of the week: May 3, 2019

Trustwave unveils new database security scanning and testing software Trustwave unveiled Trustwave DbProtect, new database security scanning and testing software that helps organizations better protect critical data assets hosted on-site or by major cloud service providers from advanced threats, configuration errors, access control issues, unauthorized privilege escalation, missing patches and more. NS1 Flamethrower: Lightweight, open source DNS performance testing tool NS1 released Flamethrower, a lightweight, configurable open source tool for functional testing, benchmarking, and stress … More

The post New infosec products of the week: May 3, 2019 appeared first on Help Net Security.

Mozilla will block Firefox add-ons that contain obfuscated code

Mozilla has announced that, starting from June 10, Firefox add-ons containing obfuscated code will no longer be allowed on its Add-ons portal and will be blocked. “We will continue to allow minified, concatenated, or otherwise machine-generated code as long as the source code is included,” Caitlin Neiman, Add-ons Community Manager at Mozilla, explained. “If your extension is using obfuscated code, it is essential to submit a new version by June 10th that removes it to … More

The post Mozilla will block Firefox add-ons that contain obfuscated code appeared first on Help Net Security.

Google offers auto-delete option for location, web tracking history

Google has added a control option to users’ accounts that will allow them to instruct the company to auto-delete their location history, browsing and search data once a certain length of time has passed. “Choose a time limit for how long you want your activity data to be saved—3 or 18 months—and any data older than that will be automatically deleted from your account on an ongoing basis,” the company explained. The new control option … More

The post Google offers auto-delete option for location, web tracking history appeared first on Help Net Security.

Cybercriminals thriving on companies overlooking fundamental security requirements

IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% report they have company guidelines in place around password complexity, and 92% believe their current password protection measures and guidelines provide adequate protection for their business, the results suggest there is still a lot of work to be done. OneLogin surveyed 300 IT decision makers across the U.S. … More

The post Cybercriminals thriving on companies overlooking fundamental security requirements appeared first on Help Net Security.

50,000 companies running SAP installations open to attack via publicly released exploits

Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has warned. A successful attack would allow remote, unauthenticated attackers to: Perform critical business transaction on SAP systems (modify purchase orders, bypassing automatic business controls, etc.) Compromise and extract critical business information Delete all business application data Delete traces of their actions Shut the system down. “This risk to … More

The post 50,000 companies running SAP installations open to attack via publicly released exploits appeared first on Help Net Security.

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks. The Oracle WebLogic attacks CVE-2019-2725 is a deserialization remote command execution vulnerability that affects all Oracle WebLogic versions that have two specific components enabled. It was publicly revealed on April 21 and Oracle published an out-of-band security fix for it on April 25. … More

The post Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws appeared first on Help Net Security.

Microsoft 365 updates for better enterprise data privacy

Microsoft has announced new privacy controls for Microsoft 365 enterprise customers: they will be able to revoke access to encrypted emails, block sensitive information from being shared or leaked when using Teams, use new data investigation capabilities, and improve compliance. These new features come at the same time as new steps to increase customers’ transparency and control over their data. “We’ve realized that customers want a simpler experience – information should be easier to find, … More

The post Microsoft 365 updates for better enterprise data privacy appeared first on Help Net Security.

Open source security: The risk issue is unpatched software, not open source use

Many of the trends in open source use that have presented risk management challenges to organizations in previous years persist today. However, new data also suggest that an inflection point has been reached, with many organizations improving their ability to manage open source risk, possibly due to heightened awareness and the maturation of commercial software composition analysis solutions. The 2019 Open Source Security and Risk Analysis (OSSRA) report, produced by the Synopsys Cybersecurity Research Center … More

The post Open source security: The risk issue is unpatched software, not open source use appeared first on Help Net Security.

Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical cyber attacks, supply chain attacks provide two major advantages to attackers. Firstly, a single supply chain attack can target multiple companies at once (since multiple companies use the same code dependencies and third-party scripts); as such, the potential return of investment of the attack is higher. Secondly, and unlike common cyber … More

The post Supply chain attacks: Mitigation and protection appeared first on Help Net Security.

Cybercriminals continue to target intellectual property, putting brand reputation at risk

Despite improvements in combating cybercrime and threats, IT security professionals are still struggling to fully secure their organization and protect against breaches with 61 percent claiming to have experienced a data breach at their current employer, according to McAfee. Adding to this challenge, data breaches are becoming more serious as cybercriminals continue to target intellectual property putting the reputation of the company brand at risk and increasing financial liability. The McAfee’s Grand Theft Data II … More

The post Cybercriminals continue to target intellectual property, putting brand reputation at risk appeared first on Help Net Security.

Consumers increasingly deploying biometrics as PINs and passwords continue to fail

The UK is ready to fight fraud with biometrics, according to new research revealed by Nuance on World Password Day. The new research carried out by OnePoll asked 1,000 adults aged 18+ in the UK how they feel about traditional passwords and the potential of new technologies designed to safeguard their data and reduce fraud. According to the poll, consumer comfort over the use of biometrics – which authenticates individuals by their physical and behavioural … More

The post Consumers increasingly deploying biometrics as PINs and passwords continue to fail appeared first on Help Net Security.

Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

Southwest Research Institute has developed a cybersecurity system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for positioning, navigation and timing. “This is a legal way for us to improve the cyber resilience of autonomous vehicles by demonstrating a transmission of spoofed or manipulated GPS signals to allow for analysis of system responses,” said Victor Murray, head of SwRI’s Cyber Physical Systems Group in the Intelligent Systems Division. GPS … More

The post Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS appeared first on Help Net Security.

How much does the average employee know about data privacy?

With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the minds of many privacy professionals, new research from MediaPRO shows more work is needed to train U.S. employees of this first-of-its-kind privacy regulation. MediaPRO’s 2019 Eye on Privacy Report reveals 46 percent of U.S. employees have never heard of CCPA, which sets specific requirements for the management of consumer data for companies handling the personal data of California residents. Passed … More

The post How much does the average employee know about data privacy? appeared first on Help Net Security.

Which cyber threats should financial institutions be on the lookout for?

Banks and financial services organizations were the targets of 25.7 percent of all malware attacks last year, more than any other industry, IntSigths revealed in their latest report. These include: Trojans (banking, info-stealing, downloaders) ATM malware (since the start of 2018, more than 20 ATM malware families have hit banks around the globe) Ransomware (Mexican financial institutions were particularly targeted) Mobile banking malware – both fake banking apps and banking Trojans. (According to the company, … More

The post Which cyber threats should financial institutions be on the lookout for? appeared first on Help Net Security.

Making the most of threat intelligence with threat intelligence gateways

Even though many security professionals are still dissatisfied with threat intelligence accuracy and quality, its use as a resource for network defense is growing. According to the 2019 SANS Cyber Threat Intelligence (CTI) Survey, the percentage of organizations that either produce or consume CTI has risen from 60 to 72 percent. As it gets more broadly adopted and as more organizations seek to operationalize their TI more effectively and efficiently, they are slowly starting to … More

The post Making the most of threat intelligence with threat intelligence gateways appeared first on Help Net Security.

Hacking our way into cybersecurity for medical devices

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has become more complicated and, consequently, the institutions’ attack surface has expanded. When did these devices get smart? A brief timeline shows the FDA didn’t start regulating the connectivity of devices until 2005, but medical devices started to leverage software back in the ‘80s. Clinical capabilities have benefited greatly from … More

The post Hacking our way into cybersecurity for medical devices appeared first on Help Net Security.

SEC demands better disclosure for cybersecurity incidents and threats

As companies increasingly rely on networked systems and on the Internet, cybersecurity threats have grown. Companies that fall victim to a successful cyberattack incur substantial costs for remediation, including increased costs for cyber protection, lost revenues, legal costs and more. All of these costs can impact the riskiness and value of a public company’s stock. Given the frequency, magnitude and cost of cybersecurity incidents, the Securities and Exchange Commission (SEC) has stated that it is … More

The post SEC demands better disclosure for cybersecurity incidents and threats appeared first on Help Net Security.

Attackers breached Docker Hub, grabbed keys and tokens

Docker, the company behing the popular virtualization tool bearing the same name, has announced late on Friday that it has suffered a security breach. There was no official public announcement. Instead, the company sent an alert to potentially affected customers and urged them to change their passwords check their security logs. What happened? “On Thursday, April 25th, 2019, we discovered unauthorized access to a single Hub database storing a subset of non-financial user data,” the … More

The post Attackers breached Docker Hub, grabbed keys and tokens appeared first on Help Net Security.

Slack warns investors it might be targeted by organized crime, nation-state hackers

Slack Technologies, the company whose cloud-based collaboration tools and services are used by companies worldwide, has warned potential investors that the company faces threats from a wide variety of sources, including “sophisticated organized crime, nation-state, and nation-state supported actors.” Acknowledging the risk In the documents it was required to file with the Securities and Exchange Commission (SEC) due to its going public, the company has spelled out the many cyber threats to its existence, functioning … More

The post Slack warns investors it might be targeted by organized crime, nation-state hackers appeared first on Help Net Security.

GE trade secret theft case demonstrates need for document behavior monitoring

A former GE engineer and a Chinese national have been formally charged with 14 counts of economic espionage by the U.S. Department of Justice after stealing trade secrets from GE. The indictment describes the calculated theft of sensitive documents related to the proprietary design of GE’s gas and steam turbines. According to the unsealed indictment, the engineer at GE Power & Water in Schenectady, New York “exploited his access to GE’s files by stealing multiple … More

The post GE trade secret theft case demonstrates need for document behavior monitoring appeared first on Help Net Security.

The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage

A perfect storm of regulation, increased threats and technological complexity is overwhelming cybersecurity decision makers, reveals new research from Symantec. Cybersecurity suffers from information overload Four in five (82 percent) security leaders across France, Germany and the UK report feeling burned out, whilst just under two-thirds (63 percent) think about leaving the industry or quitting their job (64 percent). Surveying 3,045 cybersecurity decision makers across the across France, Germany and the UK, the research – … More

The post The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage appeared first on Help Net Security.

Most SMBs would pay a ransom in order to recover stolen data

More than half (55 percent) of executives at SMBs said they would pay hackers in order to recover their stolen data in ransomware attacks, according to the second quarterly AppRiver Cyberthreat Index for Business Survey. That number jumps to 74 percent among larger SMBs that employ 150-250 employees, with nearly 4 in 10 (39 percent) going as far as saying they “definitely would pay ransom at almost any price” to prevent their data from being … More

The post Most SMBs would pay a ransom in order to recover stolen data appeared first on Help Net Security.

Best practices when implementing SD-WAN

Telecoms is an overall complex business – delivering network circuits and optimizing connections – but SD-WAN has its own very specific set of obstacles. SD-WAN involves many components that contribute to overall internet network performance such as national policy, security, hardware delivery, installation and cloud applications. Each element can significantly affect a successful SD-WAN transformation. Below, we explore the most common questions that spring up when implementing SD-WAN, and how to make the process as … More

The post Best practices when implementing SD-WAN appeared first on Help Net Security.

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Mongo Express is a lightweight web-based administrative interface deployed to manage MongoDB databases interactively. It is authored using Node.js, Express and Bootstrap packages. This case study highlights the deployment of Mongo Express admin panels without authentication on the Internet and the various measures to prevent the exposure. The authentication scheme Mongo Express comes with a config-default.js file. It primarily supports basic authentication, which encompasses the base64 encoded payload of a username:password combination. This means that, … More

The post Too fast, too insecure: Securing Mongo Express web administrative interfaces appeared first on Help Net Security.

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to Trustwave. The 2019 Trustwave Global Security Report is based on the analysis of billions of logged security and compromise events worldwide, hundreds of hands-on data breach and forensic investigations, manual penetration tests, network vulnerability scans and internal research. Asia … More

The post Cybercriminals are becoming more methodical and adaptive appeared first on Help Net Security.

Researchers flag new Oracle WebLogic zero-day RCE flaw

Attackers looking to compromise Oracle WebLogic servers for their own needs have a new zero-day RCE flaw at their disposal. “Oracle WebLogic wls9_async and wls-wsat components trigger deserialization remote command execution vulnerability. This vulnerability affects all Weblogic versions (including the latest version) that have the wls9_async_response.war and wls-wsat.war components enabled,” KnownSec 404 researchers warn. The flaw has been reported to Oracle, but is yet to receive a CVE number. It can be currently tracked under … More

The post Researchers flag new Oracle WebLogic zero-day RCE flaw appeared first on Help Net Security.

Another European manufacturer crippled by ransomware

Aebi Schmidt, a Switzerland-based manufacturer and provider of municipal and agriculture machinery, has apparently been hit by ransomware. What happened? “Due to an IT system failure, the Aebi Schmidt Group can temporarily neither receive nor send emails,” the company announced on Thursday. “The IT system failure is due to an attempt by third parties to infiltrate malware into our systems. More and more companies worldwide are being affected by such attacks.” At the moment, only … More

The post Another European manufacturer crippled by ransomware appeared first on Help Net Security.

Qualcomm chips leak crypto data from secure execution environment

A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, NCC Group researchers have found. About CVE-2018-11976 The security of Trusted Execution Environments (TEEs) such as ARM TrustZone, which are widely used in both mobile and embedded devices and often share the same computational hardware as untrusted code, has been previously probed but not extensively. NCC Group researchers decided to specifically test … More

The post Qualcomm chips leak crypto data from secure execution environment appeared first on Help Net Security.

The latest DDoS attacks are mostly multi-vector and morph over time

DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands, according to Neustar. Also, when comparing Q1 2019 vs. Q1 2018, the company has registered a 200 percent increase of attacks on directly provisioned customers. Report findings The largest attack size observed by them in Q1 2019 was 587 Gbps in volume, and the longest duration for a single attack was nearly a day and … More

The post The latest DDoS attacks are mostly multi-vector and morph over time appeared first on Help Net Security.

You can’t fix what you can’t see: A new way of looking at network performance

Network performance, or the service quality of a business’ network, is critical to running a successful enterprise. Imagine the cost to an organization when the corporate network or the e-commerce site is down or experiencing unacceptable latency. Customers get frustrated, prospects immediately turn away from purchases, and internally, IT and network admins are in a panic to get systems up and running again, fueled by C-suite pressure. Defining today’s network performance To optimize network performance, … More

The post You can’t fix what you can’t see: A new way of looking at network performance appeared first on Help Net Security.

Employers should develop cybersecurity protocols and invest more in employee training programs

Organizations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The ObserveIT global survey of 600 IT leaders across various industries found that employers should develop clear cybersecurity protocols and invest more in employee training programs and monitoring tools to verify safe user activity. Since 2016, the average number of incidents involving employee or contractor negligence has increased by 26 percent, and by 53 … More

The post Employers should develop cybersecurity protocols and invest more in employee training programs appeared first on Help Net Security.

Researchers develop new tool for safety-critical software testing

We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the National Institute of Standards and Technology (NIST) and their collaborators has developed new tools to make this type of safety-critical software even safer. Augmenting an existing software toolkit, the research team’s new creation can strengthen the safety tests that software companies conduct on the programs that help control … More

The post Researchers develop new tool for safety-critical software testing appeared first on Help Net Security.

Which employees receive the most highly targeted email-borne threats?

Workers in R&D/Engineering are the most heavily targeted group of employees within organizations, a new Proofpoint report says, and lower-level employees are at a higher risk of email-borne cyber threats than higher-level management roles and executives. Who is being attacked? Proofpoint has gathered and analyzed a three-months worth (October-December 2018) of email attacks on Fortune Global 500 companies and has discovered that people at the bottom of the corporate ladder were more at risk of … More

The post Which employees receive the most highly targeted email-borne threats? appeared first on Help Net Security.

Latest numbers show why BEC/EAC scams are here to stay

Extortion has become the second most often reported type of cybercrime, but BEC/EAC scams still reign supreme when it comes to monetary loss (or criminals’ earnings), the latest IC3 Internet Crime Report has revealed. BEC/AEC scams are the most lucrative In 2017, FBI’s Internet Crime Complaint Center (IC3) reported that the BEC/EAC complaints they dealt with (15,609) came with an approximate $676 million loss. In 2018, the BEC/EAC complaints were 20,373, but the losses reached … More

The post Latest numbers show why BEC/EAC scams are here to stay appeared first on Help Net Security.

Nearly half of firms suffer data breaches at hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire wanted to know how seriously firms take the risks associated with third-party vendors, and their vendors’ vendors. Earlier this year, eSentire commissioned Spiceworks to survey 600 IT and security decision-makers about their top concerns around their supply chain and the policies or procedures used … More

The post Nearly half of firms suffer data breaches at hands of vendors appeared first on Help Net Security.

What you can expect at HITBSecConf2019 Amsterdam

Taking place across 5 days from the 6th till the 10th of May 2019, HITBSecConf2019 Amsterdam is one of the most prestigious cybersecurity events in Europe. With the event celebrating a decade of excellence, we took this opportunity to sit down with Dhillon Andrew Kannabhiran, the Founder and CEO of Hack in The Box, to talk about this year’s conference. This is the 10th year of HITB Security Conference in Amsterdam! What makes this edition … More

The post What you can expect at HITBSecConf2019 Amsterdam appeared first on Help Net Security.

A casual approach to workplace communications presents major security risks

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and U.K., examined the growth of new collaboration tools and platforms entering the workplace. The findings highlight a worryingly casual attitude to workplace communications that pose a threat to businesses. “The way we work is changing,” … More

The post A casual approach to workplace communications presents major security risks appeared first on Help Net Security.

Are your passwords among the 100,000 most breached ones?

Year after year, the list of most often used passwords changes but a little: the latest one, compiled by infosec researcher Troy Hunt and published by the UK National Cyber Security Centre (NCSC), puts “123456”, “123456789”, “qwerty”, “password” and “111111” on the top five spots. The entire list of the top 100,000 most used passwords can be checked out here and predictably holds many common words, names, number combinations and even single letters and numbers. … More

The post Are your passwords among the 100,000 most breached ones? appeared first on Help Net Security.

The foundation: Quantifying risk with focused security measurement

When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches security – from the C-suite to the board – has this at the forefront of their mind. As a security leader, you’re likely being asked about quantifying risk, perhaps more so now than ever before. You might be pressed to answer with much confidence. When … More

The post The foundation: Quantifying risk with focused security measurement appeared first on Help Net Security.

Attackers are weaponizing more vulnerabilities than ever before

2018 had the most weaponized vulnerabilities ever (177), which represents a 139% increase compared to 2017, according to the RiskSense latest report. In addition, the rate of exploits discovered in the wild before a patch was available was nearly three times higher last year than the previous record set in 2010. The RiskSense Vulnerability Weaponization Insights Report provides an in-depth analysis of vulnerabilities and weaponization patterns across the Adobe family of products from August 1996 … More

The post Attackers are weaponizing more vulnerabilities than ever before appeared first on Help Net Security.

PDF: The vehicle of choice for malware and fraud

There has been a substantial increase of fraudulent PDF files, according to a report by SonicWall Capture Labs threat researchers. This fraud campaign takes advantage of recipients’ trust in PDF files as a “safe” file format that is widely used and relied upon for business operations. “Increasingly, email, Office documents and now PDFs are the vehicle of choice for malware and fraud in the cyber landscape,” said SonicWall President and CEO Bill Conner. “In all … More

The post PDF: The vehicle of choice for malware and fraud appeared first on Help Net Security.

DevSecOps: Fast development without sacrificing safety

DevOps has been a boon to companies looking to shorten the systems development cycle, pushing software developers and IT operations to work together and help their enterprises fulfil their business objectives. But while DevOps has been embraced relatively quickly, the same cannot be said for adding security into the mix, even though many software devs and IT and security professionals agree that it would be welcome and the effects of this merger on app security … More

The post DevSecOps: Fast development without sacrificing safety appeared first on Help Net Security.

Google will check apps by new developers more thoroughly

In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with newly minted accounts. This reviewing process will take days, not weeks, Google assures, and should allow them to do more thorough checks before approving apps to be featured in the store. Sameer Samat, VP of Product Management, Android & Google Play, also says that they know … More

The post Google will check apps by new developers more thoroughly appeared first on Help Net Security.

Building a modern data registry: Go beyond data classification

For organizations, understanding what data they store and analyze is gaining increasing urgency due to new privacy regulations, from the Global Data Privacy Regulation (GDPR) to the California Consumer Privacy Act (CCPA) and Brazil’s General Data Protection Law (LGPD). But these regulations are not the only reason organizations are focused on privacy. Security imperatives and pressure to extract more value from the information they store has also put pressure on companies to get data privacy … More

The post Building a modern data registry: Go beyond data classification appeared first on Help Net Security.

New infosec products of the week: April 19, 2019

CHAOSSEARCH releases new search and analytics platform for cloud storage CHAOSSEARCH released their search and analytics platform. Using scalable elasticity and disruptive cost economics, the platform gives customers the ability to store, search and query all the data they need within their own Amazon S3 environment. ManageEngine now provides secure, one-click access to an unlimited number of enterprise apps ManageEngine launched Identity Manager Plus, a secure, cloud-based single sign-on (SSO) solution. It allows organizations to … More

The post New infosec products of the week: April 19, 2019 appeared first on Help Net Security.

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

In this age of frequent security and data breaches, the statement “We take our customers’ privacy and security very seriously” has been heard from breached companies so often as to become a point of mockery, anger and frustration. But when Rob Lefferts, CVP of Microsoft 365 Security and Compliance, tells me the same thing (and the statement is not in response to a security breach), I believe him. If they didn’t, this cloud-based SaaS offering … More

The post Microsoft 365 security: Protecting users from an ever-evolving threat landscape appeared first on Help Net Security.