Asynchronous Nature of Asymmetric Cyberwarfare

The Asynchronous Nature of Asymmetric Cyberwarfare: Success Factors of Cyberattacks

Winning against an asymmetric cyberattack first requires we recognize an attack is occurring It has been given many names: soft war, non-linear war, unconventional hybrid warfare, cyber cold war, Cold War 2.0, ...
Security Boulevard
Trojan Infects Browser Extensions After Disabling Integrity Checks

Trojan Infects Browser Extensions After Disabling Integrity Checks

Security researchers have discovered a new Trojan program dubbed Razy that installs itself as a browser extension or infects existing browser extensions after disabling integrity checks. According to researchers from Kaspersky Lab, ...
Security Boulevard
Magecart-Style Website Supply Chain Attacks

Volunteer Project Takes Down 100,000 Malware Distribution Sites

A community of volunteer researchers has managed to take down around 100,000 malware distribution websites over the past 10 months as part of a new URL blacklisting project. The initiative, called URLhaus, ...
Security Boulevard
Use an Adversary Mindset

Want to Weed Out Anomalies? Use an Adversary Mindset

When it comes to anomalies, the sheer volume can be overwhelming. How do you separate the potentially malicious from the purely anomalous? One strategy is to use the adversary mindset as a ...
Security Boulevard
AI Fight for Data Protection

AI: Your No. 1 Weapon in the Fight for Data Protection

Voters’ passage of the California Consumer Privacy Act (CCPA) this summer means significantly tighter security for consumer data. Given the far-too-frequent instances of data breaches, this marks an impressive step toward protecting ...
Security Boulevard
Ransomware Strains: The Stealthy Cyberthreat

Ryuk Ransomware That Hit U.S. Newspapers Not State-Sponsored

According to reports from several cybersecurity firms, the Ryuk ransomware that reportedly recently disrupted operations at several U.S.-based newspapers is run by cybercriminals, not state-sponsored actors. Some online sources have attributed the ...
Security Boulevard
‘How,’ not ‘Who,’ of Cyberattacks

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...
Security Boulevard
'Five Eyes' Countries Attribute APT10 Attacks to Chinese Intelligence Service

‘Five Eyes’ Countries Attribute APT10 Attacks to Chinese Intelligence Service

Following the indictment of two alleged members of a Chinese cyberespionage group by the U.S. Department of Justice Dec. 20, the governments of Canada, Australia, New Zealand and the U.K. have publicly ...
Security Boulevard
SIEM with Real-Time Event Contextualization

Enrich Your SIEM with Real-Time Event Contextualization

A sizable portion of security research has gone into creating security alerts that are effective at informing security analysts when certain events happen. For example: more than 50 failed SSH login attempts ...
Security Boulevard
RBS Survey: One-Third of Vulnerabilities Rated High or Critical This Year

RBS Survey: One-Third of Vulnerabilities Rated High or Critical This Year

There were more than 16,000 vulnerabilities disclosed during the first three quarters of this year and more than a third of them were rated high or critical—7.0 or higher in the Common ...
Security Boulevard
Loading...