Spending on the internet of things (IoT) is expected to soar to $1 trillion worldwide by 2022, according to an International Data Corporation report. Companies in virtually every industry are deploying IoT devices, such as smart TVs in conference rooms, connected machine sensors in factories and wearable devices in hospitals ...
Is the Good Samaritan clause, intended to protect against harmful materials, too broad and ripe for abuse? The essence of information security is to allow “good” things in and keep “bad” things out, and various tools assist us in doing that. Included in this list is anti-malware software, filtering software, ...
In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo vs. Google! ** Show notes and links mentioned on the show ** Snapshot: Top 25 Most Dangerous Software ...
Why fixing that ransomware attack might get you indicted Editor’s Note: We’re pleased to publish this article from attorney Ryan Blanch, sharing an expert perspective on some of the legal... The post Going After the Good Guys: The Government’s Ransomware Identity Crisis appeared first on Hashed Out by The SSL ...
The U.S. Department of Justice has announced that the State Department, in partnership with the FBI, have set a reward of up to $5 million for information that can lead to the arrest and conviction of two Russian hackers. Maksim V. Yakubets, 32, and Igor Turashev, 38, are allegedly responsible ...
Its December and the Christmas lights are going up, so it can't be too early for cyber predictions for 2020. With this in mind, Richard Starnes, Chief Security Strategist at Capgemini, sets out what the priorities will be for businesses in 2020 and beyond. Richard Starnes, Chief Security Strategist, CapgeminiAccelerated ...
A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, KrebsOnSecurity has learned. Multiple sources affected say their IT provider, Englewood, Colo. based Complete Technology Solutions (CTS), was hacked, allowing a potent ...
Consider Cybersecurity topics, authors and tags that you are interested in when trying to search. You can also enter your own custom search criteria. You can also select a topic or syndication source below to filter all the blog posts.
Malware obfuscation comes in all shapes and sizes — and it’s sometimes hard to recognize the difference between malicious and legitimate code when you see it. Recently, we came across an interesting case where attackers went a few extra miles to make it more difficult to notice the site infection. Mysterious wp-config.php Inclusion During the ... Read More
Idaptive's Senior Vice President of Global Sales and Channels Jeff Newlin was honored recently as one of the 2020 Top 100 Global Sales Leaders (GSL100) by The Modern Sale and Collective[i]. Roll out the red carpet – It’s award season at Idaptive! This holiday season at Idaptive, we’re especially proud of and grateful for our ... Read More
In a world where development is conducted on a variety of operating systems and hosted on the cloud, having a well-structured development system with integrated security is vital to ensuring that customer solutions are functioning optimally and are secure. This is achieved through DevOps ... Read More
Open source is transforming software development. No longer do individual businesses need to purchase or build everything they need in-house. Instead, they can rely on a modern, interdependent ecosystem in which developers work together on ... Read More
Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware that targets companies with revenues between $500 million and $1 billion—attacked Pemex’s system and brought administrative operations to a halt. This isn’t an ... Read More
Fresh off raising an additional $13 million in financing, Cyberhaven has launched a tool that enables cybersecurity teams to track how data is being moved across an extended enterprise. Cyberhaven CEO Volodymyr Kuznetsov said the Data Behavior Analytics (DaBA) service developed by the startup makes it possible to record and analyze the flow of data ... Read More
Consider investing in emerging tech tools that can add a deeper layer of data privacy protection. Artificial intelligence technology, in particular, holds a great deal of promise when it comes to complying with the CCPA and improving the way companies handle data in general ... Read More
When molten steel is immersed in water it transforms into one of the world’s strongest materials. A resilient software supply chain is no different. Hardened steel requires combining alloys; a hardened software supply chain requires combining specialized tools “to examine both internally and externally sourced code” that reinforce, remediate, and strengthen the individual pieces of ... Read More
Keeping your eCommerce store secure is a must. Not only is it an important source of income for your business, but it also contains sensitive customer information, such as billing details and credit card numbers. Strong passwords can prevent many cyber attacks, but you’ll need a way to enforce them without deterring customers. By creating ... Read More
With 2020 just weeks away, here at Bitdefender we wanted to share our forecast for the year to come. That said, here are our top predictions for the cybersecurity space in 2020 and what we should be looking out for ... Read More
Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival instinct. In business, saving money could get you promoted ... Read More
The City of Waco has warned residents that their online payments for water services may have been intercepted by hackers who stole credit card details. The heart of the problem lies in the third-party online payment software that Waco and several other cities and municipalities use to let residents pay their bills, pay parking fines, ... Read More
What does email security have to do with credit cards? A lot, especially when you consider that their information system implementations share the same structural vulnerabilities. And this time of year, when we are all using our credit cards a lot, that should give us all a pause for both reflection and concern. Just … ... Read More
The number of companies that have publicly announced they have fallen victim to a cyber attack is only a small sample size compared to the actual number of attacks. There are essentially three categories of companies that have experienced a cyber attack ... Read More
The city of Pensacola, Florida, was hit by a ransomware attack, and authorities are still trying to determine if the hackers stole data from the affected systems. Early reports from Pensacola mentioned that the city administration fell prey to a cyberattack, but no specifics were released. Now, the city officials say that Pensacola was hit ... Read More
Today we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Nibbles. HTB is an excellent platform that... Go on to the site to read the full article ... Read More
Introduction This article will explore some interesting details from an episode of Infosec’s information security career podcast, Cyber Work. This episode, with guest Jonathan Butler, covers how to... Go on to the site to read the full article ... Read More
Introduction In this article, we will discuss the various ways that attackers are able to abuse external remote services to gain unauthorized access into internal networks. We will also discuss some... Go on to the site to read the full article ... Read More
Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security. The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks ... Read More
Law enforcement arrested three men for their participation in a cryptomining scheme that defrauded investors of $722 million. On December 10, 2019, the U.S. Attorney’s Office for the District of New Jersey announced the arrests of Matthew Brent Goettsche, 37, of Lafayette, Colorado, and Jobadiah Sinclair Weeks, 38, of Arvada, Colorado, on suspicion of conspiracy ... Read More
Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly differently. This is me from 2005: Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public ... Read More
Why your next gen firewall is not sufficient to protect data stored in G Suite and Office 365 Firewalls have been around for decades now, and IT teams are very familiar with working with them to protect against cyber-attacks that target network entry points. The introduction of next-generation firewalls, or next gen firewalls (NGFWs), offers ... Read More
Automation is valuable in detecting and eliminating manipulated media, and fighting against dis- and misinformation campaigns. The post The Quest To Automate The Business Of Fake News appeared first on Radware Blog ... Read More
Security best practices for encryption key storage, management and protection is critical to protecting valuable data wherever it is located,... The post Land Securely on Regulatory Compliance with Thales Luna HSMs appeared first on Data Security Blog | Thales eSecurity ... Read More
We are elated to announce that Scalefusion has been featured in the 2019’s Best Software Companies in India list published by G2.com! G2.com is one of the largest and most popular marketplaces for business software. It revealed its annual rankings based on reviews by more than one million users from diverse businesses on the 10th ... Read More
Node Package Manager (npm) was a revolutionary addition to web application programming. It allowed developers to create small, reusable pieces of code and share them with the developer community. npm gives developers massive flexibility and makes developing applications incredibly simple, but there are also potential pitfalls when it comes to npm security. Here are three ... Read More
Microsoft says it doesn’t plan to provide security updates for the Microsoft Security Essentials component integrated into Windows 7 after the operating system reaches its end of life in a little over five weeks. The life of Windows 7 is set to end on January 14th, 2020, and security updates for the operating system will ... Read More
With cybercriminals increasing their ambitions, constantly evolving hacking techniques year over year, and with emerging technologies providing more attack surface for hackers, executives and IT leaders must plan for the inevitable. They must know how to respond when a security breach happens because it will happen. As we head into 2020, every organization should be ... Read More
2019 proved to be a hectic year in the cybersecurity landscape. With 3,813 data breaches occurring in the first six months alone, (exposing over 4.1 billion records,) and 12174 new vulnerabilities discovered in commercial and open source software, this year has certainly been one for the memory books. With all signs pointing to 2020 beingRead ... Read More
Will AG Barr succeed in his fight to empower the U.S. government with the ability to break strong encryption against tech companies? U.S. Attorney General Bill Barr once again is decrying the fact that tech companies are proposing strong security standards for data at rest and data in transmission. By using encryption to protect data, ... Read More
Finding a security vendor that is the best fit for your company’s business objectives, culture, risk profile, and budget is challenging today. The purpose of this blog is to suggest that working with a “vendor partner” is more than working with a standard technology vendor in that a partner aligns not only with “Technology” concerns ... Read More
Qualys Research Labs discovered a local privilege escalation vulnerability in OpenBSD’s dynamic loader. The vulnerability could allow local users or malicious software to gain full root privileges. OpenBSD developers have confirmed the vulnerability and released security patches in less than 3 hours. Qualys Research Labs also provided proof-of-concept exploits in the security advisory. Vulnerability Details ... Read More
A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a ... Read More
Salesforce Commerce Cloud, also known as Demandware, is used by some of the worlds largest brands for marketing, customer interaction, and to process online shopping transactions. Given the importance of the platform, and the sensitivity of the data it handles, it is a popular target for criminals, such as Magecart groups ... Read More
The end-of-year online buying season is a bank fraud frenzy. This used to be done by criminals using stolen or cloned payment cards in person, via card-present (CP) fraudulent transactions. The introduction of chip-based Europay, Mastercard, and Visa (EMV) cards has changed this. CP fraud is now much more difficult ... Read More
I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve. We’ll continue to be hounded by greater volumes of the attacks that have threatened us for years and, as businesses adopt new innovations, new vulnerabilities to threats will surface. You and your security team will ... Read More
With the final weeks of 2019 upon us, here are some predictions for what 2020 holds for identity and access management. As we reach the final few weeks of 2019, many of you will be thinking of the projects which you will be planning or embarking on in 2020. Maybe you will be looking to ... Read More
Sucuri provides security for websites with the protection of our Web Application Firewall (WAF). We also have our proprietary Anycast content delivery network (CDN) that adds the performance benefits of a CDN to all our WAF users. We been adding data centers in key regions of the world: San Jose – US Dallas – US ... Read More