Risk terminology: Understanding assets, threats and vulnerabilities

Risk terminology: Understanding assets, threats and vulnerabilities

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face ...
cloud file service

Report Details Security Threats Posed by Cloud File Services

A report published today by Menlo Security, a provider of a global cloud proxy platform, details the degree to which public cloud file services are now being used as a mechanism to ...
Security Boulevard
livestreaming

Your Smartphone: Ground Zero for Cyberattacks

Your network was hacked. You search to find the vulnerability that led to the hack. Here’s a tip that might expedite that investigation: start with the mobile phones connected to your network ...
Security Boulevard
broadband

Qualys Reveals Critical OpenBSD Mail Server Security Flaw

Qualys Research Labs disclosed this week a security flaw in the OpenSMTPD mail server used within the OpenBSD operating system that allows a cyberattacker to execute arbitrary shell commands with elevated privileges ...
Security Boulevard

Why iFrames alone won’t stop web skimming attacks from stealing customer data

| | threats, web skimming
Web skimming and Magecart headlines have taken the online world by storm over the past year as attackers have infected sites like Macy’s and Sweaty Betty, leaving organizations to consider what technologies ...

5 Security Trends and Predictions to Watch in 2020

The 2019 cybersecurity landscape was once again littered with attacks. From the resurgence of ransomware to mega data breaches, cybercriminals continue to target ...

Stopping data loss is getting harder as Magecart attackers employ new techniques

| | threats, web skimming
Web skimming attacks, such as those carried out by Magecart, made headlines in 2019 as major online businesses publicly disclosed attacks. While web skimming attacks aim to steal all types of sensitive ...

Don’t let CCPA data protection requirements get the best of you — Instart will help

| | threats, web skimming
California’s privacy law went into effect at the start of 2020 bringing with it a number of regulations affecting how the data of the state’s residents must be managed. The law, which ...
5 2020 Cybersecurity Resolutions for SMBs

5 2020 Cybersecurity Resolutions for SMBs

During our 2019 SMB IT Security Report, we learned that small and mid-sized businesses still struggle to implement network security solutions. SMBs continue to identify budget constraints as the main barrier when ...

Did you avoid the Black Friday madness? Hackers didn’t.

| | Bots, threats, web skimming
Kevin Mitnick, the world's most famous hacker, once broke into the computer of Tsutomu Shimomura on Christmas Day — Tsutomu was a computer researcher at the San Diego Supercomputer Center and was ...