Major Water Supplier Suffers Nine-Month Long Breach

Major Water Supplier Suffers Nine-Month Long Breach

One of Australia’s largest regional water suppliers was breached for several months before detecting the unauthorized access, another worrying sign of weaknesses in critical infrastructure security. A Queensland Audit Office annual report on the water industry did not mention the provider by name but said it continues to see “significant control weaknesses in the security of information systems” across the industry. The breach in question occurred between August 2020 and May 2021, resulting in unauthorized access to…

Read More

Interpol Closes in on Global BEC Gang

Interpol Closes in on Global BEC Gang

Irish police have joined forces with Interpol to track down an organized crime gang that has already stolen more than €14m ($16m) from local businesses and individuals through business email compromise (BEC). The Garda has been investigating the gang for several years for multiple serious financial crime offenses. Its 18-month long Operation Skein has already led to the reported arrests of over 400 suspects, but the global nature of cybercrime meant international policing work was also needed….

Read More

Pentagon Set to Open Zero Trust Office in December – Report

Pentagon Set to Open Zero Trust Office in December – Report

The US Department of Defense is stepping up its cybersecurity efforts with a dedicated Zero Trust office set to open next month, according to a senior official. Pentagon CISO, David McKeown, said at the CyberCon event this week that the office would report into the CIO, although the senior executive in charge has not yet been named. Leadership buy-in to Zero Trust has helped to accelerate the opening, which can be seen in part as…

Read More

3 tips for stopping the next insider attack

3 tips for stopping the next insider attack

3 tips for stopping the next insider attack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

NIST & zero trust: What federal agencies can learn from the private sector

NIST & zero trust: What federal agencies can learn from the private sector

NIST & zero trust: What federal agencies can learn from the private sector | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Salami attacks: Small deposits resulting in significant losses

Salami attacks: Small deposits resulting in significant losses

Salami attacks: Small deposits resulting in significant losses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Recommendations for Fulfilling the Potentials of Cyber Insurance

Recommendations for Fulfilling the Potentials of Cyber Insurance

Cyber insurance has great potentials in improving cybersecurity practices and protecting organizations against the impact of security incidents, but these potentials “have yet to fully materialize.” This is the key highlight of a recent report developed by the Royal United Services Institute for Defence and Security Studies (RUSI) and the University of Kent in the UK. The report provides a comprehensive list of recommendations for both governments and organizations. Why cyber insurance? The World Economic…

Read More

This Week in Security News – November 12, 2021

This Week in Security News – November 12, 2021

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about the prolific cybermercenaries, Void Balaur, and their recent attacks. Also, read on the 80-country agreement to mobilize safeguards against cyberattacks. Read on: Void Balaur and the Rise of the Cybermercenary Industry One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that…

Read More

Private 5G Security Risks in Manufacturing Part 4

Private 5G Security Risks in Manufacturing Part 4

Private 5G Security Risks in Manufacturing Part 4 Exploits & Vulnerabilities We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. By: Yohei Ishihara November 12, 2021 Read time:  ( words) The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However,…

Read More

Sophisticated Android spyware PhoneSpy infected thousands of Korean phones

Sophisticated Android spyware PhoneSpy infected thousands of Korean phones

South Korean users have been targeted with a new sophisticated Android spyware, tracked as PhoneSpy, as part of an ongoing campaign. Researchers from Zimperium zLabs uncovered an ongoing campaign aimed at infecting the mobile phones of South Korean users with new sophisticated android spyware dubbed PhoneSpy. The malware already hit more than a thousand South Korean victims. Unlike other surveillance software that attempts to exploit vulnerabilities on the device, PhoneSpy disguised itself as a harmless…

Read More
1 3,192 3,193 3,194 3,195 3,196 3,803