IT Leaders: Nation State Campaigns Are Inspiring Cybercrime Attacks

IT Leaders: Nation State Campaigns Are Inspiring Cybercrime Attacks

Nearly three-quarters (72%) of IT leaders are concerned that tools and techniques used by nation-states will eventually end up in the hands of cyber-criminals and be used to attack their organization, according to HP. The findings come from a poll of 1100 IT decision-makers in the UK, the US, Canada, Mexico, Germany, Australia and Japan. Ian Pratt, global head of security, personal systems at HP, argued that such concerns are well-founded. He cited recent events such as…

Read More

Census Bureau Slammed for 2020 Breach

Census Bureau Slammed for 2020 Breach

The US Census Bureau has been heavily criticized by a government inspector after a 2020 breach which could have been prevented by prompt patching. Although the attacker was not able to access servers used for the 2020 census, they could modify user account data to prepare for remote code execution, according to the US Office of Inspector General (OIG) report. Fortunately, the attacker’s attempt to maintain access to the system by creating a backdoor was unsuccessful, thanks to the Bureau’s firewalls….

Read More

T-Mobile Confirms 49 Million Customers Hit by Data Breach

T-Mobile Confirms 49 Million Customers Hit by Data Breach

T-Mobile has admitted that threat actors have stolen personal information on 48.6 million current, former and prospective customers. The US carrier revealed in a notice yesterday that the breach affected 7.8 million current T-Mobile post-paid customer accounts, over 40 million records of former or prospective customers who had applied for credit and 850,000 active T-Mobile prepaid customers. Previous reports had claimed that over 100 million customers might have been hit after a threat actor offered customer records for sale on…

Read More

Do Phishing Attacks Cost More Than Ransomware?

Do Phishing Attacks Cost More Than Ransomware?

With increased internet usage during the new normal of remote working, phishing attacks continue to challenge business security defenses. Cyberthugs often distribute malicious codes via various kinds of phishing baits, causing severe consequences to organizations’ critical digital infrastructure. A joint study from Proofpoint and Ponemon Institute revealed that the financial damages from phishing attacks have skyrocketed amid distributed work environments. The 2021 Cost of Phishing Study found that phishing attacks cost organizations nearly $14.8 million (over…

Read More

Communication key in fighting higher education ransomware, CISOs say | EdScoop

Communication key in fighting higher education ransomware, CISOs say | EdScoop

Communication with instructors and students is still crucial to fighting ransomware attacks against higher education institutions, though there needs to be a safety net, a group of university cybersecurity officials said during a panel discussion Thursday. Schools are centralizing data storage, adopting multi-factor authentication and segmenting networks for students, staff and researchers to protect data in case of a breach, panelists said. Mary Dickerson, the chief information security officer at the University of Houston, said…

Read More

Minimizing fraud while maximizing customer satisfaction

Minimizing fraud while maximizing customer satisfaction

Minimizing fraud while maximizing customer satisfaction | 2021-08-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Bill Wright – Why federal organizations are leaning into zero trust

5 minutes with Bill Wright – Why federal organizations are leaning into zero trust

5 minutes with Bill Wright – Why federal organizations are leaning into zero trust | 2021-08-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

The Next Disruptive ICS Attacker: An Advanced Persistent Threat (APT)?

The Next Disruptive ICS Attacker: An Advanced Persistent Threat (APT)?

No discussion on ICS attacks could be complete without talking about what some would call, ‘the elephant in the room.’ Critical infrastructure has always been a target for warfare, and modern ICS are no exception. Several high-profile ICS disruptions have in fact been attributed to malicious hackers working at the behest of a military or intelligence agency. Looking at Examples of APTs The potential impact of a wartime ICS cyber incident is hard to understate….

Read More

Bronze Optis: Innovative Technologies at Black Hat

Bronze Optis: Innovative Technologies at Black Hat

By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as a traditional Black Hat recap, I specifically highlight twenty-one companies that stand out and whose growth I recommend watching. Rochester Institute of Technology’s Cybersecurity Club, RITSEC, inspired the metrics I used to analyze and rank companies. Specifically, I adopted RITSEC’s motto, “Security Through Community,” while…

Read More

People Behind CSR at Cisco: How Cisco drives an inclusive, sustainable future through the circular economy – Cisco Blogs

People Behind CSR at Cisco: How Cisco drives an inclusive, sustainable future through the circular economy – Cisco Blogs

Welcome to our blog series on the people behind Corporate Social Responsibility (CSR) at Cisco. Each blog in this series will highlight a different Cisco employee who works closely with CSR initiatives across the company. Enabling an inclusive future for all requires that we care for the planet we all share and do our part to address global challenges. A key tenet of this is enabling a circular economy, moving from a linear economy where products are developed with the expectation of a…

Read More
1 3,238 3,239 3,240 3,241 3,242 3,641