80% of senior IT leaders see cybersecurity protection deficits

80% of senior IT leaders see cybersecurity protection deficits

A lack of confidence in companies’ defenses is prompting 91% of organizations to boost 2021 budgets, according to a new IDG/Insight Enterprises study. Image: iStock/LeoWolfert Nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges, according to a new IDG survey commissioned by Insight Enterprises. That high level of concern over the…

Read More

Detecting Privilege Escalation

Detecting Privilege Escalation

By Garret Grajek, CEO, YouAttest During the first half of 2020 alone, over 36 billion records were exposed through various data breaches, with the FBI reporting an increase of 300% in reports since the onset of the COVID-19 pandemic. With threats, both internal and external, facing organizations at an all-time high, cybersecurity should be a critical focus for 2021, especially as remote working is a trend that will continue far into the future. Hackers look…

Read More

Hackers Target Russian Cybercrime Forums

Hackers Target Russian Cybercrime Forums

Elite cybercrime forum Maza aka MFclub has been taken over by hackers, according to new research by risk intelligence company Flashpoint. The Russian-language forum, which was originally known as Mazafaka, has served thousands of cyber-criminals since its launch in 2003.  “Little is known at this time about the attackers who successfully compromised Maza,” wrote Flashpoint researchers. But thanks to the data allegedly leaked in the attack, quite a lot has come to light about the site’s users. …

Read More

US Warns of Fake Unemployment Benefit Websites

US Warns of Fake Unemployment Benefit Websites

The United States Justice Department has warned that cyber-criminals are impersonating state workforce agencies (SWAs) to steal Americans’ personal data. In a press release issued March 5, the department said it had received reports that bad actors are creating fake websites that mimic sites genuinely belonging to SWAs.  “The fake websites are designed to trick consumers into thinking they are applying for unemployment benefits and disclosing personally identifiable information and other sensitive data,” said the department.  “That…

Read More

Failure to Report Breach Costs Mortgage Lender $1.5m

Failure to Report Breach Costs Mortgage Lender .5m

An American mortgage lender has shelled out $1.5m to resolve allegations that it violated the New York Department of Financial Services (NYDFS) Cybersecurity Regulation.  Residential Mortgage Services, Inc. (RMS), which is headquartered in South Portland, Maine, was accused of failing to report a data breach that occurred in 2019.  The breach was uncovered during an investigation of RMS carried out in July 2020 by the NYDFS. The department found evidence that “a substantial amount of sensitive personal data” had…

Read More

Cisco Secure Email: A Proven and Consistent Leader

Cisco Secure Email: A Proven and Consistent Leader

As email borne threats continue to increase in volume and complexity, keeping email safe continues to be a top priority for security professionals. These varied and persistent threats include Business Email Compromise (BEC), ransomware, domain compromise, malware, phishing, spam and account takeovers. The damage they cause affects an organization’s bottom line and reputation. So, it makes sense that there’s a growing interest in the evolution of email security; a comprehensive solution that provides the highest…

Read More

100 Billion Reasons Cisco Partnered with a PoE Switch Provider – Cisco Blogs

100 Billion Reasons Cisco Partnered with a PoE Switch Provider – Cisco Blogs

At one point, every organization had an analog phone system. When Cisco entered the Unified Communications (UC) market, it wanted to help usher in a new and improved era of corporate communications and collaboration. Naturally, companies with large budgets and few barriers were able to upgrade. Today, just over half of all analog phones have been upgraded to IP. However, all the “low hanging fruit” opportunities are gone for the individuals who sell UC solutions, focusing…

Read More

NIST Cybersecurity Framework: A cheat sheet for professionals

NIST Cybersecurity Framework: A cheat sheet for professionals

President Trump’s cybersecurity order made the National Institute of Standards and Technology’s framework federal policy. Here’s what you need to know about the NIST’s Cybersecurity Framework. The tech world has a problem: security fragmentation. There’s no standard set of rules–or even language–used to address the growing threats of hackers, ransomware, and stolen data, and the threat only continues to grow. President Obama recognized the threat in 2013, which led to his cybersecurity executive order that…

Read More

Docker Hub and Bitbucket Resources Hijacked for Crypto-Mining

Docker Hub and Bitbucket Resources Hijacked for Crypto-Mining

Security researchers are warning of a resurgent campaign to hijack developer resources for cryptocurrency mining. A team from Aqua Security explained that over the period of just four days, attackers set up 92 malicious Docker Hub registries and 92 Bitbucket repositories to abuse these resources. “The adversaries create a continuous integration process that every hour initiates multiple auto-build processes, and on each build, a Monero cryptominer is executed,” said Aqua Security’s lead data analyst, Assaf…

Read More

Fraudsters Circumvent 3D Secure with Social Engineering

Fraudsters Circumvent 3D Secure with Social Engineering

Cyber-criminals are actively sharing tips and advice on how to bypass the 3D Secure (3DS) protocol to commit payment fraud, according to researchers. A team at threat intelligence firm Gemini Advisory found the discussions on multiple dark web forums, claiming that phishing and social engineering tactics stood a good chance of success in certain situations. Although version two of the protocol, designed for smartphone users, allows individuals to authenticate payments with hard-to-spoof or steal biometric…

Read More
1 7 8 9 10 11 268