Pro-Russian Disinformation Systematically Spread Using Western Media Channels

Pro-Russian Disinformation Systematically Spread Using Western Media Channels

Western media channels are being systematically manipulated to spread pro-Russian government propaganda and disinformation, according to a new report by the Crime and Security Research Institute at Cardiff University. The researchers said they uncovered evidence that “provocative” pro-Russian or anti-Western statements were being systematically posted in reader comments sections in articles relating to Russia in 32 prominent media outlets across 16 countries. Russian-language media outlets subsequently used these comments as the basis of stories about politically controversial…

Read More

Cybersecurity: Watch out for these unique fraudster tricks Loki would be proud of

Cybersecurity: Watch out for these unique fraudster tricks Loki would be proud of

Online fraud is getting sneakier and stealthier as mischievous operatives evolve their techniques. Learn some of the unique tricks afoot today and how to spot them. Image: Disney My family and I enjoyed the TV show “Loki,” which portrays the god of mischief entailed in various shenanigans. I thought how many “variants” of Loki are online—albeit less charismatic—trying to pull off fraudulent tricks to bilk victims out of money or identity information. The tricks are…

Read More

What Is Log Management and why you need it | The State of Security

What Is Log Management and why you need it | The State of Security

To remain competitive in the digital age, organizations frequently introduce new hardware devices and software installations to their IT environments. The problem is that these assets might suffer from vulnerabilities that attackers could misuse, if unpatched, to change a device’s configuration or make unauthorized modifications to some of the organization’s important files. Either of these scenarios could help threat actors to establish an initial foothold on the network, access which they could then leverage to…

Read More

US Cyber Command: Patch Critical Atlassian Bug Now

US Cyber Command: Patch Critical Atlassian Bug Now

US government security experts have urged system administrators to patch two critical flaws in widely used Cisco and Atlassian products, exposing them to compromise. In a rare move, US Cyber Command took to Twitter before the Labor Day holiday weekend on Friday to address the Atlassian bug. “Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already—this cannot wait until after the weekend,” it warned. Atlassian issued…

Read More

SEC: Beware Hurricane Ida Investment Scams

SEC: Beware Hurricane Ida Investment Scams

The US Securities and Exchange Commission (SEC) has warned investors not to fall for scams capitalizing on the Hurricane Ida recovery and clean-up operation. The regulator’s Office of Investor Education and Advocacy claimed that disasters including hurricanes, floods and oil spills often attract opportunistic fraudsters, who use email and social media to promote their scams. “These scams can take many forms, including promoters touting companies purportedly involved in clean-up and repair efforts, trading programs that falsely guarantee…

Read More

Dallas School District Reveals Major Data Breach

Dallas School District Reveals Major Data Breach

One of America’s largest school districts has informed students, alumni, parents and employees that personal data from the past 11 years was exposed after a third-party gained unauthorized access to it. The Dallas Independent School District (ISD) claims to serve 145,000 students in 230 schools across the region and boasts 22,000 employees. However, it revealed last Friday that it was notified about a data security incident on August 8. Although the district is still working out which…

Read More

Ways to Navigate the Threat Landscape Conveyed in Verizon’s DBIR 2021

Ways to Navigate the Threat Landscape Conveyed in Verizon’s DBIR 2021

On May 13, Verizon released its Data Breach Investigations Report (DBIR) 2021. This annual publication serves many purposes. It yields context into what security analysts are seeing, for instance. But it also affects organizations’ security postures at an even higher level. Here’s Anthony Israel-Davis, research and development manager at Tripwire, with more: One thing that the DBIR does is it takes the things that are going on in the cybersecurity space, particularly with breaches and…

Read More

Data Breaches: A Chance for Opportunistic Scammers & What to Watch for

Data Breaches: A Chance for Opportunistic Scammers & What to Watch for

Data breaches are now part of doing business, with many companies having been affected. Data is very valuable to criminals because it is often used to commit fraudulent activities as well as to enhance the credibility of scams. Data that is stolen ranges from Social Security Numbers (SSNs) to other identification documents and payment details. Scammers can do a great deal with just one or two pieces of personal information. A talented scammer in possession…

Read More

The Importance of Multi-Factor Authentication and Strong Passwords

The Importance of Multi-Factor Authentication and Strong Passwords

Understanding and implementing MFA and strong password protocol. By Jeff Severino, CyberLock Defense, Lockton Affinity The importance of multi-factor authentication and password security is critical. Often, it is your best line of defense for protecting all your data, devices and systems from unauthorized access. Unfortunately, many don’t take password security seriously, which makes them especially vulnerable to hackers. Good password security can help protect you from data breaches, network intrusions, malware and viruses. It can…

Read More

Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach

Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach

By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a matter of when, not if, they will fall victim to a cyberattack. These attacks can range from data breaches to ransomware to Distributed Denial of Service (DDoS) attacks and are often a result of malicious actions by cybercriminals or nation-state actors operating from different parts of the globe. There is no shortage of technology designed to defend…

Read More
1 2,117 2,118 2,119 2,120 2,121 2,600