Back-to-Basics: Use Strong Encryption

Back-to-Basics: Use Strong Encryption

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

How to reduce your organization’s security risk in 6 steps

How to reduce your organization’s security risk in 6 steps

It’s impossible to guarantee security—but nearly all organizations should take these actions to protect organizational data and systems. Image: Andy Wolber/TechRepublic “During the meeting, [name withheld] said their organization was hacked. Is there anything we should all do?” the email said. Apparently, unauthorized access to an email account allowed a thief to make a financial account transfer that resulted in the loss of tens of thousands of dollars. Larger companies often reduce risk by hiring…

Read More

Unauthorized Network Access Selling for Up to Five Figures

Unauthorized Network Access Selling for Up to Five Figures

Researchers have found that the sale and purchase of unauthorized access to compromised enterprise networks are influenced by location and industry. IntSights, a Rapid7 company, released new research today that highlights the dark world of network access, with findings showing that underground criminals sell access to organizations for up to $10,000. “Some cyber-criminals specialize in network compromises and sell the access that they have obtained to third parties, rather than exploiting the networks themselves,” explained the researchers….

Read More

How to get the Windows 11 security protections on an existing PC

How to get the Windows 11 security protections on an existing PC

Windows 11 will turn on hardware security by default but only on new PCs or if you re-image from scratch. But there is a workaround. Image: Microsoft Security is only one of the reasons for the hardware requirements for Windows 11; it’s also about reliability, compatibility and performance. But the hardware security features in the CPUs that Windows 11 will run on reduce malware and ransomware attacks significantly.  SEE: Windows 10: Lists of vocal commands for…

Read More

Fraudsters Impersonate DPD in “Convincing” New Smishing Scam

Fraudsters Impersonate DPD in “Convincing” New Smishing Scam

Consumers have been warned about a new “convincing” smishing scam that impersonates international parcel delivery firm DPD. The consumer group Which? provided insights into the smishing campaign, in which scammers attempt to trick recipients into giving away personal information, including payment details. In the scam, consumers receive a text that states: “DPD: We tried to deliver your parcel however no one was available to receive it. To arrange your redelivery, please proceed via: *link.” The Which? researchers…

Read More

Palo Alto Networks Announces Expansion of Management Team

Palo Alto Networks Announces Expansion of Management Team

SANTA CLARA, Calif., Aug. 10, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the expansion of its management team, with Amit Singh moving into the new role of chief business officer and BJ Jenkins joining the company in the role of president. The appointments are effective immediately. Palo Alto Networks has reported notable momentum over the last financial year, with the business benefiting from customers adopting products across its…

Read More

Salesforce Communities Could Expose Business-Sensitive Information

Salesforce Communities Could Expose Business-Sensitive Information

Numerous publicly accessible Salesforce Communities are misconfigured and could expose sensitive information, says research published today. A Salesforce Community site lets customers and partners interface with a Salesforce instance from outside an organization. For example, they can open support tickets, ask questions, manage their subscriptions and more. According to Varonis, anonymous users can “query objects that contain sensitive information such as customer lists, support cases and employee email addresses.” The research team explains in a…

Read More

NCSC Announces First Cohort for New Cyber Startup Program

NCSC Announces First Cohort for New Cyber Startup Program

The UK’s National Cyber Security Centre (NCSC) has unveiled the first five tech companies that will take part in its new startup program. The NCSC For Startups initiative, first announced in June, will support innovative cybersecurity firms to develop products that will help protect critical areas of the UK’s economy and society from online harms. The NCSC is collaborating with innovation company Plexal to run the program. It is the successor to the highly successful NCSC Cyber Accelerator initiative, which helped more…

Read More

Chinese Espionage Group UNC215 Targeted Israeli Government Networks

Chinese Espionage Group UNC215 Targeted Israeli Government Networks

Chinese espionage group UNC215 leveraged remote desktop protocols (RDP) to access an Israeli government network using stolen credentials from trusted third parties, according to research published today. Mandiant, part of cybersecurity firm FireEye, analyzed data gathered from their telemetry and the information shared by Israeli entities in collaboration with the authorities. The data revealed multiple concurrent operations against Israeli government institutions, IT providers and telecommunications entities beginning in January 2019. FireEye has published the findings…

Read More
1 2,155 2,156 2,157 2,158 2,159 2,592