The White House’s international summit on ransomware: Biggest cybersecurity takeaways

The White House’s international summit on ransomware: Biggest cybersecurity takeaways

This week the White House held a summit with various nations to address the threat of ransomware. Experts weigh in on the important security takeaways and why certain nations were excluded. Image: Shutterstock/Peshkova The White House held a virtual ransomware summit this week with over 30 countries in attendance—although a few notable nations were excluded, such as China, Russia and North Korea. Australia, Brazil, Canada, France, Germany, India, Japan, United Arab Emirates and the United…

Read More

Data Stolen from American Osteopath Group

Data Stolen from American Osteopath Group

The personal data of thousands of individuals have been stolen from a non-profit professional membership organization located in Illinois. Cyber-thieves struck the American Osteopathic Association (AOA) in the summer of 2020, making off with information that included names, Social Security numbers, and financial account details. The AOA, which is headquartered in Chicago, represents around 151,000 osteopathic physicians and medical students across the United States. The association was tipped off to the attack when suspicious activity…

Read More

IP and analog surveillance cameras secure Welsh natural gas facility

IP and analog surveillance cameras secure Welsh natural gas facility

IP and analog surveillance cameras secure Welsh natural gas facility This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Video surveillance secures Welsh natural gas facility

IP and analog surveillance cameras secure Welsh natural gas facility

Video surveillance secures Welsh natural gas facility This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Shoring up cybersecurity in critical infrastructure and the nation’s defense supply chain

Shoring up cybersecurity in critical infrastructure and the nation’s defense supply chain

Shoring up cybersecurity in critical infrastructure and the nation’s defense supply chain This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Google Sends Customers 50,000+ Warnings of State-Backed Attacks

Google Sends Customers 50,000+ Warnings of State-Backed Attacks

Google has seen a 33% year-on-year spike in nation state attempts to compromise its customers so far in 2021, the tech giant revealed yesterday. Security engineer Ajax Bash claimed that in the year-to-date, Google’s Threat Analysis Group (TAG) had sent over 50,000 warnings to customers that their account was the target of government-backed phishing or malware attempts. The main reason for the increase in attacks was an “unusually large” campaign attributed to the notorious Kremlin-backed actor…

Read More

Being Mindful of Communication Security

Being Mindful of Communication Security

The potential risks of communication APIs and CPaaS and secure vendor selection criteria. By James Ryan, Director of Information Security, BISO, IntelePeer The pandemic accelerated the demand for various things, from vaccines to virtual telecommunications platforms. Cloud services also rose in use to enrich customer communication channels, from Software as a Service (SaaS) and Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) and Communication Platform as a Service (CPaaS) seeing considerable growth….

Read More

US Government Warns of Insider and Ransomware Threat to Water Plants

US Government Warns of Insider and Ransomware Threat to Water Plants

The US authorities have issued an alert warning of ongoing malicious cyber-activity targeting the country’s water and wastewater systems (WWS) sector. The alert highlighted multiple tactics, techniques and procedures (TTPs) being used by a range of actors in an attempt to compromise IT and OT systems. These include spear-phishing, exploitation of insecure RDP, targeting of unsupported or outdated operating systems and software, and exploitation of control system devices with vulnerable firmware. The alert was issued by…

Read More

Missouri Governor Slammed for Vow to Prosecute Researcher

Missouri Governor Slammed for Vow to Prosecute Researcher

Missouri governor Mike Parson has been widely criticized for seeking to prosecute news reporters who disclosed a vulnerability on a state education website. The St. Louis Post-Dispatch published a story on Wednesday about how its team discovered a web app flaw on the site that leaked teacher information, including 100,000 Social Security numbers (SSNs). The SSNs were apparently available in the site’s source code, available to anyone who wanted to right-click on the page. The journalists reported the…

Read More

Pentesting vs. threat hunting: What’s the difference?

Pentesting vs. threat hunting: What’s the difference?

Pen testing vs. threat hunting: What’s the difference? This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More
1 2,203 2,204 2,205 2,206 2,207 2,757