Global Phishing Campaign Sets Sights on COVID-19 Cold Chain

Global Phishing Campaign Sets Sights on COVID-19 Cold Chain

A global phishing campaign targeted organizations associated with the Coronavirus 2019 (COVID-19) cold chain. Discovered by IBM Security X-Force, the operation began in September 2020 by targeting multiple entities that support the Cold Chain Equipment Optimization Platform (CCEOP). A program created by Gavi, The Vaccine Alliance, CCEOP aims to cultivate an agile medical response to outbreaks of infectious diseases like COVID-19. It does this in part by working to strengthen the “cold chain,” or a…

Read More

5 ways to take control of data in 2021

5 ways to take control of data in 2021

COVID-19 changed how economies, consumers, and the supply chain behave. All that change means that significant amounts of legacy data are no longer useful and, in many places, we are starting from ground zero. But for CIOs who are responsible for the infrastructures, platforms, and tools that manage and move data, essential data realities may not have changed, although their scope certainly has. Due to the pivotal role technology is playing in transforming the working…

Read More

Philly Food Bank Loses $1m in BEC Scam

Philly Food Bank Loses m in BEC Scam

A Philadelphia food bank has been scammed out of nearly $1m following a classic business email compromise (BEC) attack, it has emerged. Philabundance is the region’s largest hunger-relief organization and receives tens of millions of dollars in donations every year. Earlier this year, it was in the process of completing a new $12m community kitchen, which is when it was sent an invoice by what managers thought was a construction company supplier. However, the email was in…

Read More

The 20-mile trail to zero

The 20-mile trail to zero

The 20-mile trail to zero | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

More than 50% of organizations plan to increase investment in building technology to protect health & safety of occupants

More than 50% of organizations plan to increase investment in building technology to protect health & safety of occupants

More than 50% of organizations plan to increase investment in building technology to protect health & safety of occupants | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies….

Read More

CISA warns APT groups targeting US think tanks

CISA warns APT groups targeting US think tanks

CISA warns APT groups targeting US think tanks | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Tighter identity and asset management is essential to WFH security

Tighter identity and asset management is essential to WFH security

Tighter identity and asset management is essential to WFH security | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Managing access in higher education during COVID-19

Managing access in higher education during COVID-19

Managing access in higher education during COVID-19 | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to Protect Your Business From Multi-Platform Malware Systems

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.” However, some believe that their connections to North Korea might be a false flag intending to hide their true origins. The Lazarus Group has been responsible for many cyberattacks over the last decade, with the latest…

Read More

Notable Enhancements to the New Version of NIST SP 800-53

Notable Enhancements to the New Version of NIST SP 800-53

As an infosec professional, you’ve likely heard of the National Institute of Standards and Technology (NIST). If you are unfamiliar with NIST, it is an organization that produces many publications including the well-respected Special Publication SP 800-53r5 standard, titled “Security and Privacy Controls for Information Systems and Organizations.”  Although intimidating in its initial appearance, this important manuscript provides a catalog of privacy and security guidance for most of the information systems within the federal government. …

Read More
1 2,488 2,489 2,490 2,491 2,492 2,537