Microsoft reports Iranian hackers targeting US, Israeli defense companies

Microsoft reports Iranian hackers targeting US, Israeli defense companies

Microsoft on Monday released evidence showing Iranian-linked hackers targeting and at times compromising systems of U.S. and Israeli defense technology companies.  In a blog post, Microsoft’s Threat Intelligence Center and Digital Security Unit assessed that a new cyber “activity cluster” linked to Iran had targeted hundreds of Microsoft Office 365 accounts beginning in July tied to groups including U.S. and Israeli defense companies, Persian Gulf entry ports, and global maritime transportation companies. Microsoft also observed…

Read More

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

Proofpoint Simulated Phishing Campaigns Mark Cooley, Vice President of Security and Compliance, Cedar Rapids, Iowa-based Involta, No. 255 on the 2021 CRN Solution Provider 500 Phishing attack prevention is all about end-user awareness and ongoing training. As I mentioned before, phishing attacks are a people and process vulnerability that is often overlooked. There are a variety of tools in the marketplace that companies can use to deploy…

Read More

Ada Lovelace Day: Celebrating Women’s Achievements in STEM

Ada Lovelace Day: Celebrating Women’s Achievements in STEM

Ada Lovelace Day is October 12th, celebrating women in STEM, which includes cybersecurity! Every year, the holiday does end up being a history of computing, as Ada was composing what we’d now consider the software for a theoretical first computer that had not been built. But that was in the 1840s. What are women doing today? Have you heard of Window? “One single vulnerability is all an attacker needs.” – Window Snyder; Chief Security Officer, Fastly (now…

Read More

Installing packages on Linux and Mac with Homebrew

Installing packages on Linux and Mac with Homebrew

Ever heard of Homebrew? It’s a package manager with a very unusual feature. It allows ordinary users to install packages without using sudo, and it’s available for both macOS and Linux. While the tool on each of these systems is referred to as Homebrew, the Linux version installs as linuxbrew. Once installed, users can use Homebrew via the brew command to install packages very easily. Installation of Homebrew itself, however, does generally require sudo privileges…

Read More

4 questions that get the answers you need from IT vendors

4 questions that get the answers you need from IT vendors

It’s the time of year when most enterprises are involved in a more-or-less-formal technology review cycle, as a preparatory step for next year’s budgeting. They’ve done this for decades, and it’s interesting to me that in any given year, enterprises share roughly three of their top five priorities. It’s more interesting that over three-quarters of enterprises carry over at least two of their top five priorities for multiple years. Why aren’t they getting addressed? They…

Read More

Most Insurers Mandate MFA, But Premiums Are Still Soaring

Most Insurers Mandate MFA, But Premiums Are Still Soaring

US cyber-insurers are increasing premiums and lowering coverage limits despite mandating stricter security controls as a pre-requisite for coverage, according to a new report. The US Cyber Market Outlook from wholesale insurance broker Risk Placement Services warns that providers have been “battered” by higher-than-anticipated recent losses and are now generally charging much more for less coverage. “Over the past year, we’ve seen the challenges of the COVID-19 pandemic and increasing frequency and severity of ransomware attacks put…

Read More

Banking Insider Accused of Role in $1m BEC Scheme

Banking Insider Accused of Role in m BEC Scheme

Three men including one former bank employee have been indicted by a federal grand jury for their alleged role in a business email compromise (BEC) conspiracy. Onyewuchi Ibeh, 21, of Bowie, Maryland, Jason Joyner, 42, of Washington, DC and Mouaaz Elkhebri, 30, of Alexandria, Virginia, were charged with money laundering and aggravated identity theft, according to a superseding indictment late last week. According to the court documents, they’re said to have targeted firms of all sizes…

Read More

UiPath partners with CrowdStrike to secure SaaS workflow automation

UiPath partners with CrowdStrike to secure SaaS workflow automation

UiPath is expanding its robotic process automation (RPA) platform with new features it hopes will put it on CIOs’ radar, including better security, a cloud-native delivery model, and the ability to automate through APIs as well as the UI. The security component comes through a partnership with CrowdStrike, while the API automation is the fruit of UiPath’s acquisition of Cloud Elements in March 2021. A recent survey by IDG Research found that many IT organizations…

Read More

Ransomware Intrusion Group FIN12 Ramps-Up in Europe

Ransomware Intrusion Group FIN12 Ramps-Up in Europe

A long-running threat group with a track record of rapid ransomware deployment and healthcare sector victims is ramping up its operations in Europe and APAC, Mandiant has warned. In a new report detailing the work of FIN12, the threat intelligence firm claimed that the prolific threat group had focused mainly on North American targets since its activities were first recorded in 2018. Around 85% were from this region, and 20% thus far have been healthcare sector organizations,…

Read More

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 3,443 3,444 3,445 3,446 3,447 4,236