Top 5 Things to Know About Recent IoT Attacks | McAfee Blog

Top 5 Things to Know About Recent IoT Attacks | McAfee Blog

Recent Internet attacks have caused several popular sites to become unreachable. These include Twitter, Etsy, Spotify, Airbnb, Github, and The New York Times. These incidents have highlighted a new threat to online services: botnets powered by the Internet of Things (IoT). Distributed denial of service (DDoS) attacks have been around for over a decade and, for the most part, have been handled by network providers’ security services. However, the landscape is changing. The primary strategy…

Read More

Australian CEOs Struggling to Face Cyber Risk Realities

Australian CEOs Struggling to Face Cyber Risk Realities

Image: ImageFlow/Adobe Stock Fear and the more technical aspects of cybersecurity are still stopping Australian CEOs from engaging more deeply with cybersecurity risks, despite a string of high-profile cyberattacks that have hit Australian brands, including Optus and Medibank and millions of their customers. New research from consulting firm Accenture found that only one in five (19%) of Australian CEOs are currently dedicating board meetings to discussing cybersecurity issues, while 34% think cybersecurity isn’t a strategic…

Read More

Cybersecurity: Miscalculating Cyber Threats | McAfee Blog

Cybersecurity: Miscalculating Cyber Threats | McAfee Blog

Human beings are remarkable in their resilience. Beyond our ability to build and grow civilizations, we possess a somewhat less understood but equally important characteristic – the ability to deceive ourselves. The implications of this trait are vast and diverse, sometimes manifesting in seemingly irrational behavior, such as underestimating risks in the realm of cybersecurity. Psychology explores the distinguishing factor of mankind from the rest of the species on our planet – reason. How we…

Read More

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a financially oriented threat actor named Octo Tempest, who deploys advanced social engineering techniques to target companies, steal data and run ransomware campaigns. Jump to: Octo Tempest’s tactics, techniques and procedures The threat actor deploys a variety of tactics, techniques and procedures to conduct its operations successfully. Initial access Octo Tempest commonly leverages social engineering attacks…

Read More

Proofpoint To Acquire Email Security Company Tessian | CRN

Proofpoint To Acquire Email Security Company Tessian | CRN

Security News Kyle Alspach October 30, 2023, 12:05 PM EDT The AI-driven email security platform from Tessian is now set to become part of Proofpoint’s email data loss prevention offering. Proofpoint has reached an agreement to acquire email security company Tessian, the company said Monday. Tessian’s AI-driven email security platform is now set to become part of Proofpoint’s email data loss prevention (DLP) offering. [Related: Cybersecurity Startup Acquisitions In…

Read More

Valentine's Alert: Don't Let Scammers Break Your Heart or Your Bank Account | McAfee Blog

Valentine's Alert: Don't Let Scammers Break Your Heart or Your Bank Account | McAfee Blog

As with any major holiday or special occasion, Valentine’s Day is unfortunately not immune to scammers looking for an opportunity to exploit unsuspecting individuals. Their deceitful acts can break hearts and bank accounts. In this article, we spotlight some common Valentine’s Day scams, offer tips on how to protect yourself and navigate this romantic day with confidence and caution. The Unromantic Side of Valentine’s Day Valentine’s Day is a time when love is in the…

Read More

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually. Image: ink drop/Adobe Stock Security researchers from three universities have discovered a major vulnerability in Apple’s iOS and macOS, including the Safari browser. The vulnerability, which the researchers named iLeakage, enables threat actors to read Gmail messages, reveal passwords and uncover other personal information. The vulnerability affects macOS or iOS devices running on…

Read More

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating this cybersecurity attack. ESET researcher Matthieu Faou has exposed a new cyberattack from a cyberespionage threat actor known as Winter Vivern, whose interests align with Russia and Belarus. The attack focused on exploiting a zero-day vulnerability in Roundcube webmail, with the result being the ability…

Read More

Everything You Need to Know About Microsoft’s New $5 Billion Investment in Australia

Everything You Need to Know About Microsoft’s New  Billion Investment in Australia

Microsoft plans to more than double its cloud computing capacity in Australia over the next two years and expand its support for critical national cyber security and technology skills priorities. Fast-growing demand for cloud computing services across Australia has seen Microsoft announce the injection of AU $5 billion (US $3.2 billion) into the market, in a move it says will support Australia’s ability to seize the economic and productivity advantages of artificial intelligence. Flanked by…

Read More

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

As we gear up to feast with family and friends this Thanksgiving, we prepare our wallets for Black Friday and Cyber Monday. Black Friday and Cyber Monday have practically become holidays themselves, as each year, they immediately shift our attention from turkey and pumpkin pie to holiday shopping. Let’s look at these two holidays and how their popularity can impact users’ online security, and grab a great Black Friday holiday deal from McAfee. About the…

Read More
1 20 21 22 23 24 27