Monthly Archives: May 2019

Checkers double drive-thru restaurants chain discloses card breach

Checkers and Rally’s, one of the largest chains of double drive-thru restaurants in the United States, disclosed a credit card breach. “We recently became aware of a data security issue […]

Posted in Cyber Security News | Comments Off on Checkers double drive-thru restaurants chain discloses card breach

Cybersecurity facts to focus on in 2018

By Greg Mosher, Avast’s VP of Engineering As fast as cybercriminals adapt to work their way around security defenses, new techniques and tactics for preventing hacks, infections and data breaches […]

Posted in Cyber Security News | Comments Off on Cybersecurity facts to focus on in 2018

Could our web dependency cost us a lot?

By Milica D. Djekic What is in common to the DDoS and any ransomware attacks? We could confidently say it’s their ability to get used as the sabotage weapons. If […]

Posted in Cyber Security News | Comments Off on Could our web dependency cost us a lot?

Misaddressed emails were the #1 data security incident reported in 2017

Tim Sadler comments on the alarming statistic released by the Information Commissioner’s office stating that misaddressed emails were the number form of data loss in 2017. Tim Sadler is CEO […]

Posted in Cyber Security News | Comments Off on Misaddressed emails were the #1 data security incident reported in 2017

Research from Trustwave Details New Trends in Cyberattacks

Social engineering, sextortion campaigns and retail attacks are on the rise as enterprises strengthen security efforts and increase incident response time A new research report from Trustwave highlights an interesting […]

Posted in Cyber Security News | Comments Off on Research from Trustwave Details New Trends in Cyberattacks

News aggregator Flipboard disclosed a data breach

The news aggregator Flipboard announced that it suffered a breach, unauthorized users had access to some databases storing user account information. The news and social media aggregator Flipboard disclosed on […]

Posted in Cyber Security News | Comments Off on News aggregator Flipboard disclosed a data breach

Data Breach Risks and Responses for Business Leaders

By Jerry Thompson The cybersecurity threat landscape is now more fraught than ever. New revelations on the scope and severity of 2017’s Equifax hack seem to roll out by the […]

Posted in Cyber Security News | Comments Off on Data Breach Risks and Responses for Business Leaders

The Security Behind E-Signatures

By Tim Bedard, Director of Security Product Marketing, OneSpan E-signatures have been helping enterprises transform their operations for 25 years. Companies in both the public and private sectors deploy e-signatures […]

Posted in Cyber Security News | Comments Off on The Security Behind E-Signatures

Is C-Level Security Talk Resulting in Action?

EXECUTIVES SAY SECURITY IS TOP OF MIND, BUT SEARCH DATA PROVES OTHERWISE By Ben Lorica, Chief Data Scientist, O’Reilly From media headlines to industry surveys, most business executives across industries […]

Posted in Cyber Security News | Comments Off on Is C-Level Security Talk Resulting in Action?

MEASURE YOUR SECURITY

Why measurement is at the core of Analogue Network Security, and why Cybersecurity without metrics is a fool’s errand by Winn Schwartau, Founder & CVO, The Security Awareness Company The […]

Posted in Cyber Security News | Comments Off on MEASURE YOUR SECURITY

BlueKeep scans observed from exclusively Tor exit nodes

GreyNoise experts detected scans for systems vulnerable to the BlueKeep (CVE-2019-0708) vulnerability from exclusively Tor exit nodes. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS […]

Posted in Cyber Security News | Comments Off on BlueKeep scans observed from exclusively Tor exit nodes

IIoT Security and the Threats invited by Public Networks

by Stewart Kantor, CEO, and co-founder of Full Spectrum Inc. Interconnectivity has become a norm in today’s society, with everything from your smartphone to your increasingly automated home and vehicle. […]

Posted in Cyber Security News | Comments Off on IIoT Security and the Threats invited by Public Networks

Top 5 Ways to Combat Insider Threat

by Dr. Eric Cole I’ve been talking about insider threat for nearly 10 years and advocating the position that compromising an insider is a lot easier for an adversary than […]

Posted in Cyber Security News | Comments Off on Top 5 Ways to Combat Insider Threat

Keep hackers from boarding your network with a Cyber No-Fly list

By Hugh Njemanze, CEO, Anomali According to a recent report from the Online Trust Alliance, 2017 marked another “worst year ever” for cyber attacks. Businesses across every sector experienced nearly […]

Posted in Cyber Security News | Comments Off on Keep hackers from boarding your network with a Cyber No-Fly list

Your Guide to Encrypting Files in Linux

Your Guide to Encrypting Files in Linux If your organization is one of the many that uses Linux operating systems to run key business processes, it’s important to implement the […]

Posted in Cyber Security News | Comments Off on Your Guide to Encrypting Files in Linux

First American Financial exposed 16 years’ worth of personal and financial documents

The US real-estate insurance biz, First American Financial, accidentally leaked customers’ highly personal files online, hundreds of millions of documents. The US real-estate insurance company First American Financial Corp. accidentally leaked […]

Posted in Cyber Security News | Comments Off on First American Financial exposed 16 years’ worth of personal and financial documents

SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks

Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed a trend of high-profile cybercrime in 2018. However, after studying website attacks that […]

Posted in Cyber Security News | Comments Off on SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks

Computer Bug History – Notable pests from the last 30 years

by James Smith, Bugsnag CEO Over the last three months, the media including Cyber Defense Magazine has reported what seems to be one computer bug after another, including the Meltdown […]

Posted in Cyber Security News | Comments Off on Computer Bug History – Notable pests from the last 30 years

SandboxEscaper disclosed 3 Microsoft Zero-Day in 24 Hours

Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours. Just Yesterday, the popular developer SandboxEscaper publicly disclosed a Windows […]

Posted in Cyber Security News | Comments Off on SandboxEscaper disclosed 3 Microsoft Zero-Day in 24 Hours

Attackers on Rampage

Lack of  knowledge can cost you a lot By Charles Chipiliro Chioko, IT Security Compliance Officer, NICO Technologies Limited Gone are the days where people get worried about viruses which […]

Posted in Cyber Security News | Comments Off on Attackers on Rampage

Ahead of the 2018 US midterms, how can we respond to foreign voting interference?

By Brent Whitfield, CEO at DCG Technical Solutions Inc. Whether the attempts of foreign agents to affect the 2016 presidential election had a significant effect or not, many eyes have […]

Posted in Cyber Security News | Comments Off on Ahead of the 2018 US midterms, how can we respond to foreign voting interference?

Snapchat staff used internal tools to spy on users

Snapchat internal staff has allegedly abused their role in the company to spy on Snapchat users using and internal tools and steal data. Snapchat is a multimedia messaging app that makes pictures, videos, […]

Posted in Cyber Security News | Comments Off on Snapchat staff used internal tools to spy on users

Security Forecast: Cloudy with a chance of doom!

A brief digest from the 2019 Thales Data Security Summit  Washington, D.C. – When my train pulled into Union Station, the weather forecast called for overcast, gray skies. Little did […]

Posted in Cyber Security News | Comments Off on Security Forecast: Cloudy with a chance of doom!

Third-Party Patching

A vendor-neutral framework for addressing the other 85% of vulnerabilities by Duncan McAlynn, Cybersecurity Consultant If your organization is like most, you likely have clearly defined processes in place for […]

Posted in Cyber Security News | Comments Off on Third-Party Patching

SSH: The Two-Edged Sword in Your Security Strategy

What you don’t know can hurt you by Thomas MacIsaac, Cybersecurity Strategist, SSH Communications Security Cybercrime is as old as the internet, which means there has always been a need […]

Posted in Cyber Security News | Comments Off on SSH: The Two-Edged Sword in Your Security Strategy

Don’t Get Caught by Ransomware

by Aarij Khan, Vice President of Marketing, Securonix As businesses increasingly rely on digital systems, networks, and data for operations, the value of maintaining the integrity and availability of these […]

Posted in Cyber Security News | Comments Off on Don’t Get Caught by Ransomware

Tech and IT Companies are Driving Cloud Security Investments

A new survey shows how companies in different regions and industries deal differently with cloud security risks by Michael Fimin, CEO and Co-Founder Netwrix Regardless of how long organizations have […]

Posted in Cyber Security News | Comments Off on Tech and IT Companies are Driving Cloud Security Investments

GDPR Privacy Laws: Ramifications and Possible Interdictions for Open Source Security Vulnerabilities

By Tae Jin “TJ” Kang The Data Protection Directive 95/46/EC, adopted in 1995, was an attempt by the European Union to create a unified set of data privacy rules for […]

Posted in Cyber Security News | Comments Off on GDPR Privacy Laws: Ramifications and Possible Interdictions for Open Source Security Vulnerabilities

Cloud Clout & the Chinese agnostic

by David Nagrosst, Entrepreneurial Leader and CISSP Qualified Cyber Security Expert All three of the world’s largest hosting companies – Amazon, Alibaba Group, and Microsoft – have achieved their positions […]

Posted in Cyber Security News | Comments Off on Cloud Clout & the Chinese agnostic

How We Can Secure The Energy Grid and the Smart Home Of The Future

by Uri Kreisman, COO, Bluechip Systems On August 15th, 2012, the Saudi Arabian group Saudi Aramco suffered a malware attack called “Shamoon” that damaged about thirty thousand computers. The state-owned […]

Posted in Cyber Security News | Comments Off on How We Can Secure The Energy Grid and the Smart Home Of The Future

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X