Monthly Archives: March 2018
Introduction to Machine Learning (ML) for Cybersecurity
Time to a breach. Time to detect. Time to react. What’s your exposure time? Gary Miliefsky, the Publisher of this magazine, recently spoke as our Keynote Speaker at a Trend […]
Cyber Secure IP Video Solution: Credentialed High Assurance Video Encryption (CHAVE®)
End-to-End Video Data Encryption for High Assurance Security Video Applications Mission critical and critical infrastructure environments must have an IP video solution that maximizes data security, and the National Institute […]
US imposes sanctions on nine Iranian hackers involved in a massive state-sponsored hacking scheme
The US DoJ and Department of the Treasury on Friday announced charges against nine Iranian hackers for alleged involvement in state-sponsored hacking activities. The US Department of Justice and Department […]
Puerto Rico Electric Power Authority (PREPA) hacked over the weekend
Puerto Rico Electric Power Authority (PREPA) power utility confirmed early this week that it has been hacked over the weekend. A few days ago, the US government issued an alert […]
Facebook Privacy Failures and Opportunities
Facebook faces tremendous business risks from the upcoming EU’s GDPR privacy rules set to take effect in May. This looming backdrop of a serious ‘reality’ check on Facebook comes on […]
Supreme Court in Russia ruled Telegram must provide FSB encryption keys
A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users’ messaging data to avoid being blocked. Bad news for Telegram, a Supreme Court in Russia […]
Department of Energy Cyber Defense Competition April 6-7, 2018
The U.S. Department of Energy (DOE) is hosting its third annual Cyber Defense Competition, April 6-7, 2018, to address the cybersecurity capability gap. Student teams engage in interactive, scenario-based events […]
Uber Self-Driving Car struck and killed a woman in Tempe, Arizona
An Uber self-driving car has struck and killed a woman pedestrian in Tempe, Arizona. The incident raises questions about the safety and security of this kind of vehicles. This is […]
Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds
Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, according to […]
Hackers tried to cause a blast at a Saudi petrochemical plant
Hackers tried to cause a blast at a Saudi petrochemical plant A new cyber attack against a Saudi petrochemical plant made the headlines, hackers attempted to hit the infrastructure in August. […]
A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit
Some people are very afraid of an artificially intelligent future where vicious robots become attack dogs and harm humans. Some feel robots will be unstoppable and out of control. Enter […]
MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers
MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University, led by the expert Mordechai Guri, to exfiltrate data from an air-gapped network. The technique leverage connected […]
Drive-by as a service: BlackTDS
Overview Proofpoint researchers have been tracking a new Traffic Distribution System called BlackTDS implicated in the distribution of a variety of malware. BlackTDS is a multi-tenant TDS tool that has been […]
The 2018 Guide to Finding a Secure File Transfer Solution
It’s no secret—file transfers are an integral part of how each business runs. From purchase orders and quarterly reports to banking transactions and patient data, organizations may share a multitude […]
Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang
Ukrainian Police supported by security firm Group-IB and other security firms dismantled a DDoS crime gang that blackmailed numerous companies worldwide. Another example of successful collaboration between law enforcement agencies […]
Cryptocurrency Mining Operations Now Targeting Servers
Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache Solr servers online. Last week new mining campaigns targeted unpatched Windows […]
77 FACTS ABOUT CYBER CRIMES ONE SHOULD KNOW IN 2018
As a society, we cherish our right to privacy probably more than anything else. Sharing is great, and we all enjoy it, but there is always that other side, the […]
The Risks of Crypto-currency Mining Infections
During 2017, the crypto-currency market grew nearly 20-fold, reportedly increasing from approximately $18 billion to more than $600 billion (USD). Those gains amplified threat actors’ interest in accessing the computing resources of […]
New Remote Access Trojan (RAT) Discovered
Leaked source code for Ammyy Admin turned into FlawedAmmyy RAT Overview Proofpoint researchers have discovered a previously undocumented remote access Trojan (RAT) called FlawedAmmyy that has been used since the […]
Microsoft released Windows Updates that include Intel’s Spectre microcode patches
Microsoft announced this week the release of the microcode updates to address the Spectre vulnerability. Last week Intel released microcode to address the CVE-2017-5715Spectre vulnerability for many of its chips, let’s this […]
Safeguarding Enterprise and Personal Data in the Age of Disruptive Technologies
Since the dawn of the internet, threats on data privacy and security have been a growing concern. Each year, numerous new malware programs are created enabling malicious activity and false […]
VISA – The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud
VISA – The cases of counterfeit fraud had dropped by 70% in September 2017 compared to December 2015 thanks to the diffusion of the diffusion in the storefronts of payment […]
What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks
The role of IT in defending against cyber-attacks is more difficult than ever. It becomes even more challenging when IT departments are forced to tackle the lack of willingness by […]