Monthly Archives: March 2018

Introduction to Machine Learning (ML) for Cybersecurity

Time to a breach.  Time to detect.  Time to react.  What’s your exposure time?  Gary Miliefsky, the Publisher of this magazine, recently spoke as our Keynote Speaker at a Trend […]

Posted in Cyber Security News | Comments Off on Introduction to Machine Learning (ML) for Cybersecurity

Cyber Secure IP Video Solution: Credentialed High Assurance Video Encryption (CHAVE®)

End-to-End Video Data Encryption for High Assurance Security Video Applications Mission critical and critical infrastructure environments must have an IP video solution that maximizes data security, and the National Institute […]

Posted in Cyber Security News | Comments Off on Cyber Secure IP Video Solution: Credentialed High Assurance Video Encryption (CHAVE®)

US imposes sanctions on nine Iranian hackers involved in a massive state-sponsored hacking scheme

The US DoJ and Department of the Treasury on Friday announced charges against nine Iranian hackers for alleged involvement in state-sponsored hacking activities. The US Department of Justice and Department […]

Posted in Cyber Security News | Comments Off on US imposes sanctions on nine Iranian hackers involved in a massive state-sponsored hacking scheme

Puerto Rico Electric Power Authority (PREPA) hacked over the weekend

Puerto Rico Electric Power Authority (PREPA) power utility confirmed early this week that it has been hacked over the weekend. A few days ago, the US government issued an alert […]

Posted in Cyber Security News | Comments Off on Puerto Rico Electric Power Authority (PREPA) hacked over the weekend

Facebook Privacy Failures and Opportunities

Facebook faces tremendous business risks from the upcoming EU’s GDPR privacy rules set to take effect in May.  This looming backdrop of a serious ‘reality’ check on Facebook comes on […]

Posted in Cyber Security News | Comments Off on Facebook Privacy Failures and Opportunities

Supreme Court in Russia ruled Telegram must provide FSB encryption keys

A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users’ messaging data to avoid being blocked. Bad news for Telegram, a Supreme Court in Russia […]

Posted in Cyber Security News | Comments Off on Supreme Court in Russia ruled Telegram must provide FSB encryption keys

Department of Energy Cyber Defense Competition April 6-7, 2018

The U.S. Department of Energy (DOE) is hosting its third annual Cyber Defense Competition, April 6-7, 2018, to address the cybersecurity capability gap. Student teams engage in interactive, scenario-based events […]

Posted in Cyber Security News | Comments Off on Department of Energy Cyber Defense Competition April 6-7, 2018

Uber Self-Driving Car struck and killed a woman in Tempe, Arizona

An Uber self-driving car has struck and killed a woman pedestrian in Tempe, Arizona. The incident raises questions about the safety and security of this kind of vehicles. This is […]

Posted in Cyber Security News | Comments Off on Uber Self-Driving Car struck and killed a woman in Tempe, Arizona

Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds

Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, according to […]

Posted in Cyber Security News | Comments Off on Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds

Hackers tried to cause a blast at a Saudi petrochemical plant

Hackers tried to cause a blast at a Saudi petrochemical plant A new cyber attack against a Saudi petrochemical plant made the headlines, hackers attempted to hit the infrastructure in August. […]

Posted in Cyber Security News | Comments Off on Hackers tried to cause a blast at a Saudi petrochemical plant

A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit

Some people are very afraid of an artificially intelligent future where vicious robots become attack dogs and harm humans. Some feel robots will be unstoppable and out of control. Enter […]

Posted in Cyber Security News | Comments Off on A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit

MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University, led by the expert Mordechai Guri, to exfiltrate data from an air-gapped network. The technique leverage connected […]

Posted in Cyber Security News | Comments Off on MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

Drive-by as a service: BlackTDS

Overview Proofpoint researchers have been tracking a new Traffic Distribution System called BlackTDS implicated in the distribution of a variety of malware. BlackTDS is a multi-tenant TDS tool that has been […]

Posted in Cyber Security News | Comments Off on Drive-by as a service: BlackTDS

The 2018 Guide to Finding a Secure File Transfer Solution

It’s no secret—file transfers are an integral part of how each business runs. From purchase orders and quarterly reports to banking transactions and patient data, organizations may share a multitude […]

Posted in Cyber Security News, Featured | Comments Off on The 2018 Guide to Finding a Secure File Transfer Solution

Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang

Ukrainian Police supported by security firm Group-IB and other security firms dismantled a DDoS crime gang that blackmailed numerous companies worldwide. Another example of successful collaboration between law enforcement agencies […]

Posted in Cyber Security News | Comments Off on Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang

Cryptocurrency Mining Operations Now Targeting Servers

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache Solr servers online. Last week new mining campaigns targeted unpatched Windows […]

Posted in Cyber Security News | Comments Off on Cryptocurrency Mining Operations Now Targeting Servers

77 FACTS ABOUT CYBER CRIMES ONE SHOULD KNOW IN 2018

As a society, we cherish our right to privacy probably more than anything else. Sharing is great, and we all enjoy it, but there is always that other side, the […]

Posted in Cyber Security News | Comments Off on 77 FACTS ABOUT CYBER CRIMES ONE SHOULD KNOW IN 2018

The Risks of Crypto-currency Mining Infections

During 2017, the crypto-currency market grew nearly 20-fold, reportedly increasing from approximately $18 billion to more than $600 billion (USD). Those gains amplified threat actors’ interest in accessing the computing resources of […]

Posted in Cyber Security News | Comments Off on The Risks of Crypto-currency Mining Infections

New Remote Access Trojan (RAT) Discovered

Leaked source code for Ammyy Admin turned into FlawedAmmyy RAT Overview Proofpoint researchers have discovered a previously undocumented remote access Trojan (RAT) called FlawedAmmyy that has been used since the […]

Posted in Cyber Security News | Comments Off on New Remote Access Trojan (RAT) Discovered

Microsoft released Windows Updates that include Intel’s Spectre microcode patches

Microsoft announced this week the release of the microcode updates to address the Spectre vulnerability. Last week Intel released microcode to address the CVE-2017-5715Spectre vulnerability for many of its chips, let’s this […]

Posted in Cyber Security News | Comments Off on Microsoft released Windows Updates that include Intel’s Spectre microcode patches

Safeguarding Enterprise and Personal Data in the Age of Disruptive Technologies

Since the dawn of the internet, threats on data privacy and security have been a growing concern. Each year, numerous new malware programs are created enabling malicious activity and false […]

Posted in Cyber Security News | Comments Off on Safeguarding Enterprise and Personal Data in the Age of Disruptive Technologies

VISA – The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud

VISA – The cases of counterfeit fraud had dropped by 70% in September 2017 compared to December 2015 thanks to the diffusion of the diffusion in the storefronts of payment […]

Posted in Cyber Security News | Comments Off on VISA – The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud

What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks

The role of IT in defending against cyber-attacks is more difficult than ever. It becomes even more challenging when IT departments are forced to tackle the lack of willingness by […]

Posted in Cyber Security News | Comments Off on What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X