Monthly Archives: October 2019
Threat intelligence collection in a developing world
By Milica D. Djekic As it’s known – threat intelligence collection is mainly increasing in developing countries. These countries could be a source of the real risks, threats, and challenges […]
How to Defend Against the Next DDoS Attack
By Cricket Liu, Chief DNS Architect at Infoblox I’m sure you’ve been following the news of the recent distributed denial of service (DDoS) attack against Dyn. Here’s my take on […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]
Wi-Fi Security Worries and the Critical Nature of Classification
By Ryan Orsi, Director of Strategic Alliances at WatchGuard Technologies Open public Wi-Fi hotspots are experiencing explosive growth. According to Cisco’s latest Visual Networking Index Forcast, by 2020, public Wi-Fi […]
It’s the Industry Titans Against the Federal Deities
Ensuring zero intrusion with best practices in the encryption software industry By Anamika Kumari, Content Writer, Allied Analytics LLP Veracrypt tracked the success route of Truecrypt with great agility. The […]
Cryptocurrency miners infected more than 50% of the European airport workstations
Researchers at Cyberbit spotted a crypto mining campaign that infected more than 50% of the European airport workstations. Security experts at Cyberbit have uncovered a crypto mining campaign that infected […]
Chinese-speaking cybercrime gang Rocke changes tactics
Chinese-speaking cybercrime gang Rocke that carried out several large-scale cryptomining campaigns, has now using news tactics to evade detection. Chinese-speaking cybercrime gang Rocke, that carried out several large-scale cryptomining campaigns […]
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating […]
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts […]
Business Risk Intelligence: A Necessity Across the Enterprise
By Josh Lefkowitz, CEO at Flashpoint While the Deep & Dark Web has yielded important security considerations for some time, it’s really been in the last 18 months that the […]
Charming Kitten Campaign involved new impersonation methods
Iran-linked APT group Charming Kitten employed new spear-phishing methods in attacks carried out between August and September. Security experts at ClearSky analyzed attacks recently uncovered by Microsoft that targeted a […]
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding […]
The independent wireless networks
By Milica D. Djekic The wireless technologies would actively attract the researcher’s attention during the last few decades. The era of wireless information transfer has begun around two centuries ago […]
2 Sure Ways To Prevent Cyber Crime
By Laban Moturi, Blogger and Writer. From writersbase.org writing company The World has come close and closer with the usage of the internet. With the growth of this, many evils […]
A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns
Confiant researchers have discovered a new Mac malware dubbed Tarmac distributed via malvertising campaigns in the US, Italy, and Japan. Security experts at Confiant have discovered a new Mac malware […]
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]
The IoT Boom and The Implications on Our Home Networks
By Domenico Crapanzano, is CEO of Fing Over the past year you have probably seen ‘Internet of Things’ (IoT) popping up all over the place, but what does this vague […]
SIM cards used in 29 countries are vulnerable to Simjacker attack
Security researchers at Adaptive Mobile who discovered the SimJacker issue have published the list of countries where mobile operators use flawed SIM cards. Exactly one month ago, researchers at AdaptiveMobile Security disclosed […]
Software Forensics: Beyond the Law
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction Traditionally, the term “forensics” is the use of science to discover evidence of criminal activity. Extending this to software broadens the use […]
The reasons to catastrophical events within a critical infrastructure
By Milica D. Djekic Many would believe that the reasons for catastrophic events within any industrial infrastructure could be based on skillfully prepared hacker’s attacks. Basically, that’s the case with […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
Startups with Information Security in Mind at Startup
What’s this all about and does it really matter? By Kip There are some very talented people starting a company’s solving very complex problems that can save organizations millions of […]
The Trials and Errors of Security Operations Revealed in New Report
By Roberto Sandoval, Manager, WW SIOC Strategic Solutions & Enablement, HPE Security The security industry is going through a volatile period. Threat actors are becoming bolder and evolving quickly, and […]
What Can You Do To Secure Your Data In The Cloud?
By François Amigorena, CEO and founder, IS Decisions Cloud storage brings so many benefits in terms of productivity and flexibility that it becomes almost impossible for organizations not to use […]
Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
Cybersecurity Awareness Is Not Just For October!
By Joanna Huisman, KnowBe4’s new SVP Strategic Insights & Research. I have a big birthday coming up, and as you can probably guess, I’m less than thrilled about it. I tell […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
Even NASA Has Issues!
Listed Vulnerabilities Need to be addressed By Charles Parker, II; Cybersecurity Lab Engineer From a young age, we become acquainted with NASA through its missions to the Moon, Mars, Saturn, […]