The Fragility of a GPS Centric World and the Importance of eLORAN
By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a cyber incident or attack are well understood. What is less understood is […]
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]
Protecting Critical Infrastructure Against Cyberattacks
Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby | Director of Services, Semperis Cyberattacks in any industry cause multiple forms […]
Prominent Carding Marketplace UniCC announced it’s shutting down
One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground carding marketplaces announced it is shutting down. The site was […]
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]
How To Thwart Fraud with Phone Numbers
By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online shopping and cybercriminal activity hit unprecedented figures, hitting merchants’ bottom lines hard. […]
“Owning Your Identity” Through Biometric and Passwordless Innovations
By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between 2020 and 2021, driven in part by the pandemic, the proportion of […]
PYSA ransomware gang is the most active group in November
PYSA and Lockbit were the most active ransomware gangs in the threat landscape in November 2021, researchers from NCC Group report. Security researchers from NCC Group reported an increase in […]
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance […]
The rise of millionaire zero-day exploit markets
Researchers detailed the multi-millionaire market of zero-day exploits, a parallel economy that is fueling the threat landscape. Zero-day exploits are essential weapons in the arsenal of nation-state actors and cybercrime […]
Attackers deploy Linux backdoor on e-stores compromised with software skimmer
Researchers discovered threat actors installing a Linux backdoor on compromised e-commerce servers after deploying a credit card skimmer into e-stores. Security researchers from Sansec Threat Research Team discovered a Linux […]
Iran-linked APT groups continue to evolve
The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian threat actors. The Microsoft Threat Intelligence Center (MSTIC) shared the results of […]
The Top 3 Cyber Security Mistakes and How to Avoid Them
As hacks become more common, organizations have no room for cybersecurity mistakes. By Ivan Paynter, National Cybersecurity Specialist at ScanSource Ransomware cost Americans an estimated $1.4 billion last year, and beyond high-profile hacks […]
Ranzy Locker ransomware hit tens of US companies in 2021
The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had already compromised tens of US companies. The FBI published a flash alert […]
NATO releases its first strategy for Artificial Intelligence
This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in a responsible manner. Artificial Intelligence (AI) is changing the global […]
Source Code Protection Market
Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are […]
SEC warns of investment scams related to Hurricane Ida
SEC warns of investment scams related to Hurricane Ida The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and Exchange […]
The FBI issued a flash alert for Hive ransomware operations
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The Federal Bureau of Investigation (FBI) has released a flaw alert […]
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and […]
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and […]
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To […]
Cloud Security Automation: The Fastest Path to Zero Trust
By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and […]
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez […]
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today […]
XCSSET MacOS malware targets Telegram, Google Chrome data and more
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and Google Chrome. Security researchers from Trend Micro continues to monitor […]
Takeaways from The Oldsmar Water Attack & What Security Leaders Can Do About It
With Real Examples & Screenshots of Cyber Attacks on Water & Wastewater Facilities By Michael Yehoshua, VP of Global Marketing, SCADAfence Over the last few months, cybersecurity journalists and the […]
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle leaders faced last year. As we begin 2021, it’s important to remember […]
BIOPASS malware abuses OBS Studio to spy on victims
Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Researchers from Trend Micro spotted a new malware, dubbed BIOPASS, that […]
Biden discussed Russian ransomware gangs with Putin in a phone call
President Joe Biden expressed concerns about ransomware attacks carried out by Russian gangs during a phone call with President Vladimir Putin. The recent wave of ransomware attacks carried out by […]