News
-
"60% of Insider Threats Involve Employees Planning to Leave"New research shows that more than 80% of employees with plans to leave an organization take data with them before they go. According to the 2020 Securonix Insider Threat Report based on the analysis of over 300 confirmed incidents, these employees…
-
"Beware of Phishing Emails Urging For a LogMeIn Security Update"Researchers from Abnormal Security have discovered a new phishing campaign targeting LogMeIn users. The phishing email has been made to look like it is coming from LogMeIn and pertains to a security update. The company logo is featured…
-
"RUSI to Investigate Impact of Cyber Insurance on Secure Behaviours"The Royal United Services Institute (RUSI), an independent think tank engaged in defense and security studies, is partnering with the University of Kent (UoK) to conduct research on how cyber insurance impacts security behavior. The project, titled "…
-
"Over Half of Security Leaders Still Rely on Spreadsheets"Panaseer conducted a survey to which more than 400 security leaders within large financial services companies responded. The results of the global survey reveal the many difficulties faced by security leaders in trying to understand their …
-
"The Dangers of Sharing Personal Information on Social Media"According to Joseph Turow, a Professor of Communication at the Annenberg School for Communication, sharing photos and other personal information on social media creates more opportunities for hackers to gain access to accounts. Photos posted on social…
-
"Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions"An infamous business email compromise (BEC) gang called Scattered Canary has submitted hundreds of fraudulent claims with state-level U.S. unemployment websites and coronavirus relief funds. The cybercriminals may have made millions so far from…
-
"Lend Me an Ear"The continued advancement of the Internet of Things will expand the use of biometrics. Fingerprint sensing, iris scanning, and facial recognition are biometrics commonly implemented in smartphones for authentication. Retina scanning, vein recognition,…
-
"Bluetooth Flaw Exposes Countless Devices to BIAS Attacks"Researchers discovered a new vulnerability in the Bluetooth wireless communication protocol that exposes a wide range of devices, such as smartphones, laptops, and smart-home devices, to the so-called Bluetooth Impersonation Attacks (BIAS). The…
-
"Hackers Target Air-Gapped Military Networks"Hackers believed to be operating in China are targeting air-gapped military networks located in Taiwan and the Philippines. The hacking group, known as Tropic Trooper or KeyBoy, has been active since 2011, targeting government, military, healthcare,…
-
"NTT Report Demonstrates Changing Approaches of Cybercriminals"NTT's 2020 Global Threat Intelligence Report (GTIR) highlights advancements in cybercriminals' attack methods, which are presenting significant challenges for organizations. According to the global technology service company, remote code execution and…
-
"Money Is Still the Main Motivating Factor for Hackers, Verizon Report Finds"Verizon recently released its annual Data Breach Investigation Report, which is based on the assessment of 157,000 security incidents faced by Verizon clients across different industries. According to the report, financially motivated data breaches grew…
-
"Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials"Researchers at Cofense have discovered a new phishing campaign that can bypass multi-factor authentication (MFA) on Office 365 to access victims' data stored on the cloud and use it to extort a Bitcoin ransom and to find new victims to target. The…