-
"Cyber Threat Intelligence Improves Prevention, Detection, and Response Capabilities"The SANS 2018 Cyber Threat Intelligence Survey sponsored by DomainTools reveals that organizations are increasingly embracing the use of Cyber Threat Intelligence (CTI) in the battle against cyberattacks and hackers. The report highlights the importance…
-
"Researchers Show Docker Containers at Risk for Crypto-Currency Attacks"Researchers at Aqau Security Software conducted an exercise in which the operation of cryptocurrency mining by cyberattackers within cloud containers is further explored. The process of installing Monero cryptocurrency mining malware onto Docker…
-
"International Hackers Find 106 Bugs in U.S. Air Force Websites"The U.S. Air Force recently launched a bug bounty competition to which 25 white-hat hackers participated. The ethical hackers uncovered security vulnerabilities contained by the branch’s public-facing websites. The discoveries made by participants will…
-
"Security Awareness Training Top Priority for CISOs: Report"The FS-ISAC’s 2018 Cybersecurity Trends Report indicate that employee training should be a top priority for CISOs in the improvement of cybersecurity within organizations in the financial sector. The report emphasizes the need for organizations to…
-
“Meltdown-Spectre flaws: We’ve found new attack variants, say researchers”In a new report from Nvidia and Princeton, researchers from both organizations have discovered new variants of Meltdown and Spectre, dubbed “MeltdownPrime” and SpectrePrime”. MeltdownPrime and SpectrePrime have a similar accuracy to their original…
-
“Crowdsourcing Cyber Threat Defense”418 Intelligence Corporation, a cybersecurity company based in Herndon, VA, was awarded $350,000 by the Department of Homeland Security in support of developing a game-based cybersecurity forecasting system. The platform will be used by organizations to…
-
"To Prevent Cyberattacks, Agency Similar to National Transportation Safety Board Suggested"Indiana University research recommends the establishment of a National Cybersecurity Safety Board similar to the National Transportation Safety Board in regards to its approach to investigation. Researchers have emphasized the need to create an…
-
“Energy-Efficient Encryption for the Internet of Things”MIT researchers have developed a new chip to efficiently execute public-key encryption protocols for IoT devices. The chip performs public-key encryption with significantly faster execution, and consumes less power and memory than the software used to…
-
"Tackling the insider threat: Where to start?"Global security strategist at Absolute, Richard Henderson, emphasizes the importance of mitigating insider threats as several major breaches of data have been found to be caused by insiders. Insiders pose a significant threat to the security of…
-
"Security Shortage Forces CISOs to Increase Reliance on Machine Learning"F5 Labs and Ponemon conducted a survey to which CISOs from many different enterprises responded. The results of the survey indicate that CISOs are relying more on machine learning to help perform IT security functions due to the significant shortage of…
-
"UDPoS PoS Malware Exfiltrates Credit Card Data DNS Queries"Researchers at ForcePoint Labs have discovered a new point-of-sale (PoS) malware called UDPoS that uses User Datagram Protocol (UDP) DNS traffic to steal credit card information. The malware is distributed under the guise of an update from a remote…
-
“Winter Olympics Cyberattack Designed to Cause Chaos”The PyeongChang Winter Olympics recently faced a cyberattack that disrupted internal servers and public Wi-Fi. According to Cisco’s Talos Intelligence Group, the motive behind the cyberattack was to cause disruption and not to infiltrate official…
News