Security News > 2020
Several cybersecurity companies have spotted campaigns that use coronavirus-themed emails to deliver malware, phishing attempts and scams. The malicious emails warn potential victims about the impact of the coronavirus on the shipping industry.
Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats, according to Malwarebytes. Mac threats are growing, other threats in the spotlight.
Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks. According to researchers at Binary Defense, the newly discovered Emotet sample leverages a "Wi-Fi spreader" module to scan Wi-Fi networks, and then attempts to infect devices that are connected to them.
In Q4 of 2019, advanced, multi-step attacks attempting to evade fraud defenses using a blend of automated and human-driven attacks have been detected. While automated attacks are still prevalent across most industries, the notable rise in human-driven attacks is attributed to fraudsters leveraging what Arkose Labs define as "Sweatshop-like workers" to enhance attacks.
While the IR process is mostly technical, reporting to the organization's management should take place on a much higher-level in order for the non-security savvy executives to understand. To assist CISOs with these tasks, Cynet created the IR Management and Reporting PowerPoint template which apart from providing an actionable response framework, is also clear and intuitive for the executive level.
Entrust Datacard announced two new high-assurance offerings for the company's unified authentication management platform: Passwordless Single Sign On Authentication to improve workforce security and productivity, and Identity Proofing with fully digital identity verification for accelerated customer acquisition and onboarding. The latest Entrust Datacard authentication solutions both increase high-assurance security and simplify user experiences.
The OWASP SAMM is a community-led open-sourced framework that allows teams and developers to assess, formulate, and implement strategies for better security which can be easily integrated into an existing organizational Software Development Lifecycle. Version 2 includes a Quick Start Guide, the SAMM Toolbox that performs assessments and creates roadmaps, and a new Benchmark Initiative that helps teams compare maturity and progress with like-organizations.
Identity Trust is the ability to establish a real-time level of trust for each identity behind every interaction, including payments, account creation, and login events. "To this end, merchants must reimagine their approaches to fraud. Solutions such as Kount's Identity Trust Global Network go beyond machine learning or rules, offering an identity trust data network, advanced AI, and a user experience engine."
GoodData, a leader in end-to-end analytics solutions, announced that its data analytics platform now provides immediate compliance with the new California Consumer Privacy Act, considered the most stringent consumer data privacy act in the United States. "We are in a new era of data privacy. Companies need to comply with new and tougher laws and better serve their customers by meeting new standards for data privacy," said GoodData CEO, Roman Stanek.
Infosys, a global leader in next-generation digital services and consulting, leverages Oracle Cloud technologies to empower businesses across Europe to transform into 'Live Enterprises', helping them drive intuitive decisions, automate processes, create new user experiences and reinvent businesses for accelerated growth. Bpost, Belgium's leading postal operator, worked with Infosys to replace a previous Oracle ERP solution with a new system using Oracle Cloud Solutions.