Security News
The most vulnerable devices include laptops, computers, smartphones and tablets, networked cameras and storage devices, and streaming video devices, a new report found. The most vulnerable connected home devices include laptops, computers, smartphones and tablets, networked cameras, networked storage devices, and streaming video devices, according to the report.
Despite being concerned about the security risks behind online shopping, consumers lack knowledge about some of the biggest retail risks - with more than half unaware of digital credit-card skimming threats posed by the Magecart group. According to the research, 85 percent are at least mildly concerned about their personal information being compromised when shopping through a website or browser; while 88 percent of shoppers are at least mildly concerned about the safety of mobile apps for retail purposes.
Group-IB has revealed the results of its yearslong development of proprietary high-tech products for threat hunting and research - Threat Intelligence & Attribution and Threat Hunting Framework. The creation of TI&A marks the emergence of a new type of solutions for collecting data on threats and attackers relevant for a particular organization with the aim of examination and proactive hunting for threat actors, research, and protection of network infrastructure.
Cyber Risk Aware announces a new partnership with one of the UK's largest cyber security solutions providers, Blue Cube Security. Cyber Risk Aware and Blue Cube Security have joined forces on a mission to tackle the increasing cyber threat to businesses and organisations in the UK. Over the last year, 98% of security professionals in the UK have reported an increase in cyber-attacks, with 96% revealing more sophisticated methods being used in these attacks.
A Chinese threat actor tracked as Mustang Panda was observed using an updated arsenal of tools in recent attacks, Proofpoint's security researchers revealed on Monday. Also referred to as TA416 and RedDelta, the threat group is known for the targeting of entities connected to the diplomatic relations between the Vatican and the Chinese Communist Party, along with entities in Myanmar, and the new campaign appears to be a continuation of that activity.
Did you know you can join us for a live cybersecurity lecture every Friday? Thanks for watching hope to see you online later this week!
Whether working within a company that has deployed an advanced intelligence program or in one just getting started, there are steps we can take to ensure we're investing in the right mix of products, services and feeds. Data is the lifeblood of threat intelligence programs, but we can't implement a successful program based on feeds alone.
Threat Hunting is one of the most popular techniques used by security analysts for all kinds of investigations. It is both science and, to some degree, inspiration.
State-sponsored programs from China, Russia, Iran and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cyber security warned Wednesday. "The number of cyber threat actors is rising, and they are becoming more sophisticated", the Canadian Centre for Cyber Security said.
Sophos published a report which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level, will shape the threat landscape and IT security in 2021. "Commodity malware can seem like a sandstorm of low-level noise clogging up the security alert system. From what Sophos analyzed, it is clear that defenders need to take these attacks seriously, because of where they might lead.".