Security News

The Business of Hackers-for-Hire Threat Actors
2022-08-10 10:20

For the most part, hackers don't even have to hide in the dark recesses of the web to take advantage of people any longer; they can be found right in plain sight on social media sites or forums, professionally advertised with their websites, and may even approach you anonymously through such channels as Twitter. A series of new DDoS for Hire are commoditizing the art of hacking and reducing the barrier to launching DDoS attacks.

Majority of SMBs lack 24/7 security operations to detect threats
2022-08-10 08:00

Cybercriminals and threat actors work around the clock, with attacks originating from around the world. All businesses, including SMBs, need to be always on alert for new threats and available to respond at any moment to an incident.

Real-world threat response: What are organizations doing wrong?
2022-08-10 05:00

In this video interview with Help Net Security, Stephanie Aceves, Sr. Director of Threat Response, Product Management at Tanium, talks about what organizations are doing wrong when it comes to threat response. Aceves illustrates interesting situations she encountered during ethical hacking engagements, and offers advice to CISOs that want to hire a red team.

How older security vulnerabilities continue to pose a threat
2022-08-08 17:00

Patching security vulnerabilities should be a straightforward process. A report released Monday, August 8, by security firm Rezillion looks at how older vulnerabilities patched by the vendor still pose risks to organizations.

Threats targeting fintech companies are on the rise
2022-08-05 08:00

In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and questioned fintech preparedness; some claimed that the industry players are more susceptible to virtual threats than traditional banking, with greater resources at their disposal.

Businesses lack visibility into run-time threats against mobile apps and APIs
2022-08-04 08:00

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance of apps versus the level of focus and resources applied to protect organizational apps against runtime threats. This Help Net Security video reveals how run-time security threats against mobile apps and APIs continue to inflict damage on organizations.

Microsoft widens enterprise access to its threat intelligence pool
2022-08-03 21:31

Microsoft says it will give enterprise security operation centers broader access to the massive amount of threat intelligence it collects every day.Both services - Defender Threat Intelligence and Defender External Attack Surface Management - use technologies that Microsoft inherited when it bought cybersecurity company RiskIQ for $500 million in 2021.

Sonatype shines light on typosquatting ransomware threat in PyPI
2022-08-03 17:15

Miscreants making use of typosquatting are being spotted by researchers at Sonatype, emphasizing the need to check that the package is really the one you meant to download. The latest packages detected use variations of the spelling of "Requests", a hugely popular HTTP library available via PyPI. Of the project, the description notes: "Requests is one of the most downloaded Python packages today, pulling in around 30M downloads / week - according to GitHub. Requests is currently depended upon by 1,000,000+ repositories." Focusing on the requesys package, researchers found scripts that would stomp over Windows user's folders and begin encrypting files.

Threats emanating from digital ecosystems can be a blind spot for businesses
2022-08-01 08:00

Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, according to Tata Consultancy Services. This Help Net Security video highlights how confident executives are about their cyber strategy.

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office
2022-07-28 17:24

Threat actors are finding their way around Microsoft's default blocking of macros in its Office suite, using alternative files to host malicious payloads now that a primary channel for threat delivery is being cut off, researchers have found. The beginning of the decrease coincided with Microsoft's plan to start blocking XL4 macros by default for Excel users, followed up with the blocking of VBA macros by default across the Office suite this year.