Security News

Obstacles and threats organizations face when protecting AD
2021-10-06 05:00

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates which focuses on Active Directory, exploring the obstacles and threats organizations face when protecting AD and how they adapt to address these growing concerns. As evidence of the value that attackers place in exploiting Active Directory and the privileges it contains, the report revealed that 50% of organizations experienced an attack on Active Directory in the last 1-2 years, with over 40% indicating the attack was successful.

For adapting to new cloud security threats, look to “old” technology
2021-10-05 06:00

While there is a time and place for onboarding additional cloud security solutions, it can also be easy to fall prey to the shiny object syndrome surrounding emerging solutions that are created in response to new security threats. Before rushing to invest in a new solution remember that matching additional solutions to emerging threats in a one-to-one game of whack-a-mole is not a sustainable strategy.

Week in review: 3 ways to guard against insider threats, cybersecurity posture validation
2021-10-03 08:00

Leveraging threat intelligence to tackle supply chain vulnerabilitiesIn this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain vulnerabilities and how the right threat intelligence can help stay on top of these threats. 3 ways any company can guard against insider threats this OctoberOctober is Cybersecurity Awareness Month, but most business leaders and consumers don't need a special event to remember cybersecurity's preeminence in today's turbulent digital landscape.

The Top Ransomware Threats Aren’t Who You Think
2021-09-30 12:50

Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally. While there seem to be legions of ransomware gangs, it turns out that just a handful of ransomware-as-a-service actors dominate the entire ecosystem of encryption-attack threats.

Attacks against Remote Desktop Protocol endpoints have exploded this year, warns ESET's latest Threat Report
2021-09-30 09:30

Security specialist ESET's latest Threat Report warns of a massive increase in attacks on Remote Desktop Protocol endpoints - and new activity from the Nobelium gang against European government organisations. ESET's figures show attacks on RDP servers having gone up 103.9 per cent since its T1 report in June - it publishes three a year - representing a total of 55 billion detected brute-force attacks, thanks in no small part to a campaign focused on Spanish targets.

Third-party risk prevention strategies inadequate despite organizations being aware of the threats
2021-09-30 05:00

While organizations recognize third-party threats expose them to great risk, many organizations fail to take adequate measures to mitigate it. Current third-party risk prevention strategies leave organizations vulnerable.

Nation-state attacks fears grow, execs don’t trust governments to protect them from cyber threats
2021-09-30 04:30

Private sector remaining skeptical about govt's ability to mitigate cyber threats. Despite recent interventions into cybersecurity issues, executives lack faith in the government's ability to protect them from cyber threats, with 60% of organizations believing that spending on new security tools and services is the most effective way of stopping attacks.

CISA releases tool to help orgs fend off insider threat risks
2021-09-29 18:17

The US Cybersecurity and Infrastructure Security Agency has released a new tool that allows public and private sector organizations to assess their vulnerability to insider threats and devise their own defense plans against such risks. The Insider Risk Mitigation Self-Assessment Tool helps orgs determine their risk posture by answering a series of questions about the requirements needed to set up an insider risk program management, the levels of insider risk awareness and training among employees, and the organization's insider risk environment.

Threat Actors Weaponize Telegram Bots to Compromise PayPal Accounts
2021-09-29 13:55

Cybercriminals are using Telegram bots to steal one-time password tokens and defraud people through banks and online payment systems, including PayPal, Apple Pay and Google Pay, new research has found. Threat actors are using Telegram bots and channels and a range of tactics to gain account information, including calling victims, and impersonating banks and legitimate services, researchers said.

Leveraging threat intelligence to tackle supply chain vulnerabilities
2021-09-29 05:00

In this interview with Help Net Security, Brandon Hoffman, CISO at Intel 471, talks about the growing threat of supply chain attacks, the most common supply chain vulnerabilities and how the right threat intelligence can help stay on top of these threats. We are witnessing a growing number of supply chain attacks lately, and cybercriminals are becoming stealthier and smarter.