Security News
Roskomnadzor, Russia's telecommunications watchdog, has banned the use of Opera VPN and VyprVPN after classifying them as threats according to current Russian law. "In accordance with the regulation on responding to threats to circumvent restrictions on access to child pornography, suicidal, pro-narcotic and other prohibited content, restrictions on the use of VPN services VyprVPN and Opera VPN will be introduced from June 17, 2021," the Roskomnadzor said.
What's shocking is that despite the many advantages cloud and software-as-a-service applications provide organizations, they frequently fall short when it comes to averting data loss. Whether from human error, malicious actors, outages, or other methods, data loss poses a very real risk to the resilience of a business.
Threat actors are exploiting Google Docs by hosting their attacks within the web-based document service in a new phishing campaign that delivers malicious links aimed at stealing victims' credentials. The attack begins with an email that includes a message that could be relevant to business users who commonly use Google Docs within their corporate environment.
Bitglass and Cybersecurity Insiders announced several findings from a report that show the rapid adoption of unmanaged personal devices connecting to work-related resources and why organizations are ill-equipped to deal with growing security threats such as malware and data theft. The study surveyed hundreds of cybersecurity professionals across industries to better understand how COVID-19's resulting surge of remote work has affected security and privacy risks introduced by the use of personal mobile devices.
FireEye announced the launch of Mandiant On-Demand Cyber Intelligence Training. Modern security and risk leaders need to rethink how to cultivate security talent by applying new training methods to build cyber threat intelligence expertise across their organizations.
The head of Britain's National Cyber Security Center has warned it is ransomware that's the key threat for most people. "What I find most worrying isn't the activity of state actors," NCSC chief exec Lindy Cameron told a national security audience, joining the chorus of organisations calling out ransomware criminals as the number one cybersecurity threat of the moment.
Norton Labs revealed the top cybersecurity trends from January to March 2021. Phishing campaigns remained the number one threat to consumer cyber safety, with top scams relating to the pandemic, including vaccine-oriented, financial relief, and tech support scams.
The partnership features a joint solution enabling customers to leverage Flashpoint's advanced threat intelligence within the Cyware Virtual Cyber Fusion platform, equipping security analysts with the enriched and actionable threat intelligence they need to make and act on critical security decisions. With this integration, Flashpoint's threat intelligence becomes a core feature in Cyware's CTIX Lite solution, a uniquely designed threat intelligence platform for smaller cybersecurity teams and mid-sized organizations with pre-bundled intelligence and enrichment sources for end-to-end automation of the entire intelligence lifecycle.
Following the devastating attack on Colonial Pipeline, the largest refined products pipeline in the United States, the Cybersecurity and Infrastructure Security Agency released a fact sheet focusing on the threat posed by ransomware to operational technology assets and industrial control systems. Learn more about threats to industrial systems at SecurityWeek's ICS Cyber Security Conference and SecurityWeek's Security Summits virtual event series.
The Recorded Future co-founder and CEO this week unveiled The Intelligence Fund, an in-house initiative that sets aside $20 million to invest in seed-stage and Series A startups in the nascent threat-intelligence space. Flush with cash from its own $780 million sale to private equity firm Insight Partners, Ahlberg says Recorded Future wants to make early bets on entrepreneurs taking new approaches to collecting and parsing data to feed into security intelligence tools.