Read the original article: 7 key steps to Zero Trust This is part 3 of a 3 part blog series My last two blog entries provided some key elements of a Zero Trust Network (ZTN), which focused on the tenets of…
Tag: Cybersecurity Insiders
AT&T Cybersecurity announces ‘Partners of the Year Awards’ Winners
Read the original article: AT&T Cybersecurity announces ‘Partners of the Year Awards’ Winners After weeks of deliberation, we are delighted to announce the winners of the AT&T Cybersecurity 2019 Partners of the Year Awards. Binary Defense has been crowned Global…
Increase in Cyber Threats from North Korea says the US
Read the original article: Increase in Cyber Threats from North Korea says the US United States has issued a warning related to an increase in Cyber Threats from North Korea and the alert was issued on a joint note early…
Assess and adapt for resiliency
Read the original article: Assess and adapt for resiliency Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either…
The Bitglass Blog
Read the original article: The Bitglass Blog California is setting the stage for compliance in 2020 with the enactment of the California Consumer Privacy Act (CCPA).The statute that went into effect on the first of January expands the rights of…
Here is why your healthcare provider cannot accept Venmo payments
Read the original article: Here is why your healthcare provider cannot accept Venmo payments This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments? People use Venmo for everything, and in these…
Cloud Security concerns increase during Corona Virus Pandemic
Read the original article: Cloud Security concerns increase during Corona Virus Pandemic A recent survey conducted by a firm named Fugue has discovered that the COVID 19 spread has raised serious concerns over cloud security among IT and cloud professionals.…
Tape the Webcam and enable Firewall tops Work-from-Home Cybersecurity tips
Read the original article: Tape the Webcam and enable Firewall tops Work-from-Home Cybersecurity tips As soon as the world switched to a lockdown due to Coronavirus Pandemic, many IT companies initiated their employees to work from home to keep their…
Ransomware attack news stories trending on Google
From the past few hours’ news related to Portuguese Multinational Energy Giant Energias De Portugal (EDP) is doing several rounds on Google and it states that the power supplier was targeted by a Ragnar Locker Ransomware attack who stole over…
Over 500,000 Zoom App user credentials available on the dark web
Zoom App has been in news from the past two weeks for having security vulnerabilities that can be exploited by hackers. Now, the news is out that some hacking group/s have already exploited the flaws and have stolen over 500,000…
Can incident response be fun?
Cyber attacks are unfortunately inevitable. It’s important to security harden your networks as much as possible. But your organization must also be prepared for incident response. Effective incident response involves an awareness of various cyber risks and threats, having a…
Slack phishing attacks using webhooks
Background Slack is a cloud-based messaging platform that is commonly used in workplace communications. It is feature-rich, offering additional functionality such as video calling and screen sharing in addition to a marketplace containing thousands of third-party applications and add-ons. Slack…
Containerization and Container Orchestration Platform Protection: Cloud Workload Security Part 3
As we mentioned in a previous blog, the “Forrester Wave™: Cloud Workload Security, Q4 2019” report provided an excellent overview of the security challenges posed by cloud-based environments and the cloud workload security solutions best poised to address them based…
Ford and Volkswagen Connected cars are suffering from serious security vulnerabilities
The connected car technology being offered in Ford Focus and Volkswagen Polo cars are reported to be filled with security vulnerabilities. Experts say that hackers can easily take control of the systems in these two of the most popular cars…
Ransomware attack on Digital Services of Florida Town
Sodinokibi Ransomware gang has again struck a town in Florida disrupting the digital services until a ransom is paid. The town in the discussion is Jupiter Town located in Pal Beach County and was assigned with the tag of 9th…
Mediterranean Shipping Company MSC hit by a Cyber Attack
Mediterranean Shipping Company shortly known as MSC was hit by a cyberattack on April 9th last week disrupting the services of the company across the world to a partial note. Highly placed sources say that the impact could have been…
CloudPassage Response to COVID-19
At CloudPassage we’re keenly aware of the disruption and stress being caused by the COVID-19 outbreak and related quarantine orders. We’re seeing impact across our ecosystem of customers, teams, and other stakeholders worldwide. Communication is critical in situations like this,…
Monero replaces Bitcoin for Sodinokibi Ransomware operators
As Bitcoins and BTC transactions are no more anonymous, those propelling Sodinokibi Ransomware have decided to abandon Bitcoin and switched to Monero Cryptocurrency acceptance. It is already a fact that law enforcement agencies with the help of some technology companies…
Data Breach at San Francisco International Airport
A hacking group that infiltrated into the network of San Francisco’s International Airport in March 2020 is reported to have access login credentials used by employees on two of its websites- SFOConnect.com and SFOConstruction.com. And the interesting part in this…
Zoom App hires Facebook Security Chief after ban from Google and Amazon
After Google, Amazon, and Microsoft announced to the workforce to not use the video conferencing app for any business purposes, Zoom has appointed Ex-Facebook Security Chief Office Alex Stamos as an adviser to improve security and privacy quotient on the…
10 tips for working remotely
We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as…
The future of cybersecurity for connected cars
Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…
Common focal points of DoS attacks
This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…
9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience
This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or…
The Zero Trust Authorization Core
This is part 2 of a 3 blog series The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust. One of the tenets mentions how all network flows are to be authenticated…
Travelex ransomware attack hackers receive $2.3 million n might lead to assets sell-by Finablr
In January this year, Travelex experienced a ransomware attack leading to the shutdown of the website and other online services such as foreign exchange in Tesco and Asda banks. The company later confirmed that the incident took place on…
World laughing at the myth that 5G spreads Coronavirus
When the whole world pointed fingers at China for starting a Bio-War via Wuhan Virus, a certain section of the media started to shift the focus of the issue by claiming that 5G Network and its radiation is spreading Corona…
Ransomware gang leaks documents of Lockheed Martin, Tesla, and Boeing
A Ransomware attack that took place on US aerospace manufacturing and design contractor Visser Precision has now led to the leak of some sensitive information related to companies belonging to aerospace, automotive and industrial manufacturing industries. As the contractor…
Stories from the SOC- RIG Exploit Kit
Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…
AT&T Cybersecurity announces ‘Partners of the Year Awards’ Winners
After weeks of deliberation, we are delighted to announce the winners of the AT&T Cybersecurity 2019 Partners of the Year Awards. Binary Defense has been crowned Global Partner of the Year for their phenomenal growth and commitment in 2019. They…
Here is why your healthcare provider cannot accept Venmo payments
This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments? People use Venmo for everything, and in these times when no one wants to handle actual money for fear of spreading infection,…
Assess and adapt for resiliency
Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either a daunting task or a non-existent option. This shift…
Zscaler acquiring Cloudneeti
Zscaler, the cloud-based information security platform is all set to acquire Cloudneeti, a cloud security posture management company that allows MSPs to track down misconfigurations across multi-cloud environments. Meaning, it helps users in analyzing and fixing misconfigurations across Amazon Web…
Box bolsters its Cloud Security with automated Malware Detection Shield
Box, a Cloud Content Management and file-sharing company, has announced that it has added automated malware detection capabilities to its Cloud Security controls which help in protecting stored content in the cloud. Dubbed as Box Shield, the service sets…
Avast launches Android version Secure Browser
Czech based Multinational Cybersecurity firm Avast has made an official announcement yesterday that it’s Avast Secure Browser which is an encrypted browser for Android OS users is now commercially available. Thus, with the latest declaration, we can conclude that the…
Windows Server 2019 OS hardening
This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration…
The foundation of a Zero Trust architecture
Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss. Even the most advanced “next generation” application layer firewalls…
10 tips for working remotely
We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as…
9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience
This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or…
The Zero Trust Authorization Core
This is part 2 of a 3 blog series The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust. One of the tenets mentions how all network flows are to be authenticated…
Common focal points of DoS attacks
This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…
The future of cybersecurity for connected cars
Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…
Italy Email service provider data breach leaks info of its 600000 users
Italy’s Email service provider named Email.it is in the news headlines for all wrong reasons these days. As news is out that the data of more than 600,000 users are being sold on the dark web. The mail service provider…
Accenture purchases Revolutionary Security
Accenture has released a statement yesterday that Cybersecurity firm Revolutionary Security is now a part of Accenture Security on an official note. The financial figure involved in the purchase deal is yet to be disclosed. But highly placed sources from…
Prevention can reduce Cyber Attack loss to $1.4 Million per attack
Companies can reduce their Cyber Attack loss by up to $1.4 Million per attack if in case they have effective mitigation measures in place. This was revealed in a study conducted by Ponemon Institute in association with Deep Instinct. …
AT&T Cybersecurity announces ‘Partners of the Year Awards’ Winners
After weeks of deliberation, we are delighted to announce the winners of the AT&T Cybersecurity 2019 Partners of the Year Awards. Binary Defense has been crowned Global Partner of the Year for their phenomenal growth and commitment in 2019. They…
Stories from the SOC- RIG Exploit Kit
Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…
Exploits, vulnerabilities and threat adaptation
Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners. There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…
Here is why your healthcare provider cannot accept Venmo payments
This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments? People use Venmo for everything, and in these times when no one wants to handle actual money for fear of spreading infection,…
AT&T Cybersecurity announces ‘Partner of the Year Awards’ Winners
After weeks of deliberation, we are delighted to announce the winners of the AT&T Cybersecurity 2019 Partners of the Year Awards. Binary Defense has been crowned Global Partner of the Year for their phenomenal growth and commitment in 2019. They…
An increase in Cyber Attacks witnessed by Trend Micro
Japan-based Cybersecurity firm Trend Micro has revealed that its Cyber Threat report that at least 8 billion cyber threats were blocked in the first two months of the year 2020. And the enterprise security offering software company has highlighted in…
How to protect your business against coronavirus-related cyberattacks
In the midst of this unprecedented global health crisis affecting the whole world, hackers are taking advantage of it by looking for ways to compromise companies’ IT systems and get access to valuable data. They are using the pandemic as…
China starts attacking Trump for Coronavirus outbreak with fake Facebook ads
China has started to pin the blame on US President Donald Trump by creating fake Facebook (FB) ads which blamed the 73-year old president for the outbreak of Novel COVID 19. After listening to a lot from the world…
Do you have the GRIT to be a cybersecurity consultant?
As I read Angela Duckworth’s GRIT, where she explains that the secret to outstanding achievement is not talent but a unique blend of passion and persistence she calls “grit,” I was able to relate the need for this power of…
The foundation of a Zero Trust architecture
Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss. Even the most advanced “next generation” application layer firewalls…
Common focal points of DoS attacks
This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…
The Bitglass Blog
California is setting the stage for compliance in 2020 with the enactment of the California Consumer Privacy Act (CCPA).The statute that went into effect on the first of January expands the rights of Californians over their data. It gives the…
Hacker earns $75k for finding 3 critical vulnerabilities in Apple Safari Browser
Apple Inc has once again proved that it keeps its word when it comes to rewarding white hat hackers who find security flaws in its products. As recently it rewarded a hacker with $75,000 for finding seven flaws in Apple’s…
Apple Inc acquires AI Voice Startup to improve SIRI
Apple Inc has acquired a Dublin based AI Startup which offers technology that enables 3rd parties to integrate high-quality voice and natural language capabilities into their digital products. Dubbed as Voysis, this conversational Artificial Intelligence platform is said to help…
Interpol warns healthcare providers against Maze Ransomware spread
The International Criminal Police Organization aka Interpol has issued a warning to healthcare providers operating across the globe that Maze Ransomware spreaders might target more hospital networks in the coming weeks which are fighting against the COVID 19 pandemic. …
The future of cybersecurity for connected cars
Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…
10 tips for working remotely
We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as…
Malicious Actors and Medical Data: Where Are We Heading?
Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are most interested in: your medical data. Whereas a credit card number or Social Security number can net a criminal…
9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience
This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or…
Exploits, vulnerabilities and threat adaptation
Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners. There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…
The Power of Community to Fight COVID-19 Cyber Threats
Cybercriminals are taking advantage of the fear and uncertainty surrounding the current global health and economic situation as well as sudden shifts and exposures in IT environments to launch COVID-19 related attack campaigns. The bad guys are moving full-steam ahead…
Microsoft issues Ransomware alert to Hospitals amid Corona Pandemic spread
Microsoft has first of its kind issued a notification early today that various hospitals operating across the world are vulnerable to Ransomware attacks as the VPNs and Gateways used by the healthcare providers are exposed to several hacking units. …
Video Conferencing Zoom App is filled with Security Vulnerabilities
Video Conferencing Zoom App which allows employers to stay connected with their employees in work from home situations is in news for all wrong reasons. Security research has discovered two flaws in the Zoom App and stated that it allows…
Samsung wins a Mobile Security project from Italy
Samsung SDS, the IT wing of Samsung Group has won a defense mobile security project from Italy in March 2020. Thus, the said Italian project happens to be the first defense project of the South Korean Company which is already…
Stories from the SOC- RIG Exploit Kit
Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…
Here is why your healthcare provider cannot accept Venmo payments
This blog was written by an independent guest blogger. Are you using Venmo to send and receive payments? People use Venmo for everything, and in these times when no one wants to handle actual money for fear of spreading infection,…
Ransomware attack on websites of COVID 19 treatment and Italy Social Security
Hackers seem to be finding it easy to target healthcare providers these days especially when the crisis of Coronavirus spread is at its peak as this is evident from what has been reported in the past couple of weeks. Earlier,…
Corona Virus hits a major Merger and Acquisition deal of HP and Xerox
The three months of COVID 19 spread across the globe has started to show its influence on the in-process Merger and Acquisition deals as US Printer maker Xerox has officially announced that it is walking out of the $35 billion…
Amazon Detective launched to detect Cloud Security Anomalies
Amazon Web Services shortly dubbed as AWS has launched a security tool named Amazon Detective to visualize anomalies on cloud security measures taken up by customers. This smart tool will be using Machine Learning skills backed by Artificial Intelligence to…
Do you have the GRIT to be a cybersecurity consultant?
As I read Angela Duckworth’s GRIT, where she explains that the secret to outstanding achievement is not talent but a unique blend of passion and persistence she calls “grit,” I was able to relate the need for this power of…
Corona-cation? Here’s How to Work From Home Securely
By now, the whole world is feeling the effects of a tiny little troublemaker called SARS-CoV-2 or Coronavirus (or COVID-19; oh so many choices!). Every piece of news, every conversation and certainly every WhatsApp message is fixated on this rapidly…
The rising threat of drones to cybersecurity: What you need to know
This blog was written by an independent guest blogger. The Federal Aviation Administration (FAA) reports that there are nearly 1.5 million registered drones in the United States, proving them to be ubiquitous across the country – and there are plenty that are…
The foundation of a Zero Trust architecture
Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss. Even the most advanced “next generation” application layer firewalls…
Cyber Attack on Marriot Hotel leaks data related to 5.2 million guests
Marriot has announced that it has become a victim of a major cyber attack which could have probably leaked information of more than 5.2 million guests. And FYI, Marriot experienced a similar cyber incident in Nov’18 when suspected Chinese hackers…
Artificial Intelligence-based App uses the human voice to test for Corona Virus
To all those who are concerned that they might be a victim of Corona Virus and are in a panic situation on whom to approach and what to do to confirm the infection, here’s some good news. Researchers from Carnegie Mellon University have…
The future of cybersecurity for connected cars
Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…
10 tips for working remotely
We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as…
Windows Server 2019 OS hardening
This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration…
Malicious Actors and Medical Data: Where Are We Heading?
Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are most interested in: your medical data. Whereas a credit card number or Social Security number can net a criminal…
9 Reasons to hire an InfoSec candidate without experience: Focus on skillset vs. experience
This blog was written by an independent guest blogger. $37-$145k jobs for InfoSec specialists without experience. Hiring immediately. This is what a simple internet search has to offer for people looking to get entry-level jobs in Information security (InfoSec), or…
US Air Force launches Cyber Attacks on GPS Systems
US Air Force reportedly launched cyber attacks on GPS Systems early this year says a source familiar with the news due to Congressional mandate. However, the attack was launched by an experts team of Booz Allen on behalf of US…
Japan to invest $237.12 million in Artificial Intelligence to counter Cyber Attacks
The Ministry of Defense (MoD) of Japan has confirmed that it is going to invest over 25.6 billion Yen or $237.12 million in USD to develop Artificial Intelligence-based tools to counter cyber attacks. Japan aims to develop an all-inclusive AI…
Hacked Houseparty App infiltrates Netflix and Spotify accounts
Houseparty App which allows people to video chat with a group of friends or relatives at a time or one-by-one is in news for all wrong reasons during the 8th day of UK Lockdown. Some users of the said…
Exploits, vulnerabilities and threat adaptation
Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners. There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…
Stories from the SOC- RIG Exploit Kit
Executive summary AT&T Alien Labs® Open Threat Exchange® (OTX) recently created a pulse for a new threat entitled the RIG Exploit Kit which had been observed distributing ransomware to victim companies across a variety of industry verticals. This exploit was…
Data Security fears make way to Huawei App Gallery
As soon as US President Donald Trump decided to ban the use of Huawei smartphones, and 5G related devices on the soil of North America, the Chinese Telecom giant started to work on its own App Gallery which will help…
Microsoft disinvests from Israeli Startup due to Espionage allegations
Microsoft has made it official that it is going to withdraw from an investment agreement that is made with an Israeli startup which was into the development of facial recognition software. Although the company never made its intention for disinvestment…
How to keep your Work from Home strategy Cyber Secure
As many people across the world are working from home these days to keep their office operations going, hackers are seeing these devices as vulnerable points to infiltrate corporate networks. So, here are some strategies that can make your work…
Examining Potential Election Vulnerabilities – Are They Avoidable?
By Tim Matthews, Chief Marketing Officer at Exabeam In the U.S and global communities, election security is a large concern because so many aspects of it can be insecure and open to attacks that may shift public opinion or be…
How to spot a fake app?
This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user…
Google tracks down 40000 State-funded Cyber Threats
Google Threat Analysis Group(TAG) has announced that it has tracked down more than 40,000 state-backed cyber attacks on its account holders in 2019. The web search giant claims that the year 2018 witnessed 25% higher cases when compared to last…
Phishing Threats Increase with COVID 19 Outbreak
The recent COVID 19 pandemic has changed the way that businesses are operating around the entire country. Some businesses are forced to temporarily shut down, while others are trying to adjust to the changes of working remote and innovating new and…
French government announces $4.3 billion plan to support startups
As France and entire Europe is struggling to contain the spread of Covid 19 pandemic, financial experts suggest that the chances are ripe for the next recession to emerge by August this year. So, under such circumstances, the government of…
Data Stealing Ransomware hits Chubb Insurance and Kimchuk
1.) Chubb Insurance has issued an official statement yesterday that it was hit by data-stealing Maze Ransomware who are now threatening to release a portion of sensitive data if the company doesn’t bow down to the demands of its hackers.…
Do you have the GRIT to be a cybersecurity consultant?
As I read Angela Duckworth’s GRIT, where she explains that the secret to outstanding achievement is not talent but a unique blend of passion and persistence she calls “grit,” I was able to relate the need for this power of…