Wednesday, December 11, 2019

Poll Hacks: How Cybercriminals Aim To Disrupt Elections

The UK general election is almost upon us, and it is already turning into one of the most divisive and analysed political events in the country’s history.  Discourse and debate are reaching fever pitch, from parliamentary benches and constituency...

How To Stay One Step Ahead In Retail’s Shifting Cybersecurity Landscape

New advancements in technology are changing the retail industry in unprecedented ways, further blending the physical and digital worlds and forever evolving customer experience. As the industry changes, so do the methods cybercriminals use to steal sensitive data from...

Defender Confidence On The Rise In A Maturing UK Cyber Threat Landscape

Looking at the headlines around cyberattacks and security breaches, we’d be forgiven for thinking that organisations face an insurmountable cybersecurity task. However, when we delve deeper into the UK cybersecurity landscape, a more nuanced picture emerges. In fact, there...

Why Sandboxing Is A More-than-worthwhile Addition To Your Network Protection

To anyone unfamiliar with the term, ‘sandboxing’ might sound like something that toddlers would like to do at nursery school – or maybe a specialist one-to-one combat beach sport. It’s neither, of course. Sandboxing is actually the term the...

Shining A Spotlight On UK Cyber Security Standards

Public sector organisations in the UK are in the midst of changing cyber security regulations. In mid-2018, the Government, in collaboration the NCSC, published a minimum set of cyber security standards. These standards are now mandated, along with a...

Automated Systems Only: Why CISOs Should Switch Off Their Dumb Machines

Cyber security is supposed to reduce risk and be cost effective at the same time. It’s supposed to take the burden of legwork away from the CISO and his or her team. It’s supposed to reduce the financial and...

Bolstering Cyber Security: New Job Roles To Defend Against The Evolving Threat Landscape

2019 has been another unprecedented year for cyber threats, with some of the world’s biggest technology companies, banks, political parties and even nation-states all coming under attack. It would seem that no one is safe. Our trust in the...

The Most Dangerous Software Errors Of 2019: More Evidence Of History Repeating

The amazing community at MITRE recently published their list of the CWE Top 25 Most Dangerous Software Errors affecting the world in 2019. This list isn’t opinion-driven, it is the result of multi-faceted analysis utilizing the work of organizations...

Look Out For Business Email Compromises

Phishing has emerged as one of the most dangerous types of security threats for businesses, with phishing attacks growing in the second quarter of this year, especially against software-as-a-service and webmail services. That’s according to a recent report by...

Delivering A Secure IoT Network To Exploit Digital Twins

Organizations today face a tsunami of data and have turned to advanced digital solutions for real-time visibility across their entire value chain of assets and operations. An example of this technology is the digital twin, which has been augmented...

For Caught In The Crossfire Of Cyberwarfare

The 2019 National Cyber Security Centre’s (NCSC) Annual Review does not shy away from naming the four key protagonists when it comes to state-based cyber threats against our country. The review sites China, Russia, North Korea and Iran as...

The Human Factor In Organisational Cyber Resilience

The academic and industry literature is full of extremely useful research, insights and advice on how people interface with security technology and how that interaction can be enhanced to reduce the chance of a malicious attack. However, the role...

Do You Need To Marie Kondo Your Security Infrastructure?

Implementing cybersecurity can be a lot like the cluttered homes Marie Kondo has turned from messy to ones that inspire joy. Whether you’re a Marie Kondo fan or not, she makes you realize that at some point the ‘stuff’...

The Pursuit Of API-ness

Ray Pompon, Principal Threat Research Evangelist at F5 Networks, examines the ongoing challenge of API visibility and security The word is out. Organisations across the world are finally waking up to the potential of application program interfaces (APIs) transforming business...

The Role Of SaaS In Network Security

Cloud-based network security solutions are becoming increasingly prevalent, and it’s not difficult to understand why when the two worlds responsible for it are currently colliding. On one side, the ever-increasing cybersecurity discussion is forcing companies to take drastic and...
SC Magazine

Pensacola confirms ransomware attack

Pensacola officials confirmed that an ongoing cyberattack that began early Saturday morning is a ransomware attack. While the city did not release any additional details, the Pensacola News Journal said city spokeswoman Kaycee Lagarde confirmed the attack included a ransom, something that...

Trickbot Operators Now Selling Attack Tools to APT Actors

North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.
Brian Krebs

The Great $50M African IP Address Heist

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions...

Intel Issues Fix for ‘Plundervolt’ SGX Flaw

Researchers were able to extract AES encryption key using SGX's voltage-tuning function.

How to stop spam calls right now

Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.