Thursday, October 29, 2020

Post-COVID Cobot Security Is Looking Good

Collaborative robots were gaining momentum in the marketplace before the COVID-19 pandemic arrived. They create situations where humans and machines work safely, side by side. However, the global health threat forced companies to cope with reduced operations and the...

Five Scary Good Cybersecurity Awareness Month Tips For Consumers To Keep In Mind

Don’t Let Spooky Season Get Any More Chilling – Here’s How You Can Keep the Ghouls & Goblins from Stealing your Data Cybersecurity Awareness Month aims to provide individuals with the resources they need to be safer and more...

Remote Working – Malware Is NOT Spread By People

As of October 2020, we would seem to be dug in even deeper into the pit of the global Pandemic with no end game in our forward vision. Thus, those Remote Working, Out of Office forced conditions would not...

Understanding Known Adversary Tactics And Techniques

In the last few years, the MITRE ATT&CK framework has been key to many organisations combatting cyber threats. Essentially the framework is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks. The objective of the framework is to create a comprehensive...

Threats Targeting VoIP Networks As Usage Surges During Pandemic

Internet service providers are seeing a spike in Voice-over Internet Protocol (VoIP) usage driven by the increased adoption of working from home during the COVID-19 pandemic. This has been reported by many companies in the space including Comcast, which has...

Having Everything At Once? Tips For Small Enterprises On How To Choose An EDR Solution That Suits Their Needs

The attacks taking place on small and medium enterprises (SME) are becoming more sophisticated, meaning that they cannot be easily prevented by traditional endpoint protection mechanisms. In such cases, timely incident detection is essential to minimise any potential negative...

Tom Martin Ball, Lead Auditor At Alcumus ISOQAR, Speaks Out About The Future Of Cybersecurity

The shift to home working means new distractions, systems and forms of communication. All of which can lead to mistakes, but the average attack takes 18 months to 3 years to be detected.  So, how do you know if...

Infosec Teams Must Act And Think Differently To Combat Adversaries

The growth in widespread, sophisticated attacks I have been following, with interest, the attacks on the Australian Government which have led to quite a bit of publicity and debate around who the culprits are behind the cyberattacks. Australian Prime Minister, Scott Morrison, confirmed the attacks were widespread across “all levels of government” including in essential services and...

5 Reasons CISOs Need Security Operations, Automation, And Orchestration (SOAR)

Gartner defines SOAR (Security Orchestration, Automation, and Response) as the fusion of three technology markets — security orchestration and automation, security incident response platforms, and threat intelligence platforms — allowing organisations to define and manage incident analysis and response...

9 Security Operations Center Essentials

You’re just about to build a security operations center (SOC). Or maybe you need to make sure the security operations team you already have in place has all the bases covered when it comes to protecting digital assets. Knowing where to...

Cybersecurity Awareness Month 2020: Key Insights From Industry Experts

Now in its 17th year, Cybersecurity Awareness Month continues to play a critical role in raising awareness of the online threats faced by both organisations and individuals alike. This year’s theme – ‘Think Before U Click’ (#ThinkB4UClick) focuses on...

World War 2020 – The Kind War

Introduction to the New Age of Warfare It was in Amsterdam 1993 when presenting a paper at the Virus Bulletin 93 Conference, subject – bypassing anti-virus scanners. It was there in the luxurious Grand Hotel Krasnapolsky where I was...

Tackling The Security Challenges Of A New Remote Working Reality

COVID-19 has already forced major changes to the way we live our lives. Many of these may outlast the pandemic, especially those related to the modern workforce. New working patterns may in the long-run have significant benefits to organisations...

What You Need To Know About Zerologon

Microsoft released an update for CVE-2020-1472 (now known as Zerologon) on August 11, 2020. The Elevation of Privilege vulnerability exists in the Netlogon Remote Protocol and can allow an unauthenticated attacker to obtain domain administrator access. The vulnerability has a CVSSv3...

Three Steps To Manage Third-party Risk In Times Of Disruption

From suppliers and outsourcers, to service providers and distributors, a third-party breach can occur at any point along your supply chain. As attackers continue to look for ways to infiltrate companies through their partners and the third-party ecosystem continues...
The Register

Google Safari Workaround case inspires campaign to sue Facebook in UK’s High Court over Cambridge Analytica app

'Facebook You Owe Us' wants to run a not-quite-class-action-style lawsuit A campaign to sue Facebook over lax privacy policies that allowed Cambridge Analytica to slurp almost a million people's personal data from the social networking website hopes to become...

Hackers are on the hunt for Oracle servers vulnerable to potent exploit

Enlarge (credit: Victorgrigas) Hackers are scanning the Internet for machines that have yet to patch a recently disclosed flaw that force Oracle’s WebLogic server to execute malicious code, a researcher warned Wednesday night. Johannes Ullrich, dean of research at...

REvil Gang Promises a Big Video-Game Hit; Claims Massive Revenue

In a wide-ranging interview, a REvil leader said the gang is earing $100 million per year, and provided insights into the life of a cybercriminal.

Hackers Make Off With Millions From Wisconsin Republicans

According to the Wisconsin Republican Party, thieves used altered invoices to make off with $2.3 million in election funds.

Ransomware Group Targets Hospitals At Height Of Pandemic

The malware attacks also include data theft and the disruption of healthcare services, and appear to be timed to take advantage of the disruptions caused by the Covid-19 pandemic.