Saturday, January 19, 2019

Four Technologies that will Increase Cybersecurity Risk in 2019

Attackers are not just getting smarter, they are also using the most advanced technologies available, the same ones being used by security professionals – namely, artificial intelligence (AI) and machine learning (ML). Meanwhile, the widespread adoption of cloud, mobile and...

Strategies for Winning the Application Security Vulnerability Arms Race

As cyber criminals continuously launch more sophisticated attacks, security teams increasingly struggle to keep up with the constant stream of security threats they must investigate and prioritize. When observing companies that have a large web presence (e.g., retail/e-commerce companies),...

Taking Advantage of Network Segmentation in 2019

Overview Security is and will always be top of mind within organizations as they plan out the year ahead. One method of defense that always deserves attention is network segmentation. In the event of a cyberattack, segmented networks will confine the...

2019 Predictions: What Will Be This Year’s Big Trends in Tech?

2018 was a year that saw major developments in machine learning, artificial intelligence and the Internet of Things, along with some of the largest scale data breaches to date. What will 2019 bring, and how can businesses prepare themselves...

Why Zero Tolerance Is the Future for Phishing

Our Testing Data Shows You’re Letting Me Hack You Every Time Phishing just doesn’t get the love it deserves in the security community. It doesn’t get the headlines, security staff time, or dedicated attention that other, more flashy threat vectors...

Universities Beware! The Biggest Security Threats Come from Within the Network

Higher Education networks have become incredibly complex. Long gone are the days where students connected desktop computers to ethernet cables in their dorm rooms for internet. Now students can access the school’s wireless network at anytime from anywhere and...

IAST Technology Is Revolutionizing Sensitive Data Security

Unauthorized access to sensitive data, also known as sensitive data leakage, is a pervasive problem affecting even those brands that are widely recognized as having some of the world’s most mature software security initiatives, including Instagram and Amazon. Sensitive...

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

In the year ahead, organizations must prepare for the unknown so they have the flexibility to endure unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks...

Unlocking the Power of Biometric Authentication with Behavior Analytics

There are three common types of authentication: something you know (like a password), something you have (like a smart card), and something you are (like a fingerprint or another biometric method). Modern best practices recommend that you use at...

Cybercriminals Hide Malware Commands in Malicious Memes

Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.  The method used to conceal malicious commands is called steganographyand has long been abused by cybercriminals to hide malicious...

Miori IoT Botnet Targets Vulnerability in ThinkPHP

A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn. Dubbed Miori, the threat leverages a relatively new exploit that was published on December 11, and which...

2019, The Year Ahead in Cloud Security

By 2020, more than four-fifths of enterprise data will be cloud-based. This transition is happening even though the cloud is a relatively infant technology. As the cloud explodes into ubiquity, black hat hackers, criminal organizations, and nation-states are adjusting their...

The End (of 2018) Is Near: Looking Back for Optimism

Prognostication is risky business. Just days after I originally put together my list of 2019 predictions for the cybersecurity world of 2019, Marriott, Dell, Dunkin’ and Quora trashed my carefully crafted analysis. This is further evidence that predicting events and...

IT security Predictions for 2019 – Verifying Trust

Making predictions in the information security space is always an interesting yet challenging task. The very nature of cybersecurity, with the velocity of vulnerabilities and new threat actor coalitions along with the shifting regulatory environment, requires organisations to stay...

Vote for Blockchain [Voting]

While the internet has been around for nearly two decades, our society has failed to devise a reliable, fraud-proof way to implement a digital voting system. As it stands, our current election process is not particularly conducive to the...
ZDNet

Websites can steal browser data via extensions APIs

Researcher finds nearly 200 Chrome, Firefox, and Opera extensions vulnerable to attacks from malicious sites.
Security Affairs

6 Reasons We Need to Boost Cybersecurity Focus in 2019

Paying attention to cybersecurity is more important than ever in 2019. But, some companies are still unwilling to devote the necessary resources to securing their infrastructures against cyberattacks, and naive individuals think they’re immune to the tactics of cybercriminals,...
isBuzz

Fortnite Vulnerabilities Allow Hackers To Take Over Gamers’ Accounts, Data And In-Game Currency

Cybersecurity researchers today shared details of vulnerabilities that could have affected any player of the hugely popular online battle game, Fortnite. If exploited, the vulnerability would have given an attacker full access to a user’s account and their personal information  as well...

DNC Accuses Russia, ACLU Sues ICE, and More Security News This Week

Trump dominated security headlines this week, but there's plenty of other news to catch up on.
SecurityWeek

Bulgaria Extradites Russian Hacker to US: Embassy

Bulgaria has extradited a Russian indicted by a US court for mounting a complex hacking scheme to the United States, the Russian embassy in Washington said Saturday. read more