A joint FBI and CISA alert warned that hackers were exploiting Fortinet’s VPN vulnerability and the Microsoft Zerologon bug to compromise government networks hosting election systems.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Since patching is problematic and traditional perimeter security is ineffective for Ripple20 vulnerabilities, Zero Trust security may be the right answer.
The US Cyber Command is expecting the TrickBot botnet to be involved in election interference attempts, and is actively running persistent operations against it along with Microsoft.
With specific guidance from an amended HITECH Act to include a comprehensive cyber policy, the healthcare industry will better secure patients’ data.
Barnes & Noble was hit by a suspected ransomware attack that prevented customers from accessing their libraries and exposed their personal information, including email addresses and transaction history.
Two-thirds of breaches are inside jobs. Yet, insider threat programs account for less than 10% of the budget. Are enterprise cybersecurity efforts properly prioritized?
COVID-19 pushed more firms towards Zero Trust security model to protect corporate networks from cyber threats. About 82% said they were committed to making the transformation.
About 3 million credit card numbers were siphoned off and sold at Joker's Stash. Dickey's appears to have become aware of the data breach after at least a year of activity.
Software AG, Germany's second-largest software vendor, fell victim to a Clop ransomware attack that compromised company files and employee information.
A ransomware attack on eResearch Technology, the firm behind three-quarters of FDA drug approvals, slowed down clinical trials for several research facilities.