Market for hack-for-hire services could be expanding significantly with recent unmasking of a Dark Basin group that has been operating in the shadows for years.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Spyware campaign stole sensitive user information through 111 fake Google Chrome extensions which gathered over 32 million downloads on the Chrome Web Store.
Reported security risks in U.S. online voting system OmniBallot have added to the mounting concern over vote manipulation during 2020 US presidential election.
Focusing on PCI compliance is a good way to improve risk management, find out what your company can do to reduce incidents, stop cyber threats and prevent regulatory fines.
5G networks provide lots of benefits and also unknown security risks. Organizations need to change their threat models to increase visibility, security awareness and control of the endpoints.
Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy.
Suspected Snake ransomware attack on Honda highlighted the need for network segmentation to prevent impact across a company during an attack.
New FBI alert warns of cybercriminals targeting mobile banking apps during the Coronavirus pandemic which has witnessed a 50% rise in adoption of online banking.
Having hundreds or more enterprise data sources to monitor a company’s security is overwhelming and unmanageable for SecOps, what they really need is a “small data” movement.
Israel and Iran may be in a hidden cyber war with both countries attacking each other’s critical infrastructure, causing physical disruptions to the civilian population.