New EKANS ransomware is the first for-profit strain of ransomware designed to shut down specific processes used in industrial control systems made by GE and other major manufacturers.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
A WhatsApp security flaw on the desktop version was recently discovered that allows hackers to rifle through user accounts and remotely access their files on PC via malicious messages.
Even though organizations are expecting security automation to reduce their cybersecurity workforce, it also helps them to focus on overall network security and the most serious vulnerabilities.
Latest Instagram password leak has exposed 10,000 plaintext credentials in the SocialCaptain app, allowing anyone to access any app profile by entering a unique user ID into a public URL.
A haphazard technology roll-out of a new voting app led to tech issues that delayed the Iowa caucus results and threw the public into states of confusion and frustration.
Love is in the Cloud as millions of people are looking to meet their match online. However, Cupid isn't the only one taking aim at people seeking love on dating apps during this time of year. Catfishers and scammers are on the prowl, taking advantage of those looking for love.
LabCorp experienced a second data leak in a year with more damaging information exposed this round that includes medical records and social security numbers.
UN suffered a major data breach from unpatched SharePoint vulnerability that compromised staff information, commercial contract data, and health insurance data on 42 servers in 3 branches.
Ransomware attacks are causing a spike in cyber insurance rates as insurers need to cover ransom amount and recovery costs if hackers fail to make good on unlocking the compromised systems.
New NIST Privacy Framework together with its existing Cybersecurity Framework provide a road map on cyber industry security, data handling standards and best practices for organizations.