What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2019-01-16 15:51:01 Disclosure of Chilean Redbanc Intrusion Leads To Lazarus Ties. (lien direct) By Vitali Kremez, Director of Research, Flashpoint Flashpoint analysts believe that the ​recently disclosed intrusion​ suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked advanced persistent threat (APT) group Lazarus. Redbanc confirmed that the malware was installed on the company's corporate network without triggering antivirus […] Malware Threat APT 38
itsecurityguru.webp 2019-01-14 10:49:01 Goldman Sachs Leads $8m Investment In Immersive Labs Cyber Security Skills Platform. (lien direct) Immersive Labs today announced that Goldman Sachs has led an $8m Series A investment round in its fast-growing cyber security skills platform. The funding, made alongside smaller private investors, will grow an offering which arms enterprise IT and cyber security teams with the latest skills by combining threat data with gamified learning. The award-winning Immersive […] Threat
itsecurityguru.webp 2018-12-18 13:43:03 Montagu Evans Chooses MobileIron Cloud To Keep Client Data Safe On Mobile Devices. (lien direct) MobileIron (NASDAQ:MOBL), the secure foundation for modern work, today announced that Montagu Evans has selected MobileIron unified endpoint management (UEM) cloud solution, including MobileIron Access and MobileIron Threat Defense. For nearly a century, Montagu Evans, a partnership and one of UK's largest owner-managed surveying firms, has helped its clients shape some of UK's largest commercial, […] Threat
itsecurityguru.webp 2018-12-14 10:25:00 Armor Warns E-Commerce Retailers of Increased Attacks; Magecart-Style, Credit Card Sniffing Attack Tool Now On Sale in the Dark Web (lien direct) Armor, a leading cloud security solutions provider, has found what it believes to be the first Magecart-style (credit card sniffing) attack tool to be openly offered for sale on the Dark Web. Previous Magecart-style attacks, (such as the British Airways and Newegg attacks for example), have been carried out by specific threat groups who have, […] Tool Threat Guideline
itsecurityguru.webp 2018-12-13 16:44:05 THREATCONNECT: 2019 Cybersecurity Predictions. (lien direct) ThreatConnect Research Team: The Inability To Evolve Is The Biggest Cybersecurity Threat To 2019: There isn't one specific threat that could be deemed the “biggest” in 2019. That said, although adversaries rapidly evolve, the same isn't necessarily true for their targets making them a big threat to businesses. It seems that every year, we, as […] Threat
itsecurityguru.webp 2018-12-05 13:48:00 You Think Your Business Is Primed To Deal With Any Cyber Threat – But What If It\'s An Inside Job? (lien direct) Seven top tips on how to prevent and cope with an insider threat By Tom Huckle, Lead Cyber Security Consultant, Crucial Academy An inside job brings up images of bank raids and heists but in the modern world companies should be thinking just as seriously about the cyber threat coming from within their own business. […] Threat Guideline
itsecurityguru.webp 2018-12-03 11:32:00 As Christmas approaches, 20% of Brits reveal they have been duped by scam emails from \'trusted\' brands (lien direct) DomainTools, a leader in domain name and DNS-based cyber threat intelligence, recently announced the results of a survey of 1,000 UK consumers, which revealed that 20% of British consumers have been caught out by phishing emails pretending to be from a trusted, legitimate brand, but which in reality are used for malicious purposes such as ... Threat Guideline
itsecurityguru.webp 2018-11-21 17:14:02 40% of British consumers grab a Cyber Monday bargain, but half of them are happy to shop with a previously breached company (lien direct) DomainTools, a leader in domain name and DNS-based cyber threat intelligence, today announced the results of a survey of 1,000 UK consumers, which revealed that 40% respondents planned to utilise the big-name discounts available on Black Friday and Cyber Monday. More concerningly, half (50%) of these respondents were happy to shop with retailers that had ... Threat Guideline
itsecurityguru.webp 2018-11-15 15:26:05 Netskope Expands Amazon Web Services Security Capabilities With Insider Threat Protection, Continuous Security Assessment Enhancements. (lien direct) Netskope, the leader in cloud security, today announced the release of several enhancements to Netskope for IaaS. For Amazon Web Services (AWS), enterprises can now use Netskope to create and enforce policies prohibiting data exfiltration from managed to unmanaged Amazon S3 buckets. Organizations can also achieve their compliance objectives with a continuous view of cloud ... Threat Guideline
itsecurityguru.webp 2018-11-01 11:31:01 New Honeywell Cybersecurity Research Reveals That USB Devices Pose A Significant Threat To Industrial Facilities. (lien direct) New, first-of-its-kind research released today by Honeywell (NYSE: HON) shows that removable USB media devices such as flash drives pose a significant – and intentional – cybersecurity threat to a wide array of industrial process control networks. Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that ... Threat
itsecurityguru.webp 2018-10-15 09:53:03 In the new age of cyber warfare, finance firms are on the front line (lien direct) The threat landscape is radically different in a connected, digital world. Critical infrastructures, from smart metres to payment systems, are no longer constrained by geography. Personal digital assets, such as identity and online behaviour data, are increasingly globalised. Threats to these aren't nearly as easy to monitor or defend against – and governments' ability to ... Threat
itsecurityguru.webp 2018-10-03 13:34:03 CyberInt Avengers Assemble! (lien direct) Cybersecurity company CyberInt has been shortlisted for a Security Serious Unsung Hero award in the Security Avengers category In an era where cybercriminals plan and orchestrate attacks in the anonymous recesses of the Dark Web, effective threat intelligence has to become increasingly pro-active and investigative. To enable enterprises to extend their security perimeters to encompass ... Threat
itsecurityguru.webp 2018-09-11 11:44:04 The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant (lien direct) By: Paul Kraus, CEO, Eastwind Networks When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention and take advantage of available threat information sharing are more likely to succeed in keeping their networks secure from ... Threat
itsecurityguru.webp 2018-09-11 11:41:05 City of Stockholm Selects MobileIron Threat Defense to Detect and Mitigate Mobile Threats (lien direct) MobileIron, the secure foundation for modern work, today announced that City of Stockholm has selected MobileIron Threat Defense to detect and mitigate mobile threats. MobileIron Threat Defense will be deployed on 30,000 mobile devices used by the employees of the City of Stockholm. MobileIron Threat Defense provides unparalleled mobile threat protection, securing mobile devices from ... Threat
itsecurityguru.webp 2018-09-10 11:33:02 LuckyMouse Group is back and using a legitimate certificate to sign Malware (lien direct) The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor – LuckyMouse. The most peculiar trait of this malware is its hand-picked driver, signed with a legitimate digital certificate, which has been issued by a company ... Malware Threat
itsecurityguru.webp 2018-09-10 11:19:05 Australia\'s anti-encryption law will merely relocate the backdoors: Expert (lien direct) The greatest threat posed by Australia’s planned new anti-encryption laws comes from the voluntary requests made to communication providers, not the compulsory notices to give technical assistance, according Dr Chris Culnane, because they have greater scope and less oversight. View full story ORIGINAL SOURCE: ZDNet Threat
itsecurityguru.webp 2018-09-07 10:54:03 Researchers find Chainshot malware corrupting networks (lien direct) Security researchers exploited a threat actor’s poor choice for encryption and discovered a new piece of malware along with network infrastructure that links to various targeted attacks.The new piece of malware, which received the name Chainshot, is used in the early stages of an attack to activate a downloader for the final payload in a ... Malware Threat
itsecurityguru.webp 2018-09-06 11:21:01 F5 Labs analysis reveals growing global phishing menace and application security vulnerabilities (lien direct) Findings from F5 Labs' Lessons Learned from a Decade of Data Breaches report has shed light on the global proliferation of phishing, providing clear insights on why the technique is fast becoming cybercriminals' easiest and most productive attack vector. The threat intelligence reveals that phishing is responsible for almost half of breached records by root ... Threat
itsecurityguru.webp 2018-08-20 10:58:01 Hacking prosecutions fall for a further year despite the threat of cyber crime (lien direct) The number of computer hacking prosecutions fell for the second successive year in 2017, despite the ever-increasing threat to businesses and individuals, says RPC, the City-headquartered law firm. View Full Story ORIGINAL SOURCE: London Loves Business Threat
itsecurityguru.webp 2018-08-10 08:54:00 DanaBot Malware Spear Phishes Enterprise Players Through FTP Links (lien direct) The phishing emails masquerade as invoices in order to appear legitimate. Researchers have warned enterprise players of a new digital threat: Danabot, malware at the heart of a new phishing campaign specifically targeting SMBs. Enterprise players, from the largest and most well-known companies to SMBs, are under constant threat of cyberattack. The valuable corporate and ... Malware Threat
itsecurityguru.webp 2018-08-07 10:39:01 Honeypot lures hackers to reveal ICS attack tactics (lien direct) Industrial attacks are on the rise as threat actors are no longer merely interested in raiding your bank account, while some have set their sights far higher. Cyberattackers targeting industrial control systems (ICS) have demonstrated their potential to disrupt core systems in recent years. From the takedown of the power grid in Ukraine which left ... Threat
itsecurityguru.webp 2018-08-02 10:09:02 Google Researcher Unpacks Rare Android Malware Obfuscation Library (lien direct) A malware sample that had code in all the wrong places piqued Maddie Stone’s curiosity. So she dug into the sample and emerged many hours later with a description of a complex anti-analysis library that threat actors are using to, among other things, give new life to old threats. View Full Story ORIGINAL SOURCE: Dark ... Malware Threat
itsecurityguru.webp 2018-08-01 09:06:02 Understanding The Cyber Threat Landscape (lien direct) In early July IBM Security and the Ponemon Institute released a new report titled “Cost of a Data Breach Study” In this study it was reported that  that the global average cost of a data breach and the average cost for lost or stolen information both increased. The former is up 6.4 percent to £2.94 ... Data Breach Threat
itsecurityguru.webp 2018-08-01 09:02:05 Cybersecurity Is an Ever-Changing Battlefield (lien direct) Just like in combat operations, cyber operations are changing on a second-to-second basis. To effectively combat an insurgency, organisations must drive to an intelligence-driven operations centre. In this ever-changing battlefield, internal and external threat intel are now crucially important to combating attackers. Even as a steady drumbeat of headlines keeps the world's attention focused on ... Threat
itsecurityguru.webp 2018-07-25 11:10:03 Supply Chain Attacks on the Rise as One of the Biggest New Threat Vectors as Organisations Scramble to Close Gaps (lien direct) CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced the results of its global supply chain survey, Securing the Supply Chain, produced by independent research firm Vanson Bourne. The study surveyed 1,300 senior IT decision-makers and IT security professionals in the US, Canada, UK, Mexico, Australia, Germany, Japan, and Singapore across major industry sectors. ... Threat Guideline
itsecurityguru.webp 2018-07-23 15:42:01 Cryptomining Replaces Ransomware as Most Popular Cybercrime Malware (lien direct) Skybox® Security, a global leader in cybersecurity management, announced today the release of its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality ... Ransomware Malware Vulnerability Threat Guideline
itsecurityguru.webp 2018-07-19 15:55:05 Cyber Security Incidents: Insider Threat falls in UK (to 65%) and Germany (to 75%) post GDPR, but US risk increases (to 80%) (lien direct) New research by data security company, Clearswift, has shown that year on year cyber security incidents from those within the organisation, as a percentage of all incidents, have fallen in the UK and Germany, two countries currently now under the ruling of GDPR. However, in the United States, a country outside of the direct jurisdiction, ... Threat
itsecurityguru.webp 2018-07-13 14:55:01 Nozomi Networks teams up with IBM to Answer Demand for Integrated IT/OT Cyber Security (lien direct) With Operational Technology (OT) attacks on the rise, Nozomi Networks and IBM earlier this week announced that they have teamed up to bring industrial organizations around the world easier access to deep OT network visibility and continuous threat detection. The news follows recent warning from various bodies – including the UK's NCSC and the US' ... Threat
itsecurityguru.webp 2018-07-12 11:09:05 Ticketmaster Breach Part of Global Digital Skimming Campaign (lien direct) The Ticketmaster UK 'breach' is far more extensive than at first thought - part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Threat
itsecurityguru.webp 2018-07-12 10:44:01 RiskIQ maps the anatomy of a corporate attack surface (lien direct) RiskIQ, the global leader in digital threat management, today released a report mining the company's massive repository of internet data. The report maps the global internet attack surface over a two-week period, and in the process, reveals the true extent of the modern corporate attack surface. The report, 'The anatomy of an attack surface: Five ... Threat Guideline
itsecurityguru.webp 2018-07-11 10:32:04 Asian Countries Frequent Targets of APT Attacks (lien direct) In a live webinar today, Kaspersky Lab experts presented their review of Q2 2018 advanced persistent threat (APT) activity. In addition to charting the latest campaigns, tools and techniques deployed by established threat actors, Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab's global research and analysis team, also discussed the reawakening of previously quiet groups, revealing ... Threat
itsecurityguru.webp 2018-07-10 10:29:05 RiskIQ finds Ticketmaster breach part of massive credit card skimming campaign affecting over 800 e-commerce sites (lien direct) RiskIQ, the leader in digital threat management, today revealed that its researchers have discovered that the recent breach of Ticketmaster was not a one-off event as initially reported, but part of a massive digital credit card-skimming campaign by the threat group Magecart affecting over 800 e-commerce sites around the world. The report highlights how Magecart ... Threat Guideline
itsecurityguru.webp 2018-07-04 14:16:05 Is your sector taking cyber security seriously? (lien direct) The frequency and severity of cyber attacks and data breaches has risen significantly in the last few years, as attacks increase in volume and variety. This exponential growth of the cyber threat is confirmed by figures from Business Continuity Institute (BCI), which have revealed that 53% of UK firms now consider a cyber attack as ... Threat ★★
itsecurityguru.webp 2018-06-25 10:05:05 UK warned to boost defence spending as security threat rises (lien direct) Professor Peter Roberts, director of military sciences at the Royal United Services Institute, warned that Britain will struggle to cope with emerging threats without a massive increase in spending. Speaking ahead of a naval arms fair in Glasgow, he said the UK would need to invest 10 per cent of gross domestic product (GDP) on ... Threat
itsecurityguru.webp 2018-06-25 09:46:05 (Déjà vu) F5 Labs research reveals Chinese hackers lead attacks on IoT devices (lien direct) Research released today from F5 Labs has found Telnet brute force attacks against IoT devices, led by Chinese hackers have risen a staggering 249% since 2016. Findings from the latest Threat Intelligence report shed light on the challenges vulnerable IoT devices place on businesses, as the proliferation of brute force hacks both intensify and become ... Threat
itsecurityguru.webp 2018-06-25 09:42:00 Combatting the increasing volume of DDoS attacks (lien direct) As attacks are getting more sophisticated, so must our defences   The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.   Such a service meant that criminals could ... Threat
itsecurityguru.webp 2018-03-12 14:35:03 Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by 2020 (lien direct)  Spiceworks today announced the results of a new survey examining the adoption and security of biometric authentication technology in the workplace. The results show 62 percent of organisations currently use biometric authentication technology, and an additional 24 percent plan to utilise it within the next two years. The findings indicate that although most IT professionals believe ... Threat
Last update at: 2025-05-12 02:07:20
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter