News

0 Comments
Thomas Hill, CISO at Live Oak Bank, a direct bank with no local branches, oversaw a reorientation to the cloud that transformed the bank’s security, adding features such as real-time big data event log storage and AI security analysis, all while maintaining a stable headcount. Hill is a graduate of Saint Leo University in Tampa,
0 Comments
European airplane maker Airbus admitted yesterday a data breach of its “Commercial Aircraft business” information systems that allowed intruders to gain access to some of its employees’ personal information. Though the company did not elaborate on the nature of the hack, it claimed that the security breach did not affect its commercial operations. So, there’s
0 Comments
During a recovery, is your organization’s storage secure? System attackers and data thieves are cowards, so it’s only natural that they’re attracted to enterprise systems when they’re most vulnerable. Disaster recovery is a complex and multifaceted operation, and your DR team members are likely already spreading themselves thin trying to ensure a speedy and complete
0 Comments
A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily ‘footprint’ and detect unprotected robots, not only connected to the Internet, but also to the industrial environments where they operate. Dubbed “Aztarna,” the framework has been developed by Alias Robotics, a Spanish cybersecurity firm
0 Comments
It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping
0 Comments
SIM swapping is reportedly on the rise. How do SIM swaps work, and what are the best ways to prevent it? Mobile phones are often an important part of two-factor authentication (2FA) processes, but they have certain security risks like ordinary single-factor password processes. For devices connected to cellular networks, SIM swaps can open a
0 Comments
An Apple security expert last year documented an attack technique that uses synthetic clicks to bypass security features in macOS High Sierra. What are synthetic clicks and how does this attack work? Once malware is put on an endpoint, multiple vulnerabilities can be used for local privilege escalation. The malware could contain traditional executables, such
0 Comments
China has blocked Microsoft-owned search engine Bing, the company confirmed after receiving complaints from users throughout the country who took to social media beginning late Wednesday to express concerns. So, Bing becomes the latest service to be shut down by Chinese government behind its so-called Great Firewall of China, which blocks thousands of websites originating
0 Comments
Unapproved mobile use and unpatched systems are just two of the end-user security problems admins could face during the ongoing U.S. government shutdown. With thousands of federal employees out of work, IT departments are left to determine how to manage those users’ access to business resources. The shutdown provides ample opportunity for users to turn
0 Comments
A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites’ visitors at risk of hacking. Independent researcher and bug-hunter Paulos Yibelo, who shared his new research with The
0 Comments
In the wake of the Ryuk ransomware attack on the Tribune Publishing Company last month, security researchers are warning the threat to enterprises may be growing. In a research post published last week, threat detection vendor CrowdStrike in Sunnyvale, Calif., reported that Ryuk ransomware has accumulated more than $3.7 million in cryptocurrency payments since it
0 Comments
One major advantage of AI algorithms is their ability to rapidly find patterns across large data sets and to detect anomalies. At the simplest form, this involves creating a baseline model of what’s normal in an environment, and then flagging and investigating anomalies to that baseline, which could potentially be IoT threats. This can be
0 Comments
Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week. The unprotected 854.8 gigabytes of the database was stored in an instance of MongoDB, a NoSQL high performance and cross-platform document-oriented database, hosted by an
0 Comments
Security researchers have identified a global DNS hijacking campaign, which they say is likely the work of Iranian hackers. According to researchers from FireEye’s Mandiant Incident Response and Intelligence team, the DNS hijacking campaign targeted entities for the past two years across the Middle East and North Africa, Europe and North America “on an almost