The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Backdoor, Botnet, Cryptocurrency-miner, Data breach, Data theft, Misconfigured account, Spear phishing, Ransomware, RAT, Targeted attack, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.
If you somehow haven’t read or watched War of the Worlds, here’s a spoiler alert. The Martians are brought down by the common cold. You can argue if alien biology would be susceptible to human pathogens, but if they were, it wouldn’t be surprising if aliens had little defense against our bugs. The worrisome part of that is the reverse. Could an astronaut or a space probe bring back something that would ravage the Earth with some disease? This is not science fiction, it is both a historically serious question and one we’ll face in the near future. If we send people to Mars are they going to come back with something harmful?
Upon the rollout of GDPR, many US companies were left wondering what they needed to do. Numerous businesses were slow to take action, and in spring 2018, most of them were not prepared for the new legislation. When the GDPR compliance deadline of May 25 passed, we reached out to various enterprises and SMEs and asked them to share the steps they took while starting the process as well as their practical GDPR case studies and success stories.
The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations. This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology Laboratory Bulletins). A complete list of security standards, guidelines and recommendations publications can be found at the Computer Security Resource Center located on the NIST.GOV website.
Along with the GNU Project. Linux is inarguably one of the OGs of the free and open source software community and ever expanding family of products.
While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security approach is simply not effective given the way that today’s technical infrastructures and the cyber ecosystem itself have become ever more complex. With organizations adopting new technologies — spreading sensitive data across different cloud servers, service providers, containers, and even various SaaS platforms — it’s essential that they begin to take a more proactive approach to security.
CrowdStrike, the developer of a security technology that looks at changes in user behavior on networked devices and uses that information to identify potential cyber threats, has reached a $3 billion valuation on the back of a new $200 million round of funding.
It seems like every day brings news of a new data breach, sending consumers scrambling to find out if their privacy has been compromised. The fallout from these breaches has become increasingly commonplace: Broken trust, finger pointing, ruined reputations and ad hoc legal consequences.
[unable to retrieve full-text content]
Crate.io, the winner of our Disrupt Europe 2014 Startup Battlefield competition, today announced that it has raised an $11 million Series A round. In addition, the company also launched its ‘Crate Machine Learning Platform’ today, a new hosted solution for businesses that want to use the company’s SQL-based database platform for working with IoT data.
Think about your day-to-day job as one of the many cybersecurity experts working in the industry today: Do you often find yourself frantically typing queries into search engines? Do you struggle to get ahead of problems because you’re scrambling just to keep up? Do you feel like your skills are behind? Does it feel like your company’s approach to security is built upon fighting fires?
Did you know the software that powers our brains contains security flaws that need to be patched? I’m talking about cognitive biases, which are the wetware vulnerabilities that collectively constitute the single greatest threat to enterprise data security.
Humans versus machines: Who’s the better hacker? The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI, and this influx suggests the answer is likely machine.
A subreddit dedicated to hacking and hackers. What we are about: constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.
Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO, which also involves consulting to boardroom level executives about the multitude of potential risks that threaten their business and being prepared for an eventual attack.
Kaspersky Lab researchers tracking the Olympic Destroyer threat that famously struck the opening of the Winter Olympic Games in Pyeongchang with a destructive network worm have discovered that the hacking group behind it is still active. It appears to be targeting Germany, France, Switzerland, the Netherlands, Ukraine and Russia, with a focus on organisations involved in protection against chemical and biological threats.
New insight from global cyber security and risk mitigation expert, NCC Group, has revealed that two thirds of MPs consider the compromise of critical national infrastructure to be the biggest cyber security threat facing the UK.
Welcome to Secret Identity, our regular column on identity and its role in politics and policy.
Security researcher Marcus Brinkmann has turned up another vulnerability in the GnuPG cryptographic library, this time specific to the Simple Password Store. Brinkmann explained that CVE-2018-12356 offers both access to passwords and possible remote code execution. This bug is an incomplete regex in GnuPG’s signature verification routine, meaning an attacker can spoof file signatures on configuration files and extension scripts (Brinkmann has dubbed the bug “SigSpoof 3” as the third signature spoofing bug he’s found).