Improve Data Security Through Automation
Human error is endemic to data breaches. Process automation can minimize the risk. By Gregory Hoffer, CEO, Coviant Software Human error is the most common cause of a data breach,…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to…
Fighting The International Cyber War with Ai
As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides of the Atlantic are concerned about a potential full-on cyberwar. By Jarred…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies continue to skyrocket, organisations are at constant risk. There are many recent…
Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves…
Protecting Critical Infrastructure Against Cyberattacks
Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby | Director of Services, Semperis Cyberattacks in any industry cause multiple forms…
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately…
StayHackFree – Don’t Be Barry
The Holiday call from a buddy you do not want to get – much less make. By James Gorman, CISO, Authx Friday the week before Thanksgiving, driving home for the…
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance…
Android.Cynos.7.origin trojan infected +9 million Android devices
Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters)…
Sophisticated Android spyware PhoneSpy infected thousands of Korean phones
South Korean users have been targeted with a new sophisticated Android spyware, tracked as PhoneSpy, as part of an ongoing campaign. Researchers from Zimperium zLabs uncovered an ongoing campaign aimed…
5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.
MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest but still exceptionally popular forms of attack. In this attack, a hacker…