_Experts-Attacks

Cyber Hygiene and Digital Resilience to Withstand a Cyber Attack

In the past, nation states such as North Korea and China had a very limited ability to respond to the U.S.’ military attacks or sanctions. But in today’s digital world, these countries use cyber-attacks to deter a sanction or get retribution. Wayne Lloyd, Federal CTO of RedSeal, provides a list of actions organizations can take to ensure good cyber hygiene and digital resilience to withstand a cyber event and/or recover quickly.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 2

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 2 of this two-part series, Dave Moore, founder of Internet Safety Group, walks the reader through a well-crafted response plan and reviews of the top backup programs.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 1

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 1 of this two-part series, Dave Moore, founder of Internet Safety Group, explains why and how SMBs need to make Internet safety training a top priority.

Learn About Cryptomining – The Latest Most Popular Cyberattack

Criminal cryptomining has replaced ransomware as the leading type of cyber attack in 2018. While not all cryptomining is criminal in nature, this new type of cyber attack has gained momentum and popularity as a result of its success. Lastline’s director of threat intelligence, Andy Norton, explains the popular criminal techniques used to mine cryptocurrencies — and what lies ahead for cryptomining.

We’re All in This Together – Why You Should Champion National Cyber Security Awareness Month

With data breaches on the rise and personal information ending up in the hands of cyber criminals, we are no longer questioning whether a breach will occur, but when the breach will occur. Marija Atanasova, Sr. Content Strategist for the IT Security community at BrightTALK, interviewed Karen Creasey of NCSAM to learn how to get the most out of National Cyber Security Awareness Month (October).

Let’s Pretend You've Been Breached. Now What?

Every business falls victim to cyberattacks sooner or later. Are you prepared for when the inevitable breach happens? If not, your business and your career could be in jeopardy. This article highlights nine key criteria that should be part of every cyber-breach preparation plan.

Legalized Sports Betting, Player Experience And Fraud Prevention

As new players are welcomed into the sports betting ring with the recent law changes, fraudsters will attempt to take advantage. New entrants to the online sports betting world in the U.S. must come to terms with a core challenge facing nearly every digital business: how to ensure an exceptional user experience while also preventing fraudulent activity.

The Rise And Fall Of Ransomware And Malicious Miners

According to a new report from Kaspersky Lab, in only a year's time, the number of Internet users who have fallen victim to ransomware or malicious crypto miners has skyrocketed from 1.87 million (2016) to 2.7 million (2017). InfoSec and cybersecurity writer Kacy Zurkus gives us a brief journey of the rise and fall of ransomware and malicious miners.

It Is Time To Upgrade The Cybersecurity Tools Businesses Use

How can companies be better at training employees to prevent phishing and improve security? Inky founder Dave Baggett provides a quick history of antivirus software, how antivirus worked then and now, and the flaws in security software.

Spotting The Breach: What Are The Indicators Of Compromise?

What are the signs of a breach? Are you catching them all or do you have a false sense of security (yes, pun intended) when it comes to all things cyber within your organization? Sean Martin reaches out to the community of experts to help him identify some ways to spot the signs of a breach that might not be immediately evident.

The Digital Crime Wave That’s Thriving Under the Radar

Attackers have shown their cards and the mid-market represents an extremely valuable alternative to the well-defended enterprise. Coronet founder and CISO Dror Liwer reviews the threat landscape and explains why it’s time for the mid-market to take cybersecurity as seriously as the enterprise, even as financial and operational constraints remain.

It’s Time To Raise Our Game On Insider Threats

The power of the digital workplace comes with an exponential increase in human interaction, as well as an inherent catalyst for risk creation. As collaboration platforms continue to gain traction, the concern for insider threats grows. Greg Moran, Chief Operating Officer at Wiretap, offers his perspective and insight on Wiretap’s just-released Human Behavior Risk Analysis Report.

Crypto Currency Hacking Is Not About The Coin

Recently, the South Korean cryptocurrency exchange Coinrail announced a hacking attempt on its website; the exchange is now offline. Schellman principal Doug Barbin explores the question: “Why would the alleged hack of an exchange site that no one knows anything about indicate that there is any sort of fundamental problem with the currency?”

2018 FIFA World Cup: Open Season For Malicious Threats?

Athletes, fans and the media are getting ready for first kick-off at this year’s FIFA World Cup at Spartak Stadium in Russia. But they are not the only ones. So are cyber criminals looking to hack into the mobile phones of billions of FIFA fans.

It’s Time For Organizations To Embrace Secure Messaging

With 281 billion emails sent every day, it’s no surprise that 91 percent of all cyberattacks and 98 percent of social engineering campaigns begin with email phishing scams. Vaporstream CEO Dr. Galina Datskovsky explains why EFAIL proves that it’s time to stop relying on email and instead embrace a more secure messaging solution.

Web-Scale Social Engineering: Phishing Beyond Email

Although phishing attacks have been around for many years, they have evolved to form the current fourth-generation threat landscape: phishing beyond email. The real question for security teams is how are untrained, non-security staff supposed to recognize these threats?

Top 3 Crypto Mining Botnets: Smominru, DDG, and ADB.Miner

Botnets have facilitated different types of cybercrime for years – the most common use cases revolve around DDoS (Distributed Denial of Service) attacks and massive spam campaigns – but things are starting to change. A new segment of cybercrime is shifting toward a paradigm where botnets do not DDoS or spam – they mine cryptocurrencies.

The Cyber Attacks NOT Making Headlines Are The Scary Ones

The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.

Is Anything Really Safe In The Virtual World We’ve Created?

Jessica Lang from Kaizen reveals the ten cyber attacks that have rocked the world in recent years, and hit 5.4 billion accounts in total.

Would You Steal Data That Cannot Be Used?

From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?