1)
3
Ways Hackers Steal Your Company's Mobile Data - The most effective data
exfiltration prevention strategies are those that are as rigorous in vetting
traffic entering the network as they are traffic leaving it. It's the
unfortunate reality of the cybersecurity threat landscape today that malicious
actors are advancing their tactics at a breakneck pace, finding new
vulnerabilities in network defenses to execute attacks faster than IT teams can
keep up.
2)
ANZ
Bank suffers 10-hour internet banking outage - ANZ Bank suffered a
major outage of its internet banking service with users reporting problems for
much of Monday. The outage appears to have started just after 10am Sydney time
and was not resolved until just before 8pm - resulting in 10 hours of
downtime. Earlier, users took to social media to complain about the issues,
which the bank said on its Twitter account were “intermittent” and the IT team
was working to fix “as a matter of priority”.
3)
Cyberattacks
on Israeli banks rose in last six months - Israel's banking regulator
warned banks and their customers on Sunday to be more vigilant against cyber
criminals following a rise in hacking attempts in recent months. "In the
last half year, we have seen an increase in attempts at fraud via phishing,
aimed at banking system customers with the intent to steal funds from their accounts,"
the central bank said, adding that the attacker initially tries to steal the
customer's login and other personal details aimed at transferring funds between
accounts.
4)
Cryptocurrency
Mining Malware Infected Over Half-Million PCs Using NSA Exploit - 2017
was the year of high profile data breaches and ransomware attacks, but from the
beginning of this year, we are noticing a faster-paced shift in the cyber
threat landscape, as cryptocurrency-related malware is becoming a popular and
profitable choice of cyber criminals. According to the Proofpoint researchers, cybercriminals
are using at least 25 machines to scan the internet to find vulnerable Windows
computers.
5) Cyberattack
Impersonates FBI Internet Crime Complaint Center - A new cyberattack
scams people into providing personal data and downloading malicious files by
impersonating the Internet Crime Complaint Center, a division of the FBI
intended to give the public a reliable means of reporting suspected illegal
activity online. Threat actors trick victims into sharing personal information
with fake IC3 messages laced with malware.
6)
APIs
Pose 'Mushrooming' Security Risk - As APIs grow in prominence, top
security concerns include bots and authentication. The application economy has
now become the API economy. And as the importance of application programming
interfaces (APIs) grows within the enterprise, organizations must keep their
security top-of-mind, lest they put the entire software stack at risk as
APIs deployed without security measures expose organizations to yet another
class of attack vectors.
7)
3
Simple Steps to Securing Your ICS Systems against Digital Threats - We
live in a world where connectivity is key. It’s brought conveniences to our
personal lives, and organizations are adopting it into the industrial world to
boost productivity. Industrial control systems (ICS), which manage utilities
like water, gas, and electricity, are one such example of this ongoing trend.
Organizations are putting ICS systems online so that jobs once carried out
manually can now be carried out remotely or with the help of automation. ICS
systems are a key target for cybercriminals. Security should therefore be a
priority; given the importance of ICS, one would assume these systems would be
running the most secure technology available. This is not the case. Much of
the equipment is at risk of aging out, that is, requiring replacement or
upgrade with very little security.
8)
Infrastructure-Based
Security Vulnerabilities Put Your Business in Peril - With dozens of
breaches and millions left violated, 2017 has witnessed a historic amount of
hacking. This year has been stained with numerous hacking incidents, including
WannaCry, Petya and Cloudbleed. Of these many cases, the Equifax data breach
can be crowned the most significant hack of the year, having exposed the
personal data of nearly 148 million people.
9)
How
to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware
- Today, cybersecurity is on all our minds. Every other day, we get news of
another cyberattack. As more organizations struggle to keep up with the
onslaught of these new threats, many are asking: “What can we do to
strengthen our cybersecurity posture?” When we want to quantify it,
consider the concept of risk. In its simplest form, the risk associated with a
system is the impact of it malfunctioning, multiplied by the likelihood that a
malfunction will occur.
No comments:
Post a Comment