News

  • Telcos around the world hit by large-scale, long-term intelligence gathering cyberattack
    by Dan Swinhoe on June 25, 2019 at 8:25 pm

    A long-term, large scale attack targeting telecom companies around the world has been discovered. The attack, dubbed Operation Soft Cell by security firm Cybereason, saw hundreds of gigabytes of information exfiltrated. The company claims the attackers had total control of compromised networks and could have easily brought down entire cellular networks if they so wished.[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ]“Cellular service is a critical infrastructure nowadays,” says Amit Serper, principal security researcher at Cybereason and author of the report. “What really worries me is the amount of access they have--the complete access they have to the network. The worst thing they can do is sabotage it and one day just shut down the whole network.”To read this article in full, please click her […]

  • Fake Ads that Lock Browsers Target Elders
    on June 25, 2019 at 6:56 pm

    Fake food-related blogs and recipe sites are being used to scam older victims. […]

  • 'Dashboard Act' Would Force Orgs to Disclose Data
    on June 25, 2019 at 6:20 pm

    The US Senate proposes a law to broaden data oversight and regulations. […]

  • Breach at Dominion National Likely Began in 2010
    on June 25, 2019 at 5:42 pm

    Dominion National announced that it is addressing a security incident. […]

  • BrandPost: Three Ways Microsoft 365 Boosts Productivity
    by Brand Post on June 25, 2019 at 3:32 pm

    Understanding that most users rely on a core set of functionality day in and day out, Microsoft has harnessed artificial intelligence to improve the user experience with Office 365, included in Microsoft 365, by reducing redundancy and repetitive tasks. The result is a dramatic drop in the time it takes to create or revise documents.“No matter what the role is, we all have to-do lists that have no bottom,” notes Brad Anderson, Microsoft Corporate Vice President, Enterprise Experiences and Management. “We’re able to leverage what we’ve learned in the cloud on a global scale to help users get their work done faster” through AI-driven automation and personalization.To read this article in full, please click her […]

  • #DISummit19: Fraudsters Shifting Focus to Mobile Attacks
    on June 25, 2019 at 3:06 pm

    Mobile fraud is less-targeted, but not for long […]

  • OSX/Linker, a new piece of Mac malware that exploits Gatekeeper bypass
    by Pierluigi Paganini on June 25, 2019 at 2:13 pm

    Mac security software firm Intego has spotted a new Mac malware dubbed OSX/Linker that exploits a recently disclosed macOS Gatekeeper vulnerability. Experts at Mac security software firm Intego discovered a new piece of Mac malware dubbed OSX/Linker that exploits a recently disclosed macOS Gatekeeper bypass vulnerability. The Apple Gatekeeper is designed to protect OS X users by […] The post OSX/Linker, a new piece of Mac malware that exploits Gatekeeper bypass appeared first on Security Affairs. […]

  • BrandPost: 6 Reasons it’s Smart to Work in the Cloud
    by Brand Post on June 25, 2019 at 2:10 pm

    In 2019, more organizations than ever are moving to the cloud. As on-premises systems become end-of-life, many organizations are discovering cloud solutions that meet their needs and provide a few additional benefits. Cloud infrastructure makes sense for both small organizations and large enterprises interested in leveraging modern security solutions and flexible computing power. Here are six reasons it's smart for organizations to work in the cloud. Scalability Organizations are making the shift to the cloud versus buying additional hardware at on-premise datacenters because cloud resources can be rapidly scaled up as they are needed. Conversely, as the need for a particular resource (such as disk space or central processing units) diminishes, it can be scaled back. This scale up/down model is advantageous in that organizations are able to ensure they have the resources they need when they need them.To read this article in full, please click her […]

  • Review: CrowdStrike Falcon breaks the EDR mold
    by John Breeden II on June 25, 2019 at 2:05 pm

    These days, every endpoint within an enterprise is going to have some form of antivirus software. It’s mandated in a lot of industries, plus it makes no sense to run a system without it, if nothing else than to protect the endpoint from random, untargeted threats. But antivirus is also fairly ineffective against targeted and more sophisticated attacks, which are often created specifically to get around normal AV protection. For that, the next level of protection needed is an endpoint detection and response (EDR) platform.To read this article in full, please click here(Insider Story) […]

  • #DISummit19: Online Fraud Becoming More Complex & Sophisticated
    on June 25, 2019 at 1:34 pm

    New fraud opportunities are emerging as attacks become more complex […]