Hackers May Have Obtained Names of Chinese With Ties to U.S. Government

Reading Time: < 1
Investigators say that the Chinese hackers who attacked the databases of the Office of Personnel Management may have obtained the names of Chinese relatives, friends and frequent associates of American diplomats and other government officials, information that Beijing could use for blackmail or retaliation. Read ...
Read More

None of us are safe: Major cybersecurity company hacked

Reading Time: < 1
Kaspersky Lab detected a sophisticated and expensive hack it says was carried out by a country. Guess what: Even the best security companies can be hacked. That's what Moscow-based Kaspersky Lab said Wednesday when it announced its systems had been attacked, most likely by hackers ...
Read More

Exclusive: U.S. tech industry appeals to Obama to keep hands off encryption

Reading Time: < 1
As Washington weighs new cybersecurity steps amid a public backlash over mass surveillance, U.S. tech companies warned President Barack Obama not to weaken increasingly sophisticated encryption systems designed to protect consumers' privacy. Read more.
Read More

Cyber-thieves cash in from malware

Reading Time: < 1
Cyber-thieves can reap returns of almost 1,500% when they invest in ransomware, a study suggests. Trustwave looked at how much cash typical cybercriminals spend and what their potential profits might be. It estimated it would cost $5,900 (£3,860) to buy a ransomware kit that could ...
Read More

Majority of Security Breaches Discovered by a Third-Party

Reading Time: < 1
A recent survey of 1,000 IT professionals reveals that the majority of security breaches (70%) are first discovered by third-party entities rather than the impacted organization itself. The study also found that 46% of organizations which were the subject of a serious data breach took ...
Read More

Even cyber-security professionals can struggle to understand security

Reading Time: < 1
Scratch the surface and dangerous pockets of ignorance and misunderstanding are not hard to find. Read More
Read More

Breach detection: Five fatal flaws and how to avoid them

Reading Time: < 1
IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization’s attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations. Read More.
Read More

U.S. Was Warned of System Open to Cyberattacks

Reading Time: < 1
The inspector general at the Office of Personnel Management, which keeps the records and security clearance information for millions of current and retired federal employees, issued a report in November that essentially described the agency’s computer security system as a Chinese hacker’s dream. Read more.
Read More

Myfax malspam wave with links to malware and Neutrino exploit kit

Reading Time: < 1
InfoSec Handlers Diary Blog As early as Wednesday 2015-05-27, there have been more waves of malicious spam (malspam) spoofing myfax.com. On Tuesday 2015-06-02, the messages contained links to a zip archive of a Pony downloader. Tuesday's messages also had links pushing Neutrino exploit kit (EK). ...
Read More

Understanding, mitigating cybersecurity risk

Reading Time: < 1
In today’s economy, information and technology drive value creation for businesses of all sizes across every industry. Information can be accessed and stored remotely in real-time, allowing for collaboration and coordination across time zones and continents. Read more.
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top