When it comes to detecting an advanced persistent threat attack, the key to success is not only looking at what anomalies are in the network, but also understanding why certain activities are suspicious, says cybersecurity specialist Mahesh Sogane of the global oil company Shell.
As cybercriminals and nation-states take advantage of the COVID-19 pandemic to further their own aims, authorities are calling on victims to report online attacks as quickly as possible to help them better disrupt such activity.
Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011. But the COVID-19 pandemic brings an unprecedented challenge: How do you manage business continuity and reduce risk with a 100 percent remote workforce? Curry shares strategies and lessons learned.
Russian state-sponsored hackers have switched their techniques, relying more on compromised corporate email accounts to send out targeted phishing emails and spam, according to the security firm Trend Micro.
Federal government agencies certainly are not immune from phishing scams, and Aaron Higbee of Cofense is focused on tackling the unique challenges that government faces in detecting and stopping the crimes.
Cybercriminals, and perhaps nation-state hackers, that are attempting to take advantage of the COVID-19 pandemic are now turning their attention to mobile devices to spread malware, including spyware and ransomware, security researchers warn.
A new variant of TrickBot, which is using remote desktop protocol brute-force methods to target potential victims and bypass security protocols, is mainly targeting telecom services in the U.S. and Hong Kong, attempting to steal intellectual property as well as financial data, according to Bitdefender.
Microsoft Edge is one of the least private web browsers, according to a security researcher in Ireland. The researcher's new academic paper says the browser sends specific device identifiers, as well as URLs that users browsed, back to the company's corporate servers.
Driven by boards of directors' demand for better risk management practices and insight into the risks facing their organization, demand for frameworks and models to help has been skyrocketing, says Jack Jones, chairman of The FAIR Institute.
As enterprises adopt IoT products, they have to make sure that security is part of the design from the beginning and implement microsegmentation, says Dr. Neena Pahuja, former director general of India's Education & Research Network, or ERNET.