The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.
Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers.
SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.
The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.
Phishing attacks are a nasty business. Not only do they have the potential to clear out a victim’s bank account, but also leave the person feeling foolish due to the fact that they were tricked into giving away their details.
Despite the promise of Blockchain technologies to bring better security to online transactions and business processes, its rapid growth and adoption is bringing new cyber risks with equal force that will likely evolve with continued success.
Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.