Hackers have been increasingly moving towards cryptojacking attacks—hijacking computing resources and using that to mine cryptocurrency.
The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.
Although most of us have some form of anti-malware software installed, this cannot always offer peace of mind in regards to attacks on our networks, given that cyber attacks are constantly evolving.
Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers.
NHS Digital's cyber security wing CSOC has announced a partnership with IBM in the UK as part of a £30 million deal to bolster threat intelligence, a year after the WannaCry ransomware outbreak hobbled some systems within the NHS.
SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day
The need for experienced professionals is so high that companies are willing to pay a premium salary of over Rs 1.5 to 4 crore to top talent. This has increased the cyber security budget by 71% as per PwC.
By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.
Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.