MS OWA Attack Research

MS OWA Attack Research

Ken Westin, senior security analyst with Tripwire, commented on research from Cybereason that has uncovered a new attack targeting Microsoft Outlook Web Application (OWA). [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Security Analyst for Tripwire : “This attack shows the importance of being hyper-vigilant when it comes to monitoring critical assets within an organizations environment. Organizations need to […]

Trump’s Hotel Chain Reveals Hack ‘May have Stolen Credit Card Data’

'May have Stolen Credit Card Data'

Presidential candidate and real-estate baron Donald Trump’s chain of high-end hotels “may have been the victim of a data security incident”, the company has informed customers. Trump Hotel Collection (THC) executives ascribed the breach to malware that was active on its systems “between May 19, 2014, and June 2, 2015”. Tim Erlin, Director of security […]

Majority of Organizations Still Gambling with IT Security

Still Gambling with IT Security

Lieberman Software Survey Reveals Many Organizations Fail to Take Proactive Approach to Cyber Defense A new survey from Lieberman Software Corporation revealed that 92 percent of IT security professionals believe that cyber security drills are a good way to prepare for cyber attacks. However, 63 percent of those surveyed admitted that their organizations never run […]

DDOS Attacks : A Perfect Smoke Screen for APTS and Silent Data Breaches

Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents. During this year alone, many security companies have announced a significant increase of DDoS attacks, highlighting growth of their diversity, complexity and quantity. The main resources, usually targeted by the attackers, are web applications […]

Europe’s Brightest Security Start-Ups to Join its Second Accelerator Programme

Europe’s Brightest Security Start-Ups

Cyber London, Europe’s first dedicated cyber security start-up accelerator and incubator, is announcing the start of its second programme to support the brightest new European security companies. Cyber London fosters a thriving home-grown community of cyber security companies in the heart of London and the first programme was successfully completed between April and July 2015. […]

Improving Breach Response Times and Recovery Costs

Improving Breach Response Times and Recovery Costs

The Ponemon Institute has just released the 6th annual Ponemon Institute 2015 Cost of Cyber Crime. The report notes that the average cost of a cyber attack has climbed significantly, and is now $12.7 million (up from $11.6M in 2014). Resolution times have also increased significantly, 32 to 45 days – a 41% increase. In […]

Reduces Cloud Infrastructure Attack Surface with New Capabilities in Nessus v6

Reduces Cloud Infrastructure Attack Surface

New Nessus Agents for Amazon, Debian and Ubuntu Linux, and new Nessus scanner for AWS help customers simplify cloud vulnerability management Tenable Network Security®, Inc., the leader in continuous network monitoring™, announced new capabilities for Nessus® v6 that allow customers to simplify and extend vulnerability management for cloud environments by reducing the cloud infrastructure attack […]

Q&A on Web Vulnerabilities

Q&A on Web Vulnerabilities

How well do you think companies are dealing with security threats? Does it vary much between sectors? Companies are not taking web vulnerabilities seriously. In our latest research of over 30,000 websites, 86% had at least one serious vulnerability where an attacker could compromise the system and cause serious commercial or reputational damage. What is really […]