Lieberman Software Integrates With Okta To Provide Secure Authentication For Privileged Access

Company Exhibits Joint Single Sign On (SSO) and Password Reset Solutions at Oktane 16 London, UK.  Lieberman Software Corporation today announced new capabilities that integrate the company’s Privileged Identity Management (PIM) platform, Enterprise Random Password Manager™ (ERPM), with Okta’s market leading authentication and security platform. The integration provides secure SSO that allows only authenticated users to access […]

RIPPER Malware Attacks Thai ATMs

The new RIPPER malware is allowing crime groups to target ATMs. It is believed to have successfully dispensed bank notes illicitly in Thailand, with criminals making off with some 12 million baht (A$460,000). Kevin Bocek at Venafi commented below. Kevin Bocek, Vice President, Security Strategy & Threat Intelligence at Venafi: “Cybercriminals are feeling the squeeze as EMV chip […]

Opera Browser Sync Service Hacked

Following the news that Opera, the Norway-based internet browser maker, has confirmed that a hacker breached one of the company’s sync servers, potentially exposing passwords, IT security experts from Rapid7 and Centrify commented below. Corey Williams, Senior Director, Products and Marketing at Centrify: “The potential payoff of 1.7 million passwords could be huge.  Attackers will work hard […]

Submersive Security: How The Data Protection Efforts Of DCNS Were Torpedoed

What could shipbuilder DCNS have done to better protect its sensitive documents detailing the build specifications for the Scorpene submarine? James Henry, Consulting Practice Director for Auriga, looks at the lessons we should all take from the incident. News of a massive data leak affecting French shipbuilder DCNS emerged this week regarding the Scorpene submarine. […]

Nuix Disrupts Endpoint Security With Industry’s First End-to-End Adaptive Security Technology

HERNDON.  /PRNewswire/ — Global technology company Nuix today announced Nuix Insight Adaptive Security, the first endpoint security platform to tightly integrate cybersecurity threat prevention, detection, response, remediation, and deception in one solution. Unlike traditional endpoint security products, Nuix designed its adaptive security platform from the ground up to provide a seamless end-to-end approach for protection. […]

UK An Attractive Target For DDos Attackers

Following the news about how the UK can stop being so attractive to DDos attackers, Stephanie Weagle, Senior Director at Corero commented below. Stephanie Weagle, Senior Director at Corero: “What makes the UK such an attractive target for DDoS attackers, over and above other countries (only the US got DDoS’sed more)? “DDoS attacks have become […]

Don’t Be The Weakest Link: Protecting Your Supply Chain From Targeted Malware Attacks

Every senior manager knows that falling prey to a malware attack could yield catastrophic results. But what if that malware spread beyond your own systems, taking your partners, customers and supply chain down with you? Cybercriminals have been busy over the past year, carrying out an alarming number of malware attacks varying the payload from […]

Apple Release Emergency iOS Update For 3 Zero-Days

A sophisticated piece of malware has exploited three different unknown vulnerabilities in Apple’s iOS operating system that would allow attackers to get full control of an iPhone. Government hackers have been caught using the never-before-seen malware/iPhone spy tool in an unprecedented attack never before seen in the wild. Apple have release an emergency update which […]

Dropbox Resetting Old Passwords

Following the news that Dropbox is resetting passwords that haven’t been changed since 2012, Charles Read, Regional Director – UK, Ireland and Benelux at OneLogin commented below. The comment looks at how, despite it being a positive move to come from a vendor as large as Dropbox, for a truly secure environment, the implementation of […]

Mr Robot Inspired Ransomware

Hackers have developed a ransomware inspired by hit TV show Mr Robot and named it after the fictional hactivist group ‘fsociety’. The ransomware is yet to have infected anyone and is believed to be still under development. IT security experts from Tripwire and AlienVault commented below. Craig Young, Security Researcher at Tripwire: “With the most […]