The Quadfecta Of Data Protection

Date loss

This year alone, we have seen a hacker take control of a hotel’s key card system, locking guests in their room until a ransom was paid[1]; 2.5 million PlayStation and Xbox user credentials exposed[2] and Aberdeen city council’s website overrun with hackers — and those are just the ones who have admitted to it. It’s no […]

‘NSA Malware’ Released By Shadow Brokers Hacker Group

The “Shadow Brokers” hacker group has released malware allegedly created by the US National Security Agency (NSA). The group, which earlier tried to sell the encrypted cache of hacking tools in an online auction, released a password for it via a blog on 8 April. Cris Thomas (aka Space Rogue), Strategist at Tenable Network Security commented […]

AMAZON HACK: Identity Is The New Attack Vector

Amazon authentication

Following the news that hackers are targeting Amazon third-party sellers, using stolen credentials to post fake deals and steal cash, Kevin Cunningham, President & Co-Founder at SailPoint commented below. Kevin Cunningham, President & Co-Founder at SailPoint: “The Amazon hack is an example of how identity has become the new attack vector, and hackers are all over that fact – […]

FDA Fears Wave Of Medical Device Hacks

The FDA is concerned about medical device vulnerability as per this article, Ilia Kolochenko, CEO of web security company about security and healthcare commented below. Ilia Kolochenko, CEO & Founder, ImmuniWeb Chief Architect at High-Tech Bridge: “I think we should distinguish three different hacking activities. The first problem is ransomware, which usually does not target […]

Radware Highlights New Form Of Malware Called BrickerBot Which Corrupts Device’s

Last week, Radware highlighted a new form of malware called BrickerBot that corrupts a device’s storage capability and reconfiguring kernel parameters. Cesare Garlati, Chief Security Strategist at prpl foundation commented below. Cesare Garlati, Chief Security Strategist at prpl foundation: “This is another case where – if properly implemented – security through separation using the prplSecurity framework could isolate core […]

It’s Not A WhatsApp Voice Message, It’s A Trojan Virus!

 ESET Ireland warns Irish WhatsApp users not to click on an email that claims it’s from WhatsApp, but in reality, spreads a trojan infection. A dangerous email spam message is dropping into Irish mailboxes, pretending to come from WhatsApp. Its subject says “Missed voicemail” and the content of the mail just says “New voicemessage” and […]

Microsoft Word Zero-Day Vulnerability

Following the news that a new zero-day vulnerability that affects all supported versions of Microsoft Word has been uncovered and is already being used to launched attacks, Paul Farrington,  Manager, EMEA Solution Architects at Veracode commented below. Paul Farrington,  Manager, EMEA Solution Architects at Veracode:  “Clearly the fact that the RTF file is able download the malicious HTML that […]

GameStop Looks Into a Potentially Serious Credit Card Breach

Following the News that GameStop are looking into a potentially serious credit card breach. GameStop has confirmed that it’s looking into a possible data breach that compromised credit card info between September 2016 and February 2017. Mike Ahmadi, Global Director – Critical Systems Security at Synopsys commented below. Mike Ahmadi, Global Director – Critical Systems Security at Synopsys:   “This is yet […]