An Effective Cyber Hygiene Program Can Save A Business

According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error. For example, 63 percent of breaches leveraged weak, default, or stolen passwords, and 12 percent of breaches involved clicking on a malicious link or attachment. Left uninhibited, employees will behave how they choose when they […]

Russian Bank Hack

Follow the news that Russian hackers stole $10M from banks by infiltrating ATM networks, Stephan Chenette, CEO at AttackIQ commented below. Stephan Chenette, CEO at AttackIQ: “Most organizations have put security controls in place to prevent attackers from breaching and exploiting high value target systems such as SWIFT and ATM networks. In many cases, misconfigurations in these security controls and logging […]

CEOs Still Not Paying Attention To Cybersecurity

World’s 10 Hottest Cybersecurity Companies to Watch in 2016

A new report from CA Veracode* reveals a lack of understanding of cybersecurity by CEOs who do not seem to address cybersecurity unless they are forced to. Michael Patterson, CEO at Plixer commented below. Michael Patterson, CEO at Plixer: “Board members and organizational leaders are fundamentally driven to deliver higher profits for the company and […]

2018 Predictions – From Cryptocurrency Mining To ‘Fileless’ Attacks

Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more attacks and malware include mining functionality to generate revenue. In particular a focus will be on in-browser mining that will be the result of website attacks. A simple few lines of Javascript can cause visiting […]

McAfee Collaborates With Samsung To Deliver Enhanced Security To Galaxy Note8 Users

cyber attack

Santa Clara, Calif. – McAfee today announced further collaboration with Samsung to support the back-end for Samsung’s newly pre-installed Wi-Fi protection, Secure Wi-Fi on the Galaxy Note8, in the U.S. and Europe. With the pre-installed application, Galaxy Note8 users will benefit from increased privacy while on the go, enabling them to experience the digital world with greater confidence. Per a recent […]

VERT Threat Alert: Return Of Bleichenbacher’s Oracle Threat (ROBOT)

VULNERABILITY DESCRIPTION A team of researchers, including Tripwire VERT’s Craig Young has announced that TLS stacks from at least 8 different vendors are vulnerable to a well-known 19-year-old protocol flaw. The problem is that these implementations allow an attacker to identify whether or not a chosen ciphertext has proper PKCS#1 v1.5 padding when decrypted. This allows for a classic […]