1/4 Of DDoS Attacks Hit Unintended Victims

In response to today’s Kaspersky Labs’ research summary “No Room for Cyber-Complacency: a Quarter of DDoS Attacks Claim Unintended Victims”, a cybersecurity expert with Corero Network Security, leaders in real-time, high-performance DDoS defense solutions commented below. Andrew Lloyd, President at Corero Network Security: “Naturally, we agree with Kaspersky’s recommendation that organizations invest in DDoS protection. However, in […]

2018 Cloud Security Report Released Today

Crowd Research Partners today released the 2018 Cloud Security Report which includes the following takeaways: Cloud Security Issues-The top three security control challenges security operations centers (SOCs) are struggling with are visibility into infrastructure security (43%), compliance (38%),and setting consistent security policies across cloud and on-premises environments (35%). Effective cloud security solutions – Encryption of data at […]

150 Million Affected By Under Armour Data Breach

In response to the news that Fitness Brand Under Armour has suffered a massive data breach affecting 150 million users, IT security experts commented below. Terry Ray, CTO at Imperva: “Most consumers are becoming a bit desensitized to data breaches, which have become common enough to barely make the news.  And if one breach makes […]

Msoft Meltdown Patch & New Vulns

security patch

In response to reports that Microsoft’s meltdown patch has opened a new set of vulnerabilities, a cybersec expert with Juniper Networks offers perspective. Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks commented below. Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks: “The rush to quickly close vulnerabilities is often a treacherous path that […]

Beastiality Website Leaked Online

Commitment to Online Trust and Security

Following the latest news that the private details of over 3,000 users of a bestiality website have been leaked online, David Emm, Principal Security Researcher at Kaspersky Lab commented below. David Emm, Principal Security Researcher at Kaspersky Lab: “The news that the private details of over 3,000 users of a bestiality website have been leaked […]

Northern Ireland Assembly

It has been reported that the Northern Ireland Assembly has issued warnings to staff following cyber attacks on its IT system. External hackers e attempted to access staff email accounts by brute-forcing passwords. IT security experts commented below. Richard Walters, Cheif Security Strategist at CensorNet: “This attack shows that it doesn’t matter who people are or […]

TalkTalk Urged To Improve Security

It has been reported today that TalkTalk has been urged to improve its security after a researcher found a “Cross Site Scripting” error allowing him to take control of a convincing looking “talktalk.co.uk” URL, which meant he could potentially trick any of the company’s webmail customers into thinking they were accessing an official TalkTalk website. TalkTalk was apparently told about […]

Getting Buy-In From The Board – Advice For CIOs

IT and security conversations are moving away from the confines of remote IT departments and are finding their way to the top of boardroom agendas. As they do so, CIOs need to carefully consider the way they communicate with other senior executives if critical IT initiatives are to receive that all important buy-in from the […]

Cyberattacks Now #1 Threat To Swiss Banks

Cybersecurity Pros Face Increased Pressures

It has been reported that cyber-attacks pose the biggest threat to the Swiss financial system with risks from hacking incursions on the rise, watchdog FINMA warned on Tuesday, calling on Switzerland to step up its national defences against the menace. FINMA said on the whole Swiss banks seemed aware of the risks and were well equipped […]

Sanny Malware

It is being reported that the group behind the Sanny malware attacks have made significant changes to the way it delivers their payload. Findings by security researchers has uncovered that the attackers have upgraded their delivery techniques when it comes to planting malware on systems via document attachments sent as part of spam and phishing campaigns. The […]