Cyber Smart Staff Are The First Line Of Defence

The City of London Police announced that they will be hiring a team of cyber detectives, amid growing concerns of cyber-attacks throughout London. While these detectives will no doubt be a great asset to the police force, companies can also look to their staff to play a key role in protecting their business. The day-to-day […]

ClipboardWalletHijacker Malware Spreads Rapidly Through Crypto World

A new malware campaign monitors victim computer clipboards for your Bitcoin and Ethereum addresses to steal coins. The robust malware named ClipboardWalletHijacker has infected around 300,000 computers within one week. Researchers from the 360 Security Center have discovered a new malware targeting Bitcoin and Ethereum users. The Trojan named ‘ClipboardWalletHijacker’ literally hijacks a victim computer’s clipboard to hunt for Bitcoin […]

Endpoint Security Automation A Top Priority For IT Professionals

SANS 2018 Endpoint Protection and Response Survey highlights appetite for automating security, but next-gen capabilities often not implemented Global cyber security training company, the SANS Institute, today released its 2018 SANS Endpoint Security Survey report, which found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable […]

75% of Malware Uploaded on “No-Distribute” Scanners Is Unknown to Researchers

News broke yesterday that three-quarters of malware samples uploaded to “no-distribute scanners” are never shared on “multiscanners” like VirusTotal, and hence, they remain unknown to security firms and researchers for longer periods of time. Andy Norton, Director of Threat Intelligence at Lastline commented below. Andy Norton, Director of Threat Intelligence at Lastline:  “A big part of using no-distribute scanning […]

SCADA Systems Still Hopelessly Vulnerable To Cyberattacks

A presentation at last week’s BSides conference by researchers from INSINIA emphasised that industrial control systems could be exposed not just to remote hackers, but to local attacks and physical manipulation as well. The talk reviewed 25 years of industrial control kit, going back to the days of proprietary equipment and X21 connections before discussing […]

Tesla Hit By ‘Damaging Sabotage’ By Employee

On Sunday night, Tesla CEO Elon Musk sent an email to all employees alleging there was a saboteur within the company’s ranks. Musk said this person had conducted “quite extensive and damaging sabotage” to the company’s operations, including by changing code to an internal product and exporting data to outsiders. IT security experts commented below. Chris […]

Preparing For The Next European Union Directive: Eu Nis

It’s fair to say the General Data Protection Regulation (GDPR) has received attention in recent months. It’s only a matter of time until the first major breach occurs, and then we’ll see how things shake out from an enforcement standpoint. Meanwhile, there’s exciting news for compliance jockeys. Another directive from the European Parliament and the Council of […]

Vaccinate Your Organisation Against Commodity Email-Borne Infection Techniques

The success of the Rubella Macro Builder toolkit has demonstrated that the cyber-crime-as-a-service is in rude health right across Europe. A report from Flashpoint reveals that the toolkit has been used to create malicious macros in Microsoft Office documents sent as email attachments in massive criminal spam campaigns. Rubella Macro Builder is fast, on sale […]

5 Top Pieces Of Advice For CISOs

The cyber security market is overwhelmed by buzzwords. Artificial intelligence, machine learning, blockchain – all this attacks CISOs from every possible angle, from webinars and conferences to the media. Most vendors fall into the trends, forgetting about customer needs for the sake of a technology race. Unfortunately, the main problems for CISOs still lie within […]