Proofpoint threat analysts have been tracking and analyzing the malicious macro attachment campaigns that have dominated the threat landscape. Through their continued evolutions, these campaigns nonetheless primarily targeted organizations in North America, and more specifically the United States. In a recent [1] post we described how known Dridex actors appeared to be shifting their targets to Europe, with the example of a campaign targeting Poland. At the time, Proofpoint researchers also detected a sudden, massive increase in activity targeting French organizations and warned that this could be the beginning of a sustained attack. Additional monitoring and analysis have confirmed that…
Author: ISBuzz Team
The most interesting cases of identity fraud in history, from BC to AD Given the apparent rise in the number of large-scale data breaches, affecting everyone from national governments to multinational corporations, you would be forgiven for assuming that identity theft was an exclusively modern phenomenon. While technology has undoubtedly allowed identity fraudsters to become more sophisticated, demanding more and more sophisticated methods of prevention, the problem is one that dates back to well beyond the advent of the Internet. With this in mind, we’ve decided to put together a handy infographic charting the evolution of identity fraud over time.…
Successful Serial Entrepreneur and Technology Visionary Brings 30 Years of Leadership Experience in Global High Tech Businesses to Security Start-Up Spikes Security, the isolation security company, announced that Michael Mansouri has joined the company as President and Chief Operating Officer. In the newly created position, Mansouri will work alongside CEO, CTO and founder Branden Spikes as the company continues its growth as a network security industry innovator. “While I’ve enjoyed great success in the past, this opportunity has the potential to be absolutely game-changing,” said Mansouri. “Branden created the initial concept at SpaceX where he was Elon Musk’s right hand technology leader…
New online hub to tackle cyber skills shortage A new scheme to protect small businesses from cyber attacks has been announced by Government. Speaking at the Reform “Cyber Security: assurance, resilience, response” conference in London, Digital Economy Minister Ed Vaizey has outlined how a new voucher scheme designed specifically for small and medium-sized businesses (SMEs) will launch later this month. The launch of the voucher scheme is part of a package of initiatives designed to increase the resilience of UK businesses to cyber-attacks. The package also includes a new online learning and careers hub to help ensure the UK has…
Resilient’s Incident Response Platform will enable Teva to respond faster and more comprehensively to any cyber security incidents Resilient Systems (formerly Co3 Systems), the leading Incident Response Platform (IRP) provider, has announced that Teva Pharmaceutical Industries Ltd., a global pharmaceutical company, has selected the Resilient Systems IRP to manage response to cybersecurity incidents. Following a detailed scope of requirements and analysis of multiple vendors, Teva selected Resilient Systems as the Incident Response partner that best reflected its objectives. The Resilient Systems platform is based on industry best practice from organisations such as the National Institute of Standards and Technology (NIST)…
What would happen if access management disappeared overnight and we had to cope the next day without it? What impact would this have on an organization and its information systems? Let’s have a quick look at this scenario. In its purest form, access management is about access. This could be both physical access (entry into premises or a specific area in a building) and logical access (access to systems, applications, printers, shares etc.). Access management is often named in combination with identity management, and these two concepts are closely interrelated. Authentication In identity management, the user proves that he is…
Sandwiches have just got a whole lot easier to buy. Apple Pay – the contactless payment system in all iPhone 6s and Apple Watches – has just launched in the UK. With 74.5 million iPhones sold last quarter, and millions of Apple Watches sold to date, a lot of people are ready to buy a halloumi and spinach wrap with their phone today. At least, in theory. By analysing 26,000 online mentions of the Apple Watch UK launch, we’ve assembled an unwilling focus group of 15,789 people. We’ve learned about their spending habits – and that, on the whole, it’s not working so well.…
Cybersecurity experts are reacting to today’s news that the UCLA Health System is exploring a possible data breach : Richard Blech, CEO, Secure Channels (www.securechannels.com): “Isn’t it a tad simplistic to assume that hackers got in and took nothing? Wouldn’t it make more sense to assume that if the hackers bothered to hack…they probably took data? The reality is while hackers rapidly improve their cyber security chops the average company doesn’t. If the hackers are advanced enough (assuming UCLA has improved their security since their last incident) to breach the perimeter it makes more sense to believe they were capable…
PricewaterhouseCoopers (PwC) Switzerland and High-Tech Bridge have announced a joint business relationship to bring a new and innovative set of web application security services to their clients. The joint business relationship will provide clients with access to High-Tech Bridge’s innovative ImmuniWeb® application security testing service as part of PwC’s market leading Threat and Vulnerability Management services. The growing sophistication of global cybercrime requires a cost-effective, technically efficient continuous web application security testing and monitoring service available 24/7. This vital function is perfectly accomplished by ImmuniWeb®, an on-demand web application security testing platform developed and supported by High-Tech Bridge. A ImmuniWeb® security assessment combines both a managed…
Software-based secure element solution enables mobile payment providers to address critical security vulnerability in Host Card Emulation-based mobile payments by protecting customer data stored in smart phone memory Sequent, a leading innovator of digital issuance and mobile wallet platform as-a-service, and Arxan Technologies, the leading provider of application protection solutions, today announced a strategic partnership to deliver secure mobile payments for financial institutions and other organisations deploying mobile payment solutions. Sequent and Arxan are combining their industry-leading security technologies in a new solution that protects Host Card Emulation (HCE)-based payment service deployments from threats. “As a recognised leader in mobile payment security,…