Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

Study & Research

IT Professionals’ Confidence In Public Cloud Has Surged, Despite Performance Optimisation Issues

IT Professionals’ Confidence In Public Cloud Has Surged, Despite Performance Optimisation Issues

January 14, 2021
Global survey uncovers evolving attitudes about cloud networking More than three-quarters of organisations are now using multiple cloud providers, such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform, ...
Read More
'Directly Hackable' Hospital Devices Exposed Online

Cyber-attacks On Hospitals Spike By 45% Worldwide

January 5, 2021
Check Point Research (CPR) report a 45% increase in cyber-attacks on healthcare organizations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals. · Increase ...
Read More
Hidden Costs of a Data Breach

Vulnerabilities in the Next Generation of 5G Could Allow Attackers to Steal Credentials and Falsify Subscriber Authentication

December 17, 2020
Vulnerabilities in standalone 5G networks could allow attackers to steal credentials and falsify subscriber authentication Attackers can exploit vulnerabilities in new 5G networks to steal subscriber data and impersonate users ...
Read More
The Well-Intentioned Threat of Data Protection and Privacy?

More Than 45 Million Medical Images Openly Accessible Online

December 15, 2020
CybelAngel identifies medical devices and web portals leaking unprotected images including X-rays and CT Scans The analyst team at CybelAngel, a global leader in digital risk protection, has discovered that ...
Read More
Research: Fewer Than 10% Of Security Professionals Feel Prepared For 5G Rollout – AT&T Cybersecurity Insights Report

Research: Fewer Than 10% Of Security Professionals Feel Prepared For 5G Rollout – AT&T Cybersecurity Insights Report

December 9, 2020
The dawn of 5G technology is upon us and this new wireless power promises to be a faster and better successor to 4G networks. With more devices connecting to more ...
Read More
Black Friday 2020 Saw Retailers Capitalising On Publicly Available Data More Than Ever Before, Finds New Research

Black Friday 2020 Saw Retailers Capitalising On Publicly Available Data More Than Ever Before, Finds New Research

December 3, 2020
Data reveals a major increase in e-commerce retailers leveraging technology to understand the actions of competitors and customers over Black Friday period With UK retail shops closed over Black Friday ...
Read More
The Principle of Least Privilege

As Lockdown Continues, 75% Of UK Enterprises Are Set To Increase Spend On Remote Working Technology

November 19, 2020
Research from Amdocs reveals UK enterprises will place new cloud technology at the heart of their IT strategies New research from Amdocs has revealed that 75% of UK enterprises say ...
Read More
Cybersecurity

(ISC)2 Study Reveals The Cybersecurity Workforce Has Grown To 3.5 Million Professionals Globally

November 12, 2020
2020 (ISC)2 Cybersecurity Workforce Study chronicles the resiliency, outlook and perseverance of this growing profession as it faced the unprecedented challenges of the COVID-19 pandemic Clearwater, FL, November 11, 2020 ...
Read More
Protect User Data from Government Surveillance

HP Threat Research: Emotet Campaigns Targeting Enterprises Surge By 1,200% In Q3 2020

November 3, 2020
The NCSC report shows it uncovered 15,354 campaigns that had used coronavirus themes as a "lure" to fool people into clicking on a link or opening an attachment containing malicious software ...
Read More
Positive Technologies: 84 Percent Of Companies Have High-Risk Vulnerabilities On The Network Perimeter

Positive Technologies: 84 Percent Of Companies Have High-Risk Vulnerabilities On The Network Perimeter

October 29, 2020
Positive Technologies performed instrumental scanning of the network perimeter of selected corporate information systems.[1] A total of 3,514 hosts were scanned, including network devices, servers, and workstations. The results show the presence of ...
Read More
Fewer Than 1 In 3 Cybersecurity Professionals Say Threat Data They Receive Is Extremely Accurate And Relevant

Fewer Than 1 In 3 Cybersecurity Professionals Say Threat Data They Receive Is Extremely Accurate And Relevant

October 26, 2020
New research suggests many organisations struggle to obtain high-quality threat data to guide key security decisions  Neustar, Inc., a global information services and technology company and a leader in identity ...
Read More
NEWS: 68% Concerned About Remote Collab Tool Privacy - Cisco

NEWS: 68% Concerned About Remote Collab Tool Privacy – Cisco

October 22, 2020
Cisco Reports Privacy and Security Concerns Increase in Today’s Remote World News Summary: Two new global surveys highlight the challenges and opportunities of the accelerated transition to a cloud-first, remote ...
Read More
These Are The Top Tech Cities Across The World

These Are The Top Tech Cities Across The World

October 22, 2020
Data reveals the top 10 cities for Technology A new study from Business Fibre reveals the best cities to be a tech student around the world London ranks highest as ...
Read More
Survey: 45% Of Cyber Security Attacks Fuelled By Lack Of Visibility Over IaaS Cloud Infrastructure

Survey: 45% Of Cyber Security Attacks Fuelled By Lack Of Visibility Over IaaS Cloud Infrastructure

October 8, 2020
Rush to maintain business continuity means proper management over who has access to IaaS environments has slipped for many organisations SailPoint, the leader in identity management, has found that 45% ...
Read More
Payments security compliance continues it's downward trend, finds Verizon report

Payments security compliance continues it’s downward trend, finds Verizon report

October 6, 2020
Only 1 in 4 Global Organizations Keep Cardholder Payment Data Secure Verizon Business 2020 Payment Security Report (PSR) cites lack of long term security strategies by business leaders behind 3rd-year ...
Read More
Can you spot these home security mistakes?

Can you spot these home security mistakes?

October 2, 2020
Almost half of UK residents admit to making security mistakes when they leave their home When you’re heading out of the door in a rush - perhaps late for a ...
Read More
badlock vulnerability

Research Exposes Cybersecurity Industry’s Vulnerabilities On The Dark Web

September 8, 2020
Geneva, Switzerland, 08 September 2020 - global application security company ImmuniWeb, has conducted research into the state of the global cybersecurity industry’s exposure on the Dark Web this year. Its findings ...
Read More
Securonix Threat Research: Detecting WastedLocker Ransomware

Securonix Threat Research: Detecting WastedLocker Ransomware

August 17, 2020
The Securonix Threat Research Team is actively investigating the details of the critical targeted Wastedlocker ransomware attacks that has reportedly already exploited more than 31 companies, with 8 of the victims being Fortune 500 companies. Here are the key details regarding the impact of the high-profile WastedLocker ransomware attacks/EviICorp malicious cyber threat actor(s)(MTA) involved: The WastedLocker ransomware is a relatively new malicious payload used by the high-profile EvilCorp MTA, which previously used the Dridex trojan to deploy BitPaymer ransomware in attacks targeting government organisations and enterprises in Europe and the United States. This MTA currently focuses on targeted °big game hunting” (BGH) ransomware attacks with multiple industry victims in recent months, with Garmin as one of the latest high-profile victims attacked (officially confirmed by Garmin on July 27).  The most recent ransom amount demanded was $10 million, and appears to be based on the victim’s financial data. Based on the available details, the ransom was likely paid. To date, this MTA appears ...
Read More
Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks

Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks

August 11, 2020
Phishing emails with subject lines related to vaccines now being used to trick recipients into downloading malicious Windows, Word and Excel files designed to steal a person’s credentials  Number of ...
Read More
IoT BotnetsAnd Shifting Ransomware Are Raising The Stakes For Enterprises Worldwide

IoT BotnetsAnd Shifting Ransomware Are Raising The Stakes For Enterprises Worldwide

July 28, 2020
A new report from Nozomi Networks Labs finds cyber threats against Operational Technology (OT) and IoT infrastructure continued to grow in number and impact in the first half of 2020. OT-reliant ...
Read More
Balbix Report Reveals the Major Concerns and Risks Hindering CISOs’ Ability to Strengthen Security Posture

Balbix Report Reveals the Major Concerns and Risks Hindering CISOs’ Ability to Strengthen Security Posture

July 22, 2020
9 out of 10 Security Professionals Cite Phishing and Ransomware as Top Risks, Yet Only Half Report Sufficient Visibility into Such Threats SAN JOSE, Calif. – July 21, 2020 – Balbix Inc., provider ...
Read More
Infoblox Survey Finds That DNS Accelerates Threat Resolution But Is Under-used By Security Teams

Infoblox Survey Finds That DNS Accelerates Threat Resolution But Is Under-used By Security Teams

July 21, 2020
203 senior security and risk professionals reveal a missed opportunity to leverage DNS throughout the threat analysis and response cycle    Infoblox Inc., the leader in Secure Cloud-Managed Network Services, commissioned ...
Read More
Data Protection Officers Foresee DSAR Trouble In Store From Britain’s Post-Covid Jobless

Data Protection Officers Foresee DSAR Trouble In Store From Britain’s Post-Covid Jobless

July 16, 2020
Study finds lockdown’s furloughed and laid off staff set to trigger spike in DSARs for HR Officers  Fall-out from lockdown is already causing difficulty meeting data compliance obligations for 75% ...
Read More
Research Predicts Dramatic Increase In Volume And Value Of Fines For Data Breaches And Poor Data Deletion Practices

Research Predicts Dramatic Increase In Volume And Value Of Fines For Data Breaches And Poor Data Deletion Practices

July 6, 2020
Between now and 2025, 37% of people in work expect the number and value of fines faced by employers for data breaches to increase – with 6% anticipating a dramatic ...
Read More
DNS Security is too Easily Taken for Granted

New Intelligence Reveals that Alina Point-of-Sale Malware is Still Lurking in DNS

July 2, 2020
CenturyLink’s Black Lotus Labs warns organizations of credit card theft DENVER, July 1, 2020 – Point-of-Sale (POS) malware is nothing new, and the Alina malware – which cybercriminals use to ...
Read More
Businesses Incur Greater Losses Year-On-Year Due To Payment Fraud

Businesses Incur Greater Losses Year-On-Year Due To Payment Fraud

June 17, 2020
Bottomline 2020 Business Payments Barometer reveals:  Only 1 in 10 small businesses report recovering more than 50% of losses due to fraud Despite an increase in new payments initiatives and ...
Read More
  • 1
  • 2
  • 3
  • …
  • 27
  • ›
Loading...

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel