Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
The Cyber Risks Of Non-Compliance
70% of UK Finance Industry Hit With Cyber-Attacks...
A Chinese Hacking Group Is Stealing Airline Passenger...
Expert Commentary: Hacker Posts 1.9 Million Pixlr User...
NSA And Dutch NCSC Warn Outdated TLS Certs
Federal Agency Warns Cloud Attacks Are On The...
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

Study & Research

IT Professionals’ Confidence In Public Cloud Has Surged, Despite Performance Optimisation Issues

IT Professionals’ Confidence In Public Cloud Has Surged, Despite Performance Optimisation Issues

January 14, 2021
Global survey uncovers evolving attitudes about cloud networking More than three-quarters of organisations are now using multiple cloud providers, such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform, ...
Read More
'Directly Hackable' Hospital Devices Exposed Online

Cyber-attacks On Hospitals Spike By 45% Worldwide

January 5, 2021
Check Point Research (CPR) report a 45% increase in cyber-attacks on healthcare organizations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals. · Increase ...
Read More
Hidden Costs of a Data Breach

Vulnerabilities in the Next Generation of 5G Could Allow Attackers to Steal Credentials and Falsify Subscriber Authentication

December 17, 2020
Vulnerabilities in standalone 5G networks could allow attackers to steal credentials and falsify subscriber authentication Attackers can exploit vulnerabilities in new 5G networks to steal subscriber data and impersonate users ...
Read More
The Well-Intentioned Threat of Data Protection and Privacy?

More Than 45 Million Medical Images Openly Accessible Online

December 15, 2020
CybelAngel identifies medical devices and web portals leaking unprotected images including X-rays and CT Scans The analyst team at CybelAngel, a global leader in digital risk protection, has discovered that ...
Read More
Research: Fewer Than 10% Of Security Professionals Feel Prepared For 5G Rollout – AT&T Cybersecurity Insights Report

Research: Fewer Than 10% Of Security Professionals Feel Prepared For 5G Rollout – AT&T Cybersecurity Insights Report

December 9, 2020
The dawn of 5G technology is upon us and this new wireless power promises to be a faster and better successor to 4G networks. With more devices connecting to more ...
Read More
Black Friday 2020 Saw Retailers Capitalising On Publicly Available Data More Than Ever Before, Finds New Research

Black Friday 2020 Saw Retailers Capitalising On Publicly Available Data More Than Ever Before, Finds New Research

December 3, 2020
Data reveals a major increase in e-commerce retailers leveraging technology to understand the actions of competitors and customers over Black Friday period With UK retail shops closed over Black Friday ...
Read More
The Principle of Least Privilege

As Lockdown Continues, 75% Of UK Enterprises Are Set To Increase Spend On Remote Working Technology

November 19, 2020
Research from Amdocs reveals UK enterprises will place new cloud technology at the heart of their IT strategies New research from Amdocs has revealed that 75% of UK enterprises say ...
Read More
Cybersecurity

(ISC)2 Study Reveals The Cybersecurity Workforce Has Grown To 3.5 Million Professionals Globally

November 12, 2020
2020 (ISC)2 Cybersecurity Workforce Study chronicles the resiliency, outlook and perseverance of this growing profession as it faced the unprecedented challenges of the COVID-19 pandemic Clearwater, FL, November 11, 2020 ...
Read More
Protect User Data from Government Surveillance

HP Threat Research: Emotet Campaigns Targeting Enterprises Surge By 1,200% In Q3 2020

November 3, 2020
The NCSC report shows it uncovered 15,354 campaigns that had used coronavirus themes as a "lure" to fool people into clicking on a link or opening an attachment containing malicious software ...
Read More
Positive Technologies: 84 Percent Of Companies Have High-Risk Vulnerabilities On The Network Perimeter

Positive Technologies: 84 Percent Of Companies Have High-Risk Vulnerabilities On The Network Perimeter

October 29, 2020
Positive Technologies performed instrumental scanning of the network perimeter of selected corporate information systems.[1] A total of 3,514 hosts were scanned, including network devices, servers, and workstations. The results show the presence of ...
Read More
Fewer Than 1 In 3 Cybersecurity Professionals Say Threat Data They Receive Is Extremely Accurate And Relevant

Fewer Than 1 In 3 Cybersecurity Professionals Say Threat Data They Receive Is Extremely Accurate And Relevant

October 26, 2020
New research suggests many organisations struggle to obtain high-quality threat data to guide key security decisions  Neustar, Inc., a global information services and technology company and a leader in identity ...
Read More
NEWS: 68% Concerned About Remote Collab Tool Privacy - Cisco

NEWS: 68% Concerned About Remote Collab Tool Privacy – Cisco

October 22, 2020
Cisco Reports Privacy and Security Concerns Increase in Today’s Remote World News Summary: Two new global surveys highlight the challenges and opportunities of the accelerated transition to a cloud-first, remote ...
Read More
These Are The Top Tech Cities Across The World

These Are The Top Tech Cities Across The World

October 22, 2020
Data reveals the top 10 cities for Technology A new study from Business Fibre reveals the best cities to be a tech student around the world London ranks highest as ...
Read More
Survey: 45% Of Cyber Security Attacks Fuelled By Lack Of Visibility Over IaaS Cloud Infrastructure

Survey: 45% Of Cyber Security Attacks Fuelled By Lack Of Visibility Over IaaS Cloud Infrastructure

October 8, 2020
Rush to maintain business continuity means proper management over who has access to IaaS environments has slipped for many organisations SailPoint, the leader in identity management, has found that 45% ...
Read More
Payments security compliance continues it's downward trend, finds Verizon report

Payments security compliance continues it’s downward trend, finds Verizon report

October 6, 2020
Only 1 in 4 Global Organizations Keep Cardholder Payment Data Secure Verizon Business 2020 Payment Security Report (PSR) cites lack of long term security strategies by business leaders behind 3rd-year ...
Read More
Can you spot these home security mistakes?

Can you spot these home security mistakes?

October 2, 2020
Almost half of UK residents admit to making security mistakes when they leave their home When you’re heading out of the door in a rush - perhaps late for a ...
Read More
badlock vulnerability

Research Exposes Cybersecurity Industry’s Vulnerabilities On The Dark Web

September 8, 2020
Geneva, Switzerland, 08 September 2020 - global application security company ImmuniWeb, has conducted research into the state of the global cybersecurity industry’s exposure on the Dark Web this year. Its findings ...
Read More
Securonix Threat Research: Detecting WastedLocker Ransomware

Securonix Threat Research: Detecting WastedLocker Ransomware

August 17, 2020
The Securonix Threat Research Team is actively investigating the details of the critical targeted Wastedlocker ransomware attacks that has reportedly already exploited more than 31 companies, with 8 of the victims being Fortune 500 companies. Here are the key details regarding the impact of the high-profile WastedLocker ransomware attacks/EviICorp malicious cyber threat actor(s)(MTA) involved: The WastedLocker ransomware is a relatively new malicious payload used by the high-profile EvilCorp MTA, which previously used the Dridex trojan to deploy BitPaymer ransomware in attacks targeting government organisations and enterprises in Europe and the United States. This MTA currently focuses on targeted °big game hunting” (BGH) ransomware attacks with multiple industry victims in recent months, with Garmin as one of the latest high-profile victims attacked (officially confirmed by Garmin on July 27).  The most recent ransom amount demanded was $10 million, and appears to be based on the victim’s financial data. Based on the available details, the ransom was likely paid. To date, this MTA appears ...
Read More
Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks

Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks

August 11, 2020
Phishing emails with subject lines related to vaccines now being used to trick recipients into downloading malicious Windows, Word and Excel files designed to steal a person’s credentials  Number of ...
Read More
IoT BotnetsAnd Shifting Ransomware Are Raising The Stakes For Enterprises Worldwide

IoT BotnetsAnd Shifting Ransomware Are Raising The Stakes For Enterprises Worldwide

July 28, 2020
A new report from Nozomi Networks Labs finds cyber threats against Operational Technology (OT) and IoT infrastructure continued to grow in number and impact in the first half of 2020. OT-reliant ...
Read More
Balbix Report Reveals the Major Concerns and Risks Hindering CISOs’ Ability to Strengthen Security Posture

Balbix Report Reveals the Major Concerns and Risks Hindering CISOs’ Ability to Strengthen Security Posture

July 22, 2020
9 out of 10 Security Professionals Cite Phishing and Ransomware as Top Risks, Yet Only Half Report Sufficient Visibility into Such Threats SAN JOSE, Calif. – July 21, 2020 – Balbix Inc., provider ...
Read More
Infoblox Survey Finds That DNS Accelerates Threat Resolution But Is Under-used By Security Teams

Infoblox Survey Finds That DNS Accelerates Threat Resolution But Is Under-used By Security Teams

July 21, 2020
203 senior security and risk professionals reveal a missed opportunity to leverage DNS throughout the threat analysis and response cycle    Infoblox Inc., the leader in Secure Cloud-Managed Network Services, commissioned ...
Read More
Data Protection Officers Foresee DSAR Trouble In Store From Britain’s Post-Covid Jobless

Data Protection Officers Foresee DSAR Trouble In Store From Britain’s Post-Covid Jobless

July 16, 2020
Study finds lockdown’s furloughed and laid off staff set to trigger spike in DSARs for HR Officers  Fall-out from lockdown is already causing difficulty meeting data compliance obligations for 75% ...
Read More
Research Predicts Dramatic Increase In Volume And Value Of Fines For Data Breaches And Poor Data Deletion Practices

Research Predicts Dramatic Increase In Volume And Value Of Fines For Data Breaches And Poor Data Deletion Practices

July 6, 2020
Between now and 2025, 37% of people in work expect the number and value of fines faced by employers for data breaches to increase – with 6% anticipating a dramatic ...
Read More
DNS Security is too Easily Taken for Granted

New Intelligence Reveals that Alina Point-of-Sale Malware is Still Lurking in DNS

July 2, 2020
CenturyLink’s Black Lotus Labs warns organizations of credit card theft DENVER, July 1, 2020 – Point-of-Sale (POS) malware is nothing new, and the Alina malware – which cybercriminals use to ...
Read More
Businesses Incur Greater Losses Year-On-Year Due To Payment Fraud

Businesses Incur Greater Losses Year-On-Year Due To Payment Fraud

June 17, 2020
Bottomline 2020 Business Payments Barometer reveals:  Only 1 in 10 small businesses report recovering more than 50% of losses due to fraud Despite an increase in new payments initiatives and ...
Read More
  • 1
  • 2
  • 3
  • …
  • 27
  • ›
Loading...

SECURELY DOTTED BY

Sam Curry, Chief Security Officer, Cybereason

"Operation-centric security enables security analysts to string together disparate pieces of information involved in malicious cyber activity. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Javvad Malik, Security Awareness Advocate, KnowBe4

"Given the trends of recent years, breaches have shown no signs of slowing down. "

Experts Reaction On World Economic Forum 2021 Report Cites Cyber Failure As 4th Highest Risk

Jake Moore, Cybersecurity Specialist, ESET

"Signal is open source which makes it easier to patch and keeps costs down. "

Major Security Flaws Found In Signal And other Video Chat Apps

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Security risks only get introduced when you turn it on and use it. "

Comment On IoT Risks Of Peloton Bike

Matt Lock, Technical Director , Varonis

"Everyone should take some basic precautions: check settings, change default passwords and disable features you’re not using. "

Comment On IoT Risks Of Peloton Bike

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Hackers use the login info gleaned from previous data breaches to perform credential stuffing or password spraying attacks. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"Ransomware will remain a global cyber security threat during 2021. "

70% of UK Finance Industry Hit With Cyber-Attacks In 2020

Boris Cipot, Senior Sales Engineer , Synopsys

"Cybercriminals will try to abuse every piece of information they have on you for their own personal gain. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Paul Bischoff, Privacy Advocate, Comparitech

"The fact that Chimera's activity went undiscovered for up to three months shows just how dangerous state-sponsored hackers can be. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Saryu Nayyar, CEO, Gurucul

"Two million Pixlr user accounts did not include financial information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Pravin Rasiah, VP of Product, CloudSphere

"Businesses should invest in a cloud governance platform that provides holistic, real-time observability into the cloud landscape. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Tim Callan, Chief Compliance Officer, Sectigo

"Certificate automation platforms can reduce the risk of breach of outage. "

NSA And Dutch NCSC Warn Outdated TLS Certs

Terry Greer-King, VP EMEA , SonicWall

"The only way to successfully mitigate against increasingly sophisticated attackers is to have a layered security posture. "

Federal Agency Warns Cloud Attacks Are On The Rise – How Can Businesses Stay Safe?

Jake Moore, Cybersecurity Specialist, ESET

"Passwords are in desperate need of an overhaul. "

Experts Reaction On New Chrome Update To Boost Password Security

Chris Morales, Head of Security Analytics, Vectra

"While the malware strains might slightly vary, and I’m sure more will be exposed. "

Expert Comment On New Malware Strain Found In SolarWinds Hack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel