Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cybersecurity
#1
Quote:Half of employees are cutting corners with regards to cybersecurity while working from home – and could be putting their organisation at risk of cyberattacks or data breaches as a result. The coronavirus pandemic has forced both employers and employees to quickly adjust to remote working – and, often without the watchful eyes of IT and information security teams, workers are taking more risks online and with data than they would at the office. 

Analysis by researchers at cybersecurity company Tessian reveals that 52% of employees believe they can get away with riskier behaviour when working from home, such as sharing confidential files via email instead of more trusted mechanisms. SEE: Cybersecurity: Let's get tactical (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic)   According to Tessian's The State of Data Loss Report, some of the top reasons employees aren't completely following the same safe data practices as usual include working from their own device, rather than a company issued one, as well as feeling as if they can take additional risks because they're not being watched by IT and security.
 
Cybersecurity: Half of employees admit they are cutting corners when working from home | ZDNet
Reply

#2
Quote:Immediate action needs to be taken to stop cyberattacks targeting hospitals and healthcare organisations during the ongoing coronavirus pandemic – and governments around the world need to work together to make it happen, says a newly published open letter signed by the International Committee of the Red Cross, former world leaders, cybersecurity executives and others.
 
Cyberattacks against hospitals must stop, says Red Cross | ZDNet
Reply

#3
Quote:Cyber criminals are still attempting to exploit the coronavirus pandemic for their own gain and they're being helped by website templates that allow them to mimic government agencies and companies. Researchers at cybersecurity company Proofpoint have identified over 300 phishing campaigns designed to steal personal information and bank details from victims – and many are using sites that are indistinguishable from the real thing, complete with authentic imagery and user interfaces. The security company warned that these template make it easy for scammers to quickly create high-quality, malicious web domains to insert into their COVID-19 phishing campaigns.
 
Crooks are using realistic-looking webpage templates to trick you into handing over personal data | ZDNet
Reply

#4
Quote:Cyberattacks targeting corporate cloud services have increased significantly in the last few months as cyber criminals look to exploit the rise in remote working to gain access to corporate accounts. The coronavirus pandemic and resulting social-distancing measures have forced organisations and employees to adapt to working from home with the aid of cloud-based collaboration tools.  But the rise in use of these services – which allow users to login and gain access to corporate resources remotely – has also led to a spike in hackers looking to take advantage of their increasing popularity in order to steal login credentials, sensitive information and other data. 

A new report by cybersecurity company McAfee reveals that the number of remote attacks targeting cloud services increased by 630 percent between January and April this year. The figures in the Cloud Adoption & Risk Report are based on data from 30 million McAfee users around the world. While some corporate login credentials could potentially be bought from underground forums, in many cases, these attempts at hacking cloud accounts will be based around brute-force attacks, with cyber criminals attempting common or simple passwords in an effort to gain access. The attacks come in two broad categories; the first is excessive usage from an anomalous location, where the login attempts come from a location that hasn't been previously used and isn't familiar to the organisation. The nature of the cloud means that attackers can make login attempts from anywhere.
 
Cloud security: 'Suspicious superhumans' behind rise in attacks on online services | ZDNet
  • What if that anomalous location is in one of TraceCop's enormous databases and put in their new Shield product that automatically blocks access from that location?
Reply

#5
Quote:Minnesota Gov. Tim Walz (D) said state computers were the target of a cyber attack Saturday, the fourth night of demonstrations after the death of George Floyd. "Before our operation kicked off last night, a very sophisticated denial of service attack on all state computers was executed," Walz said Sunday morning during a news briefing, according to the Minneapolis Star-Tribune. "That's not somebody sitting in their basement.” Walz also doubled down on his claim that much of the unrest was fomented by people from out of state, saying “there are outside folks in there.”
 
Governor: Minnesota hit by cyberattack as efforts to contain protests ramped up | TheHill
Reply

#6
Quote:A newly unclassified internal CIA report found that a massive 2017 data breach of the agency that enabled classified information to be sent to WikiLeaks was caused by the CIA failing to secure its own systems. The report, put together by the CIA’s WikiLeaks Task Force in 2017, is partially redacted and was released publicly on Tuesday by Sen. Ron Wyden (D-Ore.), a member of the Senate Intelligence Committee.  According to the report, a CIA employee was able to steal up to 34 terabytes of information, or around 2.2 billion pages in Microsoft Word, of classified data and leak it to WikiLeaks in the spring of 2017 due to major security lapses at the CIA’s Center for Cyber Intelligence (CCI).
 
Newly unclassified report finds CIA security failures led to massive 2017 breach | TheHill
Reply

#7
Quote:Australia's government and institutions are being targeted by an ongoing sophisticated state-based cyber hack, Prime Minister Scott Morrison says. Mr Morrison said the cyber attacks were widespread, covering "all levels of government" as well as essential service providers and businesses. He declined to identify a specific state actor, adding no major personal data breaches had been made. The activity has been increasing in frequency over many months, he said. He said cyber experts had identified it as a state hack "because of the scale and nature of the targeting and the trade craft used".
 
Australia cyber attack: PM Morrison warns of 'sophisticated' state hack - BBC News
Reply



Forum Jump:


Users browsing this thread: 1 Guest(s)