Threat intelligence adoption grows but skills lag behind
A new study from Vulcan Cyber shows 75 percent of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets.
However, 73 percent of respondents say a lack of skills is their biggest threat intelligence challenge and is keeping organizations from making the most of their investments in threat intelligence resources.
Email is the top vector for cyberattacks
Hot on the heels of a report showing that 40 percent of business emails have unwelcome content, comes another report revealing that email is now the top way of delivering cyberattacks.
The report from Tessian shows that 94 percent of organizations experienced a spear phishing or impersonation attack, and 92 percent suffered ransomware attacks over email this year.
Four out of 10 work emails are unwanted
Analysis of over 25 billion emails from Hornetsecurity reveals that 40.5 percent of work emails are unwanted.
We're tempted to say, "only four out of 10?" but it all depends how you define unwanted. The report looks specifically at the use of email to deliver malicious payloads -- so those emails from your boss that you'd rather not receive don't count!
Only a quarter of businesses have confidence ex-employees can no longer access infrastructure
Only 24 percent of respondents to a new survey are fully confident that ex-employees no longer have access to their company's infrastructure, while almost half of organizations are less than 50 percent confident that former employees no longer have access.
The study from Teleport also finds infrastructure is becoming more complex, with organizations using on average 5.7 different tools to manage access policy, making it complicated and time-consuming to completely shut off access.
12 percent of employees take IP with them when leaving a job
New research into hundreds of insider threat investigations released by DTEX shows that 12 percent of employees take sensitive intellectual property with them when they leave an organization.
The DTEX i3 (Insider Intelligence and Investigations) team has produced an infographic of the results of the research.
New platform aims to tackle API security problems
API security is a major challenge for IT teams, traditional solutions are often fragmented, leading to the need for multiple products and added complexity and cost.
Israeli cybersecurity startup Wib is launching a holistic API security platform to bring complete visibility and control across the entire API ecosystem from code right through to production.
How does security posture management guard cloud environments?
Cloud technology has been gaining momentum in the last couple of years.
It threw a lifeline to companies by making remote work at the start of the crisis possible, enabled scaling for a reduced cost, and made information that much more accessible. However, all of these benefits also come with security risks for organizations that haven’t adequately protected their new infrastructure.
Vendor fraud techniques used to bypass Office 365 security
Financial fraud email attacks are increasing year-on-year at 73 percent, with 44 percent of these representing sophisticated, targeted attacks such as wire, invoice, or vendor fraud, according to a new report from Armorblox.
The research has uncovered two vendor fraud attacks targeting approximately 4,000 inboxes each. In these the attackers used 'Look-alike Domain' attack techniques to bypass Microsoft Office 365 email security and impersonate trusted vendors with emails that looked like legitimate requests for payments.
Automated threats responsible for 62 percent of eCommerce security incidents
Automated threats, ranging from account takeover, credit card fraud, web scraping, API abuses, Grinch bots, and DDoS attacks, are a persistent challenge for the eCommerce industry, according to a new report.
Cybersecurity company Imperva has conducted a 12-month analysis of threats targeting the retail industry. A continued barrage of attacks on retailers’ websites, applications, and APIs throughout the year and during peak holiday shopping times is a continued business risk for the retail industry.
ID fraud levels still high despite post-pandemic drop
A Freedom of Information request by identity verification company ID-Pal reveals that complaints to the Financial Ombudsman Service in the UK regarding identity fraud soared over the COVID-19 pandemic, finishing 2020 at 44 percent higher than 2019.
Even as the pandemic came to an end numbers in 2021 were still over 18 percent higher than pre-pandemic levels in 2019. Figures so far this year suggest that if identity fraud continues at the same pace, 2022 will see a 10 percent increase in complaints compared to 2021.
HP uses virtual machine technology to secure sensitive data
Privileged data and credentials are prime targets for attackers. Protecting this information is a challenge, particularly as systems have moved to the cloud and networks have become more diverse.
Larger organizations have often turned to things like privileged access workstations, but that means that access can only be made from a limited number of machines. HP Wolf Security has launched a new Sure Access Enterprise (SAE) product to protect users with rights to access sensitive data, systems, and applications but allow them to use a normal endpoint.
How digital IDs are set to shake up the way we access services [Q&A]
Around the world governments are increasingly keen on introducing digital identity systems for their citizens. These are seen as a secure way for people to access government and other services as these move online.
We spoke with Philipp Pointner, chief of digital identity at Jumio, to find out more about digital ID and its implications for security and privacy.
Dropbox confirms serious security breach in which hackers stole code from 130 GitHub repositories
Dropbox has revealed details of a phishing attack to which it fell victim. In the attack, a threat actor was able to steal code from the company after gathering employee credentials to GitHub repositories.
The security breach took place in the middle of last month, with GitHub notifying Dropbox of suspicious account activity on October 14. The cloud storage company says that the code that was accessed "contained some credentials -- primarily, API keys -- used by Dropbox developers" but insists that "no one's content, passwords, or payment information was accessed", and that its core apps and infrastructure were unaffected.
Alternative authentication methods take hold in response to digital dangers
As global problems spill over into the digital realm and hybrid working has taken hold, businesses are increasingly looking beyond the password in order to secure accounts.
The latest Trusted Access Report from Cisco company Duo shows a 50 percent increase in the percentage of accounts allowing WebAuthn passwordless authentication and a fivefold increase in WebAuthn usage since April 2019.
Nudge, nudge, block no more...
Why do people try to circumvent security controls -- for example to access an unapproved SaaS application or cloud service?
New research from Nudge Security suggests it may simply be down to poor user experience of the security process. "We now have evidence to suggest that improving the employee experience of security can actually lead to better security outcomes," says Russell Spitler, CEO and co-founder of Nudge Security.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.