Articles about Security

Cloud security is complex -- but most vulnerabilities fall into three key categories

Secure cloud

With most enterprises leveraging at least one type of cloud deployment today, the question arises: is the cloud more or less secure than on-premise solutions?

The reality is that for on prem or even private cloud environments, the approach to security largely relies on a barrier defense. When organizations are compromised within this barrier, it can basically become open season for malicious actors, which we’ve seen in marquee incidents such as the Target data breach, the Home Depot hack in 2014, or the recent Uber breach, which exploited an unpatched security vulnerability.

Continue reading

CNAPP -- what is it and why should you care about it? [Q&A]

Cloud data security

The IT world is littered with acronyms and one of the latest is CNAPP, standing for Cloud Native Application Protection Platform. If you haven't heard about it already you almost certainly will do soon.

We spoke to Stanimir Markov, CEO at Runecast, about CNAPP, what it is and how it can benefit modern enterprises and their cloud environments.

Continue reading

Attackers aren't as clever as you think when it comes to finding passwords

Hacker typing username and password

Although we've been told for years that their days are numbered, passwords are still a major part of our security defenses.

New research from Rapid7 looks at two of the most popular protocols used for remote administration, SSH and RDP, to get a sense of how attackers are taking advantage of weaker password management to gain access to systems.

Continue reading

Ransomware attacks are down in the third quarter

ransomware laptop

The period from July to September this year has seen 27 ransomware variants used to conduct 455 attacks according to cybercrime intelligence company Intel 471's Spot Reports and Breach Alerts.

This represents a decrease of 38 attacks from the second quarter of 2022 and 134 from the first quarter of 2022.

Continue reading

If your name is Michael Smith and you're from Houston you could be a fake

New research from identity verification company Socure looks at patterns surrounding how fraudsters construct synthetic identities to identify factors that may assist in identifying and thwarting this kind of crime.

The study shows that criminals employing synthetic identities do their best to blend them with the overall population. So in the majority of cases, synthetic identities fell into the most common demographics and consumer traits.

Continue reading

Microsoft is annoyed with security firm that discovered misconfigured server exposing sensitive customer data

Microsoft logo

Microsoft has admitted that the sensitive data of thousands of customers was exposed last month because of a "misconfigured Microsoft endpoint". The data includes names, email addresses, the content of emails and attachments related to business between a customer and Microsoft or an authorized Microsoft partner.

Security researchers from SOCRadar notified Microsoft about the server misconfiguration back on September 24. The data exposure is part of a series of leaks from public data buckets which the security firm has dubbed BlueBleed. It is described as "one of the largest B2B leaks in recent years" and affects thousands of individuals and companies across over 100 countries. Microsoft has addressed the misconfiguration, but the company is not happy with SOCRadar.

Continue reading

Federal cybersecurity leaders are struggling to protect information

Capitol building

A new survey of 150 federal cybersecurity leaders finds that 73 percent of respondents feel a lack of foundational data protection efforts puts their agency at risk.

In addition the research, from data protection provider Zettaset, shows 77 percent say that siloed systems that lack visibility make it difficult to properly protect critical assets. It's not surprising then that 57 percent report experiencing multiple data breaches over the past two years.

Continue reading

New open source tool helps security analysts gather data following incidents

Incident investigations in today's environments such as the cloud, containers and serverless environments can be a challenge. In particular collecting volatile data quickly following an incident to help security teams identify root causes and respond faster.

Cado Security is launching a new new volatile artifact collector tool that allows security analysts to collect a snapshot of volatile data, adding critical context to incident investigations.

Continue reading

Geopolitical tensions make security precautions critical for UK business

London Skyline

Geopolitical tensions are on the rise around the world and global economic structures continue to evolve as a result. Political disruption and unrest can have a far-reaching impact on the rest of the globe. This impact can be seen most clearly in the ripple effects that the current ongoing Ukraine-Russia war has had on the rest of the world in terms of economic volatility, food insecurity, and dramatic price increases.

Businesses are, of course, hyper-focused on ensuring their resilience to geopolitical risk, fragmentation, and uncertainty, which according to McKinsey’s latest Economic Conditions Outlook is at the top of the agenda for CEOs. But, if businesses want to safeguard their resilience during this disruptive time, organizations will need to prioritize their security.

Continue reading

Enterprises expect passwordless access to be the leading approach within five years

web authentication

A new survey of over 300 IT professionals with responsibility for workforce identities and their security in large organizations shows that 87 percent expect passwordless solutions will become the leading approach to secure workforce identities within five years.

The study by Dimensional Research for Secret Double Octopus looks at perceptions and adoption of newer FIDO2-certified enterprise passwordless solutions, and the impact of single sign-on portal and endpoint biometric-based 'passwordless-like' experiences.

Continue reading

How to select a cyber fraud prevention solution

Fraud stop

As large-scale incidents like the Colonial Pipeline ransomware attack and CAM4 data breach have been increasing, security professionals need to integrate tools that fight fraud into their cyber protection plans. Anti-fraud systems have been protecting cyber environments from account hijacking, identity theft, and fraudulent transactions for many years. However, few people know that there are different types of products with specific characteristics. 

As its name suggests, a fraud prevention system is meant to detect and prevent fraudulent activities. Financial institutions were the first to use these systems at the beginning of the 2010s, following large-scale attacks that targeted e-banking systems. Later, other sectors, including e-commerce, client loyalty systems, gaming services, contextual ad platforms, and insurance, implemented anti-fraud solutions too. Fraud prevention systems are pivotal whenever online transactions and trade take place.

Continue reading

New ransomware groups emerge but overall activity slows

Ransomware

Research from GuidePoint Security shows eight new ransomware groups have emerged in the last quarter and that there has been at least one new ransomware group each month since January 2021.

The report, from the GuidePoint Research and Intelligence Team (GRIT), tracked 27 ransomware groups and 568 publicly posted victims in the third quarter of this year and shows a slight slowdown overall of ransomware activity from the previous quarter.

Continue reading

Microsoft launches new security update notification RSS feed

Microsoft logo on glass building

RSS feeds may not be as popular as they used to be, but for some things they are one of the most efficient and useful means of keeping updated.

Microsoft is aware of this and, having listened to feedback from customers, has launched a new RSS feed to make it easier to keep updated about the latest security notifications from the company. Specifically, there is now an RSS feed for the Security Update Guide (SUG).

Continue reading

Older generations are less likely to click phishing emails

Digital natives aged between 18-39 are the most vulnerable age group for phishing scams, according to new data from security awareness training company SoSafe.

It finds that 18-39 year-olds have an average click rate of 29 percent on phishing emails, which drops to 19 percent among older age groups.

Continue reading

The forensic analysis of a ransomware attack [Q&A]

A ransomware attack can be devastating for businesses. But while in the aftermath of an attack the focus will be on recovery, it's also important to look at how the attack happened and what information can be gleaned to help prevent future incidents.

We spoke to Joseph Carson, chief security scientist at privileged access management specialist Delinea, to talk through the analysis of a typical attack and what lessons can be learned.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.