Articles about Security

Beware the three percent -- tiny proportion of users account for most malware incidents

Insider threat

A new report and infographic released today by Elevate Security shows that a mere three percent of a company's internal users are to blame for 92 percent of malware incidents, while just four percent are responsible for 80 percent of phishing incidents.

The research, carried out for Elevate by the Cyentia Institute, also shows 12 percent of users are responsible for 71 percent of browsing incidents with one percent triggering 200 events every week.

Continue reading

Don't panic! Knowledge, skill and judgment are key to cybersecurity responses

Humans are often the weak link in the cybersecurity chain, but it's human capabilities that are also key to dealing with attacks and their aftermath, according to a new report from Immersive Labs.

The inaugural Cyber Workforce Benchmark report analyzed cyber knowledge, skills and judgment from over half a million exercises and simulations run by more than 2,100 organizations over the last 18 months.

Continue reading

Majority of attacks on SaaS platforms come from Russia and China

Analysis of security events across more than 120,000 user accounts last year shows that the vast majority of attacks on top SaaS platforms such as Microsoft 365, Google Workspace, Slack and Dropbox are coming from Russia and China.

The latest SaaS Application Security Insights (SASI) Report from SaaS Alerts also suggests these countries may be coordinating attack efforts. Attack trend lines that compare Russia and China show almost exactly the same pattern.

Continue reading

Bitdefender launches new password manager for consumers

Password key image

We all know that we should use complex passwords and different ones for each account but managing them is undoubtedly a chore. It's no surprise then that Bitdefender research shows 50 percent of people use a single password for all online accounts and 32 percent reuse just a few passwords across multiple accounts.

To simplify the creation and management of secure passwords for online accounts across multiple platforms, including mobile, Bitdefender is today launching its own Password Manager.

Continue reading

Passwordless technology is key to reducing risk and improving user experience

Login zero trust

Frustrated by poor user experience and weak security, enterprises are moving towards adopting passwordless, continuous authentication, according to a new report.

The research from Enterprise Strategy Group, sponsored by SecureAuth also shows that multi-factor authentication (MFA) fatigue can result in more friction, loss of productivity and higher IT costs.

Continue reading

Supply chain vulnerabilities hit medical and IoT devices

Cardiac monitor

Researchers at Forescout's Vedere Labs have discovered a set of vulnerabilities targeting the PTC Axeda agent which is commonly used in medical and IoT devices.

The Axeda agent enables device manufacturers to remotely access and manage connected devices, making these vulnerabilities reminiscent of the Kaseya hack and the SolarWinds Orion compromise.

Continue reading

Organizations take two months to patch critical vulnerabilities

business security

Organizations are taking nearly two months to remediate critical risk vulnerabilities, with an average mean time to remediate (MTTR) across of 60 days.

A new report from smart vulnerability management firm Edgescan, based on analysis of over 40,000 web application and API assessments, three million network endpoint assessments, and circa 1000 penetration tests, finds high rates of known, patchable vulnerabilities that have working exploits in the wild.

Continue reading

How to keep customers safe with the correct print security strategy

Today’s Wi-Fi printers possess an array of features that make printing easy, which are especially useful in a world where remote working is commonplace and employees use a range of different devices for producing documents. Despite their advantages, there remain some serious security gaps that hackers can easily exploit if an organization doesn’t have a robust print security strategy in place.

While most businesses do well when it comes to protecting core IT infrastructure including computers, servers and applications, they do often fall short when it comes to secondary assets such as multifunction printers (MFPs). With cybercriminals constantly circling and searching for different ways to infiltrate a company’s network, unsecured connected printers can be a key point of weakness leading to a major breach.

Continue reading

Lapsus$ hackers leak Samsung source code and massive data dump from security breach

Two Samsung building logos

Samsung appears to have fallen victim to a serious security breach if the leaks from data extortion group Lapsus$ are anything to go by.

Amounting to a colossal 190GB of data, the group says it has in its possession Samsung source code and other confidential company data. It is just days since the Lapsus$ claimed responsibility for a hack that resulted in data being stolen and leaked from data stolen from GPU chipmaker NVIDIA.

Continue reading

The 'human firewall' and the burden of securing your organization

Whether you regard your colleagues as Layer 8 "issues" in your own OSI stack, or as a human firewall which should be able to recognize and act on inbound threats, like everything else in organizations that execute well, getting your general employee population on-board with your information security goals is ultimately a matter of culture.

And the strongest security cultures are those where each and every employee fully understands that they are on the front lines. They are extended members, and the early warning system, for your core team in the security operations center (SOC).

Continue reading

Surfshark launches free plug-in to help spot fake news

Fake news and disinformation has long been a problem on the internet and no more so than at present as both sides in the Ukraine conflict engage in an information war.

It's timely then for Surfshark to launch a free extension for Chrome and Firefox that detects and highlights website links from various media and other websites that are known to spread fake news and misinformation.

Continue reading

Why we shouldn't try to kick Russia off the internet

The Russian invasion of Ukraine has sparked condemnation around the world and led to the imposition of a range of sanctions from the economic to the sporting and the cultural.

There have been calls to censor media linked to the Russian state too, with the European Union taking the step of banning the distribution of content from outlets like Russia Today.

Continue reading

Why Kubernetes deployment needs a security first mindset [Q&A]

Kubernetes has been at the forefront of container deployment, allowing the automation of development, scaling and management, and supported on a wide range of public cloud platforms.

But as with any cloud deployment there are potential risks from mis-configuration, poorly managed access privileges and more. It's important therefore that when deploying Kubernetes security is given top priority.

Continue reading

How neutral is Kaspersky in the Ukraine cyberwar?

Kaspersky Labs logo

Kaspersky has been trying to distance itself from ties to the Russian state for several years, but the invasion of Ukraine has cast some doubt on its success.

The Cybernews site reports that Kaspersky Lab is protecting the resources of the Russian Ministry of Defense along with other high-profile Russian domains including Russia Today, TASS news agency, and Gazprom bank.

Continue reading

Attivo expands Active Directory protection

Laptop security

In 2021, there was a surge of attacks targeting Active Directory domain controllers in order to gain the privileges that are needed to install backdoors, change security policies, and distribute ransomware or malware.

In recent days there have also been attacks targeting organizations in the Ukraine using the HermeticWiper malware which is implanted via Active Directory to destroy data on the machine.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.