Articles about Security

Lapsus$ hackers leak Samsung source code and massive data dump from security breach

Two Samsung building logos

Samsung appears to have fallen victim to a serious security breach if the leaks from data extortion group Lapsus$ are anything to go by.

Amounting to a colossal 190GB of data, the group says it has in its possession Samsung source code and other confidential company data. It is just days since the Lapsus$ claimed responsibility for a hack that resulted in data being stolen and leaked from data stolen from GPU chipmaker NVIDIA.

Continue reading

The 'human firewall' and the burden of securing your organization

Firewall

Whether you regard your colleagues as Layer 8 "issues" in your own OSI stack, or as a human firewall which should be able to recognize and act on inbound threats, like everything else in organizations that execute well, getting your general employee population on-board with your information security goals is ultimately a matter of culture.

And the strongest security cultures are those where each and every employee fully understands that they are on the front lines. They are extended members, and the early warning system, for your core team in the security operations center (SOC).

Continue reading

Surfshark launches free plug-in to help spot fake news

Surfshark fake news

Fake news and disinformation has long been a problem on the internet and no more so than at present as both sides in the Ukraine conflict engage in an information war.

It's timely then for Surfshark to launch a free extension for Chrome and Firefox that detects and highlights website links from various media and other websites that are known to spread fake news and misinformation.

Continue reading

Why we shouldn't try to kick Russia off the internet

Russia - Flag on Button

The Russian invasion of Ukraine has sparked condemnation around the world and led to the imposition of a range of sanctions from the economic to the sporting and the cultural.

There have been calls to censor media linked to the Russian state too, with the European Union taking the step of banning the distribution of content from outlets like Russia Today.

Continue reading

Why Kubernetes deployment needs a security first mindset [Q&A]

Kubernetes

Kubernetes has been at the forefront of container deployment, allowing the automation of development, scaling and management, and supported on a wide range of public cloud platforms.

But as with any cloud deployment there are potential risks from mis-configuration, poorly managed access privileges and more. It's important therefore that when deploying Kubernetes security is given top priority.

Continue reading

How neutral is Kaspersky in the Ukraine cyberwar?

Kaspersky Labs logo

Kaspersky has been trying to distance itself from ties to the Russian state for several years, but the invasion of Ukraine has cast some doubt on its success.

The Cybernews site reports that Kaspersky Lab is protecting the resources of the Russian Ministry of Defense along with other high-profile Russian domains including Russia Today, TASS news agency, and Gazprom bank.

Continue reading

Attivo expands Active Directory protection

Laptop security

In 2021, there was a surge of attacks targeting Active Directory domain controllers in order to gain the privileges that are needed to install backdoors, change security policies, and distribute ransomware or malware.

In recent days there have also been attacks targeting organizations in the Ukraine using the HermeticWiper malware which is implanted via Active Directory to destroy data on the machine.

Continue reading

Malware is being geared to evade AI-based defenses

Attack route

The latest Cyber Threat Landscape Report out this week from Deep Instinct reveals that bad actors are clearly investing in anti-AI and adversarial attack techniques and integrating these methods into their larger evasion strategy.

It also highlights a change in the way attacks are carried out and says we are now witnessing some groups opting to inflict maximum impact over a shorter time span. These short duration attacks are carried out with the goal of damaging data (its confidentiality and availability), destabilizing a business, and impairing business continuity.

Continue reading

Ransomware is top threat to financial services

ransomware key

The financial, operational, and reputational risks of ransomware make it the top threat facing financial services organizations, a new report from F-Secure says.

The three most common routes used to spread ransomware are phishing, exposed remote desktop protocol (RDP) ports, and the exploitation of vulnerable software.

Continue reading

OT and ICS vulnerabilities increase in the second half of 2021

Industrial internet of things

Operational technology and industrial control systems saw a 110 percent increase in the number of vulnerabilities disclosed in the second half of last year.

The latest Biannual ICS Risk & Vulnerability Report from Claroty shows that remotely exploitable vulnerabilities are still causing problems, demonstrating the importance of securing remote connections.

Continue reading

API attacks increase almost 700 percent in the last year

api

Malicious API traffic has increased 681 percent in the last year, set against a 321 percent increase in overall API traffic.

A new report from API security specialist Salt Security shows 95 percent of surveyed organizations have experienced an API security incident in the past 12 months.

Continue reading

Less than a quarter of directors see ransomware as a top priority

Ransomware

Only 23 percent of board of directors consider ransomware to be their top priority. Yet 59 percent of organizations have fallen victim to ransomware.

A new study from email security company Egress, independently conducted by Arlington Research, polled 500 IT leaders across the US and UK. It finds 52 percent of organizations allocate less than a quarter of their security budget to anti-phishing measures, yet 84 percent were hit by phishing and 42 percent had credentials stolen.

Continue reading

The password hygiene message still isn't getting across to consumers

Written passwords

According to a new report from SpyCloud, 70 percent of breached passwords are still in use and 64 percent of consumers repeat passwords across multiple accounts.

Researchers identified 1.7 billion exposed credentials, a 15 percent increase from 2020, and 13.8 billion recaptured personal identifiable information (PII) records obtained from breaches in 2021.

Continue reading

Why organizations need to increase their focus on zero-day threats

Zero Day

Zero-day exploits are some of the most critical cybersecurity threats facing businesses today, but also one of the most difficult to address. Cybercriminals that exploit zero-day vulnerabilities take advantage of flaws within an organization's software and security systems before the victim itself discovers it. This can lead to potentially devastating consequences when bad actors are successful in  accessing critical data and networks undetected.

It is also much harder to defend against these attacks when the victim is fighting in the dark - how can an organization fix a vulnerability when they don’t know it is there? For this reason, there are thousands of organizations across the world operating with unknown gaps in their cybersecurity defenses that are vulnerable to zero-day threats

Continue reading

F-Secure launches free online tool to generate secure passwords

Forgotten password

With almost depressing regularity we see lists of commonly used and easily cracked passwords. The problem is that although we all know we should use strong passwords creating them is hard.

If you're struggling to come up with strong passwords don't worry, cybersecurity company F-Secure is riding to your rescue with the launch of a new, free online Strong Password Generator tool.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.