Business booms on the dark web as cybercriminals cash in


Activity on dark web marketplaces that trade access to compromised networks has increased dramatically in the last year with sales up 50 percent, according to a new report by the threat research team at Lumu Technologies.
Criminal gangs are diversifying their monetization vehicles to extract maximum value from their efforts. Where in the past they would have been selling credit card and bank details, now access to mail servers, networks and more is on offer. Access to remote desktop protocols is particularly attractive.
The NSA and CISA publish advice for selecting and hardening remote access VPN solutions


The National Security Agency (NSA) and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) have joined forces to publish guidelines design to help people make informed choices when selecting a VPN.
In the joint NSA-CISA information sheet, the organizations provide help and advice in a range of areas including not only choosing a reliable, trustworthy VPN, but also how to configure a VPN for maximum security and a reduced attack surface.
Hackers can use Apple Pay to make large contactless Visa payments with locked iPhones


Researchers from the Computer Science departments of Birmingham and Surrey Universities have discovered a way for hackers to make large, unauthorized payments from locked iPhones by exploiting the functionality of Apple Pay.
The academic researchers found that the attack works on Visa cards in Express Transit mode in an iPhone's wallet. They were able to make a contactless payment of £1,000 (around $1,350) without unlocking the iPhone being used. Despite having been reported to Apple a year ago, the issue remains unfixed.
Over 90 percent of malware arrives over encrypted connections


Security experts have spent years driving home the message that HTTPS connections are safer, but a new report released today reveals that 91.5 percent of malware arrived over encrypted connections in the second quarter of this year.
The quarterly internet security report from WatchGuard Technologies also shows alarming surges across fileless malware threats, dramatic growth in ransomware and a big increase in network attacks.
The changing face of fraud and how artificial intelligence is helping to counter it [Q&A]


Financial crime is on the increase and attackers must be stopped in their tracks. Financial service organizations new and old need to ensure they have the right technology in place to predict, detect and deter fraud, whilst ensuring minimal disruption to the customer journey.
We spoke to Martin Rehak, CEO of Resistant AI to find out how sophisticated artificial intelligence can detect known criminal practices and more importantly, predict the unknown emerging patterns of financial crime.
High-profile attacks have sharpened organizations' focus on software security


High-profile ransomware and software supply chain disruptions are driving increased attention on software security, according to the latest Building Security In Maturity Model (BSIMM) report from Synopsys.
The BSIMM12 data indicates a 61 percent increase in software security groups' identification and management of open source over the past two years, almost certainly due to the popularity of open source components in modern software and the rise of attacks using open source projects as vectors.
New solution helps mid-sized businesses guard against cyberthreats


It isn't just big companies that suffer from cyberattacks. Increasingly smaller companies have become attractive targets as they have fewer resources to defend themselves.
Managed detection and response specialist deepwatch is today launching a new solution for medium sized businesses to significantly strengthen their protection against cyber threats.
Major companies lag in adopting domain security


A majority of companies in the Forbes Global 2000 have been slow to adopt domain security measures that could help prevent them from ransomware attacks.
A new report from CSC finds 57 percent of the Global 2000 are relying on off-the-shelf consumer-grade domain registrars who offer limited security mechanisms to protect against domain and DNS hijacking.
Automated analysis can help stop security teams wasting 10,000 hours a year


It's well known that security teams are suffering from alert overload and new research from Invicti Security shows that false positives and the need for manual verification are serious problems.
Analysis of six years' worth of real-world vulnerability data shows enterprise security teams are spending nearly 10,000 hours a year checking unreliable vulnerability reports, and this could cost as much as half a million dollars annually.
Upgrading to Windows 11? Here are the compatible antivirus products you need


Microsoft is set to begin rolling out Windows 11 next week. For the most part, any programs you run on Windows 10 should run just fine on the new OS, although there will be exceptions.
Antivirus and security solutions are not all certified yet and installing security software that hasn't been fully tested with the new operating system could prove disastrous. Don't worry though, as antivirus testing service AV-Comparatives has done the hard work for you and today releases a list of "approved" security software. Is yours on the list?
IT leaders want trusted advice on SASE


New research from IT decision making platform AVANT shows that 85 percent of IT decision makers are familiar with and know about SASE solutions, but only 35 percent are using SASE currently.
However, there is a desire for more expertise, with 76 percent of IT decision-makers wishing to consult a trusted advisor to inform them on SASE decision making.
Add an extra layer of security to your entire household for under $30 with our Malwarebytes offer!


Just how bulletproof is your security package? Sadly, even the most reputable names are occasionally caught flat-footed by a new threat. If you’re serious about protecting your computer, you’ll leap at the chance to add a secondary layer of protection that works in tandem with your main package to catch threats that are missed (or ignored).
The good news is that Malwarebytes 4.0 stands ready and waiting to answer the call for reinforcements. And we’ve got a mouth-watering deal that will enable you to protect up to five devices -- Windows, Mac and Android -- in your household for the next two years -- all for under $30!
The impact of DDoS attacks on the enterprise [Q&A]


With the UK and US being amongst the top four most targeted nations for network DDoS attacks during the first half of 2021, this is clearly a problem that hasn't gone away amid all the pandemic-related news.
We spoke to David Elmaleh, senior product manager, Edge Services at Imperva. to discuss the impact DDoS attacks can have and why it's essential for organizations to monitor for anomalies relating to unexplained traffic spikes.
Security testing: Essential or simply supplemental?


A 2019 study on the effectiveness of enterprise security strategies found that 53 percent of enterprises are clueless if their security tools are working. This means that they do not undertake security testing. If they have anything that has the guise of security validation, it is likely inconclusive or conducted in an unsystematic manner.
However, a more recent study found that around 70 percent of organizations perform penetration tests as a way of preventing cyber breaches. Many already acknowledge the importance of testing their security controls. This finding coincides with a report that says that the global security testing market is huge and rapidly accelerating.
3.8 billion combined Clubhouse and Facebook records for sale on the dark web


Data combined from the July 24 Clubhouse breach and Facebook user profiles has been used to compile a database of 3.8 billion entries and it could be yours for $100,000 -- though the seller is willing to split it up if you're strapped for cash.
The CyberNews research team uncovered a hacker forum posting from September 4 offering the data for sale. The poster claims the records include names, phone numbers, Clubhouse ranks, and Facebook profile links.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.