Cyber-Threats

The threat of privileged user access - monitoring and controlling privilege users

The threat of privileged user access - monitoring and controlling privilege users

Marcell Gogan discusses the threat of privileged user access and how it often goes largely ignored

How to protect your business from DDoS attacks

How to protect your business from DDoS attacks

Annette Murphy explores how security professionals can prepare and protect their assets from Distributed Denial of Service (DDoS) attacks

Half of UK orgs feel they lack skills to mitigate cyber-threats

By

Nearly half of UK organisations (47 percent) feel they have insufficient skills in-house to deal with the current cyber-threat landscape.

Linux-run IoT devices under attack by NyaDrop

By

Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.

Brazil hotbed of financial fraud, report

By

Brazil has emerged as a primary centre of financially motivated e-crime threat activity.

IP Expo: Is the software supply chain putting us at risk?

IP Expo: Is the software supply chain putting us at risk?

By

Josh Corman, founder of I Am the Cavalry, spoke at IP EXPO Europe 2016 and pointed the finger at the software supply chain to tackle cyber-threats, arguing that we need fewer and better suppliers.

Getting smart - a joined up approach to beating the hackers

Getting smart - a joined up approach to beating the hackers

As data breaches become commonplace and organisations struggle to keep pace, Treavor Dearing explains why integration and collaboration among IT security vendors is emerging as the only viable solution to beat cyber-criminals once and for all.

Cross border computer probes gets nod in Switzerland

By

The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.

89% of mobile users wouldn't know if their device was cyber-attacked

By

A majority of mobile users (89 percent) wouldn't know if their device has been infected through a cyber-attack, revealing a massive lack of awareness of cyber-threats.

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

By

An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.

WordPress update fixes XSS issues

By

Bloggers using the WordPress platform are "strongly encouraged" to update their sites immediately to address persistent XSS issues.

IoT home routers used to launch application-level DDoS attack

By

Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.

Attacks increase as a result of DDoS-for-hire services

Attacks increase as a result of DDoS-for-hire services

By

DDoS attacks have increased in frequency, scale and complexity over the past year, driven by DDoS-for-hire services.

Senators push for Oversight hearing into Trump's Russia comments

Senators push for Oversight hearing into Trump's Russia comments

By

US Senators asked Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."

Russian web hub Deer.io offering stolen goods and exploit services, report

By

A robust underground marketplace for the sale of stolen products from compromised accounts as well as shady online services has been detected in Russia.

How to protect against compromised credentials — without affecting employee productivity

How to protect against compromised credentials — without affecting employee productivity

François Amigorena explains why compromised credentials are a major cyber-threat to organisations and how cumbersome security wastes time, whereas contextual awareness allows greater security automatically.

Spike in cyber-attacks expected to exploit upcoming Olympics, report

By

An Israel-based security firm has issued a warning to fans of the upcoming Olympics to be wary of phony offers.

Phishing scam targets Brexit anxiety

By

A cyber-scam has been unfolding in the wake of the Brexit vote.

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

By

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.

Conficker tops ranking of most common malware family

By

Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.

Sophisticated 'password attacks' continue, Citrix latest victim

Sophisticated 'password attacks' continue, Citrix latest victim

By

Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.

Ransomware hits 10K Australians

By

At least 10,000 Australians have been targeted in a ransomware campaign that lures recipients with an email purportedly from local energy company AGL.

Eastern Ukraine separatists seemingly targeted in Operation Groundbait APT

Eastern Ukraine separatists seemingly targeted in Operation Groundbait APT

By

Researchers have discovered a malware-based APT dating back to 2008 that at least appears to target political enemies of Ukraine, including pro-Russia separatists in the disputed eastern region of the country.

Seoul blames North Korea for cyber-attack on defence contractor

By

North Korea denies claims by South Korea that it was behind a cyber-attack on a navy defence contractor.

Alleged securities fraudsters to be extradited from Israel

By

Two Israeli men accused of securities fraud and hacks into media outlets and nine financial institutions, including JPMorgan Chase, Fidelity Investments and E*Trade Financial Corp., will be extradited to the US.

British manufacturers urged to step up their cyber-security plans

By

To face the growing number of cyber-threats as part of their efforts to get ready for the 4th industrial revolution, British manufacturers are being urged to step up their cyber-security planning.

Android/Clicker.G malware found in Google Play apps

By

Researchers found a series of malicious apps containing Android/Clicker.G on the Google Play store. The campaign targets mobile devices in Russia, but they affect apps that are available globally.

Training the Mastermind (board-game) generation

Training the Mastermind (board-game) generation

Mike Loginov and Viv MacDonald explore the importance of management awareness of cyber-security in an organisation

Mobile devices still vulnerable to attack - report

By

Mobile attacks can workaround two-factor authentication on Android phones and inject malware onto iOS phones.

Roughly a quarter of UK cyber-attacks originate from ransomware

By

Ransomware accounts for around a quarter of cyber-threats targeting internet users in the UK.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US