Orders up 23 percent year-on-year in UK; scamsters target card details and user info as more and more stay online
Western companies targetted by APT41 as it aims to help China shift its economy toward higher value products and services, including IT, Robotics, energy efficiency, electric vehicles, aerospace equipment,
Hackers have compromised WordPress-based websites of corporate sites and news blogs to plant backdoors onto victim’s systems. Compromised websites redirect victims to phishing sites.
More and more firms have started reporting repeated cyber-incidents in the past 12 months according to recent UK government figures.
Apart from cyber-criminals, even Android app developers are attempting to capitalise on the growing number of people who are turning to apps for Covid information, finds Bitdefender
SQL injection was the major network attack tactic of Q4 2019, with an enormous 8000 percent rise when compared to Q4 2018, says WatchGuard research
Have you made it onto the shortlist as a finalist for the SC Awards Europe - the industry’s premier Awards? Check below now.
Data leak confessions increase 27 percent in 2019 from eight percent in 2018; Covid-related remote work to aggravate issue
Cyber-criminals continue to ride on Covid-19 scare, with WHO remaining the prime target
TrickMo malware steals transaction authorisation codes from victims
The limited experience of developing nations in cyber-attacks force them to leverage commodity malware to advance their agendas
UK fintech company informed that its customer and employee data was safe, two days after a ransomware attack was reported
A flaw found last month is used by hackers to compromise and controlZyxel NAS devices under attack from Mukashi Mirai variant
More than five billion records were exposed after an elasticsearch “data breach database” housing a trove of security incidents from the last seven years was left unprotected.
Amazon patches S3 buckets of Doxzoo after vpnMentor researchers find 343 GB trove
Cyber-criminals say they won’t attack healthcare IT systems, but security pros expect ransomware onslaught to continue - with attacks up 36% says Positive report: Avast, Twitter act to aid public.
Cyber-criminals use coronavirus tracking map created by Johns Hopkins University to deliver Android spyware
Researchers discovered cryptomining module that uses new obfuscation techniques
Yesterday Home Secretary Priti Patel publicly confirmed the existence of the joint state threats assessment team (JSTAT) based in MI5's headquarters at Thames House in London.
NCSC experts warned the public to be wary of cyber-criminals using the Coronavirus outbreak to launch online attacks
Social network majors -- from Facebook to YouTube -- issued joint statement on fighting Covid-themed fraud and misinformation on their services
Better data, not more data required. in some cases security monitoring tools are producing more than 50 percent false positives according to new research
Nation-state threat groups have joined cyber-criminals and phishing cartels in using the Covid-19 scare for targeted attacks.
A cyber-attack on the US HHS Department resulted in the circulation of false information about state action to contain the coronavirus outbreak and Czechs declare state of emergency after hospital attack
Hackers launched cyber-attack on a hospital in Czech Republic, stalling dozens of coronavirus test results
The Russian group hijacked the computer network operations infrastructure of Iranian threat actor APT 34
Riding on the wave of the Coronavirus scare, cyber-criminals have added to their repertoire of health-themed campaigns with fake Aids results the latest; financial institutions become largest targets
Security researchers found an updated version of the Wi-Fi spreader used by the Emotet malware being delivered to multiple bots
Bug discovered, that could enable hackers to pretend to be legitimate companies by registering domains using lookalike characters
New campaign uses fake digital certificate updates to infect systems of visitors to websites that have been compromised
"We need more cyber to protect us in cyberspace, more sigint, more electronic warfare and special operations capabilities ...will mean we should work even more strongly with the US" Defence Secretary
A little over a billion attacks were recorded by F Secure honeypots for the whole of 2018; by 2019 the total was 5.7 billion attacks - dominated by attacks hitting the Server Message Block (SMB) protocol.
The Information Commissioner's Office imposed its maimum £500,000 penalty on Cathay Pacific Airways for a 2018 data breach - which could have been many millions if it happened under GDPR
UK Home Office breached GDPR norms at least 100 times in its handling of the EU Settlement Scheme, reported the independent chief inspector of borders and immigration
Hackers are exploiting a Windows 10 ActiveX control to download a malware downloader called Ostap, which has been used by TRickBot for delivery of malicious macros as part of phishing campaign
All the entries are now in for the SC Awards Europe 2020, the judging is underway and the booking website live and ready to book your ticket to attend the Awards event itself.
Facial recognition company's customers, including law enforcement agencies, affected by the data breach
The number of 'blacklisted' malicious apps have declined in 2019, but feral apps continue to work undetected, warns RiskIQ report
MAT recorded a two-digit growth in detected installation packages, while stalkerware incidents grew at least twice from that of 2018, reported Kaspersky
Sporting goods retailer Decathlon put over 123 million records in the open, in a misconfigured ElasticSearch server, found security researchers at vpnMentor
Ethical hackers contracted via HackerOne earned a total of US$40m (£31m) in 2019 - nearly as much as the US$42m (£32.5m) that the company has been paid for bounties since start up in 2012.
Around 60 apps at risk of data slurp by criminals by malware dubbed Racoon which has been discovered to extract data from up to 60 applications.
FCA accidently published names, addresses and phone numbers in a document in response to a request for data under the Freedom of Information Act
“Clients want someone as trustworthy as approved staff, acting diligently, not causing an outage or leak. But they want to simulate a real attacker, who acts with impunity & runs wild. It's difficult to reconcile.” Laurie Love
Phishing campaign in the guise of Google Docs forms asks for updating of Office 365 accounts to create fake Microsoft login pages to harvest corporate user credentials.
Default password could let anyone gain access to Cisco Smart Software Manager On-Prem
Business support service provider ISS suspended services after malware attack on 17 February
First significant example of Russia's GRU using cyber-attacks to disrupt or destroy since late 2017 according to UK report on cyber-attacks against Georgia.
Study identified 438 industrial control system (ICS) vulnerabilities in 2019; More than 25 percent of advisories had no patch available at the time of disclosure
Unsigned firmware in computer accessories used by major manufacturers could allow hackers to plant malware stealthily
Is Zero Trust really achievable given the complexity in finance service organisations?
Brought to you in partnership with Forescout