Insurers increasingly concerned about silent cyber exposure
Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically …
Global DDoS mitigation market trends and developments
Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat …
Week in review: Equifax breach, Instagram hack, Android Toast Overlay attack
Here’s an overview of some of last week’s most interesting news and articles: Patch your Android device to foil Toast Overlay attacks Overlay attacks are nothing …
Patch your Android device to foil Toast Overlay attacks
Overlay attacks are nothing new for Android users, and Palo Alto Networks Unit 42 researchers have found yet another way for attackers to perpetrate them. An “overlay attack” …
Syringe infusion pumps can be fiddled with by remote attackers
A syringe infusion pump used in acute care settings sports eight vulnerabilities, some of which could be exploited by remote attackers to impact the intended operation of the …
Samsung offers up to $200,000 for bugs in its devices, services
South Korean giant Samsung Electronics is now offering bounties for reported bugs in its mobile devices, software and services. “The rewards program kicked off with a …
Equifax breach: Sensitive info, SSNs of 44% of U.S. consumers accessed by attackers
Equifax, one of the three largest American credit agencies, has announced that it has suffered a “cybersecurity incident” affecting some 143 million U.S. …
New infosec products of the week: September 8, 2017
Vectra introduces attack campaign detection and prediction Vectra is advancing automated threat hunting with the introduction of Attack Campaigns. The Vectra Cognito platform …
13% of SMBs have experienced an IoT-based attack
One in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market …
Insider threats and ransomware are most feared, followed by DDoS attacks
A new SANS survey found that ransomware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive …
Key elements of a secure, sensitive information sharing strategy
It’s been said, data is like the new oil. What does this mean exactly? Like oil, data is a commodity. But unlike oil, the value of data isn’t susceptible to supply and demand. …
Dragonfly hackers gained operational access to European, US power companies
The Dragonfly hacking group is back – or should we say it probably never went away – and is still interested in penetrating the networks of European and US …