Tag: threat

LastPass reveals details of August hack that gave threat actor access to its development environment for four days

Last month, LastPass suffered a cyberattack and the company shared some details about what had happened shortly afterwards. Now, having conducted further investigations, more information has been revealed including the fact that the attacker had access to the LastPass development…

Continue Reading LastPass reveals details of August hack that gave threat actor access to its development environment for four days

Understanding threat detection methods [Q&A]

Detecting threats today isn’t just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well….

Continue Reading Understanding threat detection methods [Q&A]

Tackling cybercrime and the threat of ‘script kiddies’ [Q&A]

Major cyberattacks still have the power to make headline news, yet reporting and indeed conviction rates for cybercrime remain low. It’s perhaps not surprising then that rising numbers of young people are getting involved in these illegal activities. We spoke…

Continue Reading Tackling cybercrime and the threat of ‘script kiddies’ [Q&A]

Industrial systems under threat from wipers and IoT botnets

The latest OT/IoT security report from Nozomi Networks shows that wiper malware and IoT botnets dominate threats to industrial control systems. Researchers have observed the robust usage of wiper malware, and seen the emergence of an Industroyer variant, dubbed Industroyer2,…

Continue Reading Industrial systems under threat from wipers and IoT botnets

Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools

Microsoft has launched two new security products, bolstering the capabilities of Microsoft Defender. The company says that the aim of the two tools is to help organizations lock down their infrastructure and reduce their overall attack surface. The tools, Microsoft…

Continue Reading Microsoft beefs up Defender security with new Threat Intelligence and External Attack Surface Management tools

60 percent of security pros say their strategy doesn’t keep up with the threat landscape

A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep…

Continue Reading 60 percent of security pros say their strategy doesn’t keep up with the threat landscape

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves. Is the best way to stay on top…

Continue Reading Do we need a cyber NATO to address the changing threat landscape? [Q&A]

DevSecOps and the importance of threat modeling [Q&A]

In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach. DevSecOps (development, security and operations) is all about automating…

Continue Reading DevSecOps and the importance of threat modeling [Q&A]

Threat of firmware attacks is a growing concern for business

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks. The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware…

Continue Reading Threat of firmware attacks is a growing concern for business

Why we need to take the threat of cyberwarfare seriously [Q&A]

The age of what might be called the hobbyist hacker is long gone, replaced by a much more serious trend towards organized crime and nation states being behind hacking and cyberattacks. In an era where data can be weaponized, both…

Continue Reading Why we need to take the threat of cyberwarfare seriously [Q&A]