<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

Advanced Persistent Threat

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers.

Who watches the watchers? Thoughts about the Uber breach

Data Breaches

Who watches the watchers? Thoughts about the Uber breach

According to Bloomberg, about a year ago hackers stole the personal data of 57 million Uber customers and drivers. After finding out about this breach, Uber leaders not only decided against disclosing it to employees, customers and state and federal regulators but also paid $100,000 to the attackers to keep it a secret.

A few thoughts on the Equifax hack

Data Breaches

A few thoughts on the Equifax hack

While it is not unusual for big companies to get hacked, or for personal details of the general public to leak, this hack is potentially far more dangerous due to the sheer scope of the hack

Windows 10 leak lets attackers study OS for vulnerabilities

Data Breaches

Windows 10 leak lets attackers study OS for vulnerabilities

Last week some of Windows 10 source code pertaining to storage, Wi-Fi and hardware drivers, USB stacks and ARM-specific OneCore kernel code was posted to the site BetaArchive. Initial media reports placed the leak at a jaw-dropping 32TB of data and included unreleased Windows builds.

The CloudFlare data leak is serious but needs to be looked at in context

Data Breaches

The CloudFlare data leak is serious but needs to be looked at in context

The CloudFlare data leak is serious, but let’s take a look at it in context. According to the company, around one in every 3,300,000 HTTP requests potentially lead to memory leakage, or about 0.00003 percent of requests. That’s a fairly small leak.

Information security priorities for Trump's administration

Cybersecurity

Information security priorities for Trump's administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations.

Ohio takes the lead in safeguarding election systems from hackers

Behavioral Analytics

Ohio takes the lead in safeguarding election systems from hackers

Ohio is taking the right approach to information security by using the National Guard’s cyber unit to protect the state’s election system from attacks.

Attackers pick targets based on the payout, not which companies are easy to hack

Data Breaches

Attackers pick targets based on the payout, not which companies are easy to hack

Attackers always keep their eyes on the prize. An operation’s goals drive every facet of a hacking campaign, including its goals. The weaknesses or strength of a company’s security measures don’t factor into how attackers pick their target. Instead, attackers picks targets that best fit the operation’s goals.

The Missing Agenda: The Importance of Cyber Security to US Voters

Ransomware

The Missing Agenda: The Importance of Cyber Security to US Voters

While U.S. voters still care about the next president's policies on the economy, education and health care, they are very interested in how the commander-in-chief will handle cyber attacks. Unfortunately, neither Hillary Clinton or Donald Trump have presented the electorate with a detailed cyber security plan.

Yahoo's potential financial fallout shows the unexpected impacts of a data breach

Data Breaches

Yahoo's potential financial fallout shows the unexpected impacts of a data breach

The business impact of a data breach can materialize in a way that doesn’t immediately come to mind or seem obvious after an incident. For proof, look at potential fiscal fallout surrounding the recent Yahoo breach, which may have knocked $1 billion off the company’s value.