The campaigns are relatively low volume and targeted to specific organizations, with some of the mails even being localized.
Poor User Practice at the Root of Most Medical Device Security Risks
Use of unauthorized applications (22%) and browsers (18%) are the leading security risks.
Non-Profit Aims to Bring More Military Vets into Cyber Roles
TechVets could help reduce chronic skills shortages
Crypto-Mining Attacks Jump 50% to Net Hackers Millions in 2017
Kaspersky Lab claims attackers are using increasingly sophisticated tactics
NIS America Suffers Card Breach, Offers Store Credit
The attack resulted in the theft of payment-card details and address information.
Malware Authors Turn to DNS Protocol as a Covert Channel
DNS command and control (C&C) and DNS exfiltration can be successful because DNS is an integral part of the internet’s infrastructure.
It Could Happen to Anyone: FS-ISAC Falls for a Phish
The financial industry’s forum for collaboration on critical security threats was compromised with an unsophisticated phish.
#GartnerIAM: Common Privilege Pitfalls Are Easily Overcome
There has never been a greater need for PAM
#GartnerIAM: IAM Disrupted by New Trends
IAM is being disrupted by new trends, but they need not be a problem for the business