Okta Eliminates Passwords, Backed by New Okta ThreatInsight

Okta, Inc., the leading independent provider of identity for the enterprise, today announced that organisations can replace passwords with stronger authentication for employees, partners, and customers with the launch of Okta’s new contextual access management features. By combining signals such as device, location, and network context, with threat intel from across Okta’s ecosystem through Okta’s new ThreatInsight functionality, organisations will be able to use Okta’s contextual access management to eliminate…

May 23, 2018
Read More >>

Okta Eliminates Passwords, Backed by New Okta ThreatInsight

Okta, Inc., the leading independent provider of identity for the enterprise, today announced that organisations can replace passwords with stronger authentication for employees, partners, and customers with the launch of Okta’s new contextual access management features. By combining signals such as device, location, and network context, with threat intel from across Okta’s ecosystem through Okta’s new ThreatInsight functionality, organisations will be able to use Okta’s contextual access management to eliminate…

May 23, 2018
Read More >>

CensorNet research: almost half of UK employees put companies at risk through online activities

CensorNet has announced its research into the application and internet habits of 1000 UK adults, through personal data and insights platform CitizenMe. The survey found that 46 percent were guilty of at least one of the following bad practices, that could potentially put company data or the work network at great risk:   22 percent have shared work documents over chat applications such as Whatsapp, Telegram, or Facebook Messenger 18 percent…

May 21, 2018
Read More >>

‘Bring your own device’ linked with cybersecurity risk for six in 10 UK SMEs – a week before GDPR

With a week until GDPR hits, new research from Paymentsense  (https://www.paymentsense.co.uk) reveals a correlation between ‘bring your own device’ (BYOD) schemes and increased cybersecurity risk in small businesses. Six in 10 (61%) SMEs have experienced a cybersecurity incident since introducing a BYOD policy, according to the study from the merchant services provider*.   Increasingly popular, BYOD policies see employees using personal devices like laptops, tablets and smartphones for work, as…

May 18, 2018
Read More >>

Beware the Black Axe Gang: Business Email Compromise Campaigns Observed in 2017

Over the past 12 months, CrowdStrike, the leader in cloud-delivered endpoint protection, has typically observed two different types of Business Email Compromise (BEC) scams: Wire transfer attempts and compromises that have led to follow-on spam campaigns. Regarding fraudulent wire transfers, the criminals typically get caught on the initial attempt, or they get caught on the second attempt, which usually involves a much larger amount than the first attempt.   The…

May 18, 2018
Read More >>

Beware the Black Axe Gang: Business Email Compromise Campaigns Observed in 2017

Over the past 12 months, CrowdStrike, the leader in cloud-delivered endpoint protection, has typically observed two different types of Business Email Compromise (BEC) scams: Wire transfer attempts and compromises that have led to follow-on spam campaigns. Regarding fraudulent wire transfers, the criminals typically get caught on the initial attempt, or they get caught on the second attempt, which usually involves a much larger amount than the first attempt.   The…

May 18, 2018
Read More >>

Airports are ill-equipped to deal with a major cyber attack

PA Consulting Group’s latest research found that airports are ill-equipped to deal with a major cyber attack. The report, ‘Overcome the Silent Threat’, says that the emergence of a hyper-connected model – where passengers in airports want fast internet and digital engagement with airlines and retailers – is increasing the opportunities for cyber criminals to exploit. There are currently around 1,000 cyber attacks each month on airport and aviation systems…

May 17, 2018
Read More >>

Rising Nation Cyber Attacks from Lebanon & the Netherlands

Optiv Security, the world’s leading security solutions integrator, has published its 2018 Cyber Threat Intelligence Estimate (CTIE) which details the current state of the cyber-threat landscape and uses estimative intelligence to predict how that landscape stands to change in the future. This report is generated to provide Optiv’s clients with a global view of security threats and trends, so they can effectively adapt their strategic plans to mitigate anticipated enterprise…

May 17, 2018
Read More >>

RiskIQ implicates Ethereum-stealing phishing ATS in infamous Amazon hijack

RiskIQ, the global leader in digital threat management, today released a report profiling a phishing automated transfer system (ATS) dubbed MEWKit, which targets users of the Ethereum exchange MyEtherWallet and is now proven to be complicit in the infamous April 24, 2018, hijack of Amazon DNS servers. The report, named “MEWKit: Cryptotheft’s Newest Weapon,” reveals how the newly discovered attack presents an entirely new threat to the cryptocurrency landscape, exceeding…

May 17, 2018
Read More >>

Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018

Exploits – software that takes advantage of a bug or vulnerability – for Microsoft Office in-the-wild hit the list of cyber headaches in Q1 2018. Overall, the number of users attacked with malicious Office documents rose more than four times compared with Q1 2017. In just three months, its share of exploits used in attacks grew to almost 50 per cent – double the average share of exploits for Microsoft…

May 17, 2018
Read More >>