Phishers targeting LinkedIn users via hijacked accounts

A new phishing campaign has been spotted hitting LinkedIn users via direct messages and the LinkedIn InMail feature. They are sent from legitimate LinkedIn Premium accounts that have been hijacked by the phishers, thus increasing the likelihood that recipients will trust the message and click on the link. The messages/emails say that the sender has…

BH Consulting launches scholarship programme to address infosec skills gap

BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under the programme, a successful applicant will start a fulltime traineeship role as an information security analyst, while studying for a fully paid two-year MSc in Applied Cyber Security at the Institute of…

How Large Businesses Approach Cybersecurity Today

Over 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats. Clutch surveyed over 300 corporate IT decision-makers about what to include in a cybersecurity policy and found security software, data back-up and storage and scam detection are the most common areas…

How hackers have improved their BEC attack methods

Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion people worldwide will be using email portals by 2019. Each business user will send 126 messages daily by that time, compared to 122 emails sent and…

Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code

The continuous advancement and sophistication of cyberthreats has gradually decreased the sufficiency of traditional gateway and endpoint security solutions for protection against malware. These approaches were sufficient when malware occurred in small numbers and it was easy to differentiate between good and bad applications. Nowadays, there’s a world of unknown code — a gap between…

Companies face legion of security operations challenges

After a week away from all things cybersecurity, I’m back at work and focusing on security analytics and operations again. Alarmingly, most organizations readily admit to problems in this area. For example, a recent ESG research survey of 412 cybersecurity and IT professionals identified some of the biggest security analytics and operations challenges. Some of…

Antivirus: From Stand-Alone Product to Endpoint Feature

Endpoint experts discuss the evolution of AV and its shift from stand-alone product to a feature in broader security tools. The endpoint security evolution is underway. Antivirus (AV) isn’t dead, but its nature is changing as enterprise threats become faster, more widespread, and more complex. “Antivirus has become, to me, more of a specific feature…