According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety of novel tactics, demonstrating particular creativity and perseverance in defense-evasion and credential-access TTPs such as the use of Windows Internal tool, Active Directory Explorer, for one-time credential dumping. Notable percentages…

Reading, UK — 11 September, 2018 ––92% of UK companies surveyed have been breached in the last 12 months and almost half (44%) have been breached between three and five times, according to a new cybercrime report from Carbon Black (NASDAQ: CBLK), a leader in next-generation endpoint security. According to the report, cyberattack frequency has risen, with…

The rapid convergence of enterprise IT and operational technology networks in manufacturing organizations has definitely caught the eyes of cyberattackers. According to a new report out today, manufacturing companies have started experiencing elevated rates of cyber reconnaissance and lateral movement from attackers taking advantage of the growing connectivity within the industry. Developed by threat hunting…

Waltham, MA – June 6, 2018 – CounterTack, the leading provider of Predictive Endpoint Security for the enterprises, today announced the acquisition of GoSecure, Inc., a cybersecurity Managed Detection and Response Provider. CounterTack has established itself as the only true behavior-based predictive endpoint solution with in-memory analysis, multi-tenancy, and scalability that can manage hundreds of thousands…

The U.S. House of Representatives on Monday passed a bill aimed at protecting industrial control systems (ICS), particularly ones used in critical infrastructure, against cyberattacks. The legislation, H.R. 5733, formally known as the “DHS Industrial Control Systems Capabilities Enhancement Act,” was introduced on May 9 by Rep. Don Bacon (R-NE) and it was approved by…

Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), according to Vectra. Vectra disclosed that cyberattackers build hidden tunnels to break into networks and steal information. These tunnels are used to remotely control an attack, known as command-and-control, and steal data, known as…

The largest ever distributed denial-of-service (DDoS) attack occurred in the spring of 2018. The attack lasted more than eight minutes and measured 1.3 Tbps, according to Threatpost. But it’s a record no one in the security industry expects to last long, as DDoS attacks continue to increase in length, strength and damage. This type of…

Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire transfers to the attacker. We predict cumulative losses…