Phishing attacks up, especially against SaaS and webmail services

Phishing attacks continued to rise into the summer of 2019 with cybercrime gangs’ focus on branded webmail and SaaS providers remaining very keen, according to the APWG report. The report also documents how criminals are increasingly perpetrating business email compromise (BEC) attacks by using gift card cash-out schemes. The number of phishing attacks observed in…

Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend Micro. Trend Micro Research analyzed forums in the Russian, Portuguese, English, Arabic, and Spanish language-based underground markets to determine how cybercriminals are abusing and monetizing connected devices. The results reveal…

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, nearly the same number of respondents (82%) don’t believe their elected officials understand cyber risks well enough to develop and enact effective security regulation, a Venafi survey reveals. 384 IT security…

A white paper produced by Rysavy Research and 5G Americas technical experts explores the intensifying role of wireless communications, the evolution of its technology, emerging services and use cases, and a timeline of future developments through 2030. “The transition to 5G has been happening simultaneously with continued advances in 4G LTE,” stated Peter Rysavy, President…

Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

Risk Based Security uncovered multiple vulnerabilities in the AK-EM 800 product from SCADA vendor Danfoss. The discovered vulnerabilities Researchers found two critical vulnerabilities. One is effectively a backdoor into highly privileged functionality to manage the software. Although this backdoor was likely created to help the vendor’s support team log into systems to assist their clients,…

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside entities. In fact, many business processes depend on this connectivity, even when doing so broadens the threat landscape and puts the organization at greater risk. This interconnectedness means that vendor vulnerabilities…

Cybersecurity performance is critical to achieving commercial success, according to a BitSight study. Among the study’s most interesting findings is that nearly two in five (38 percent) of enterprises admit that they have lost business due to either a real or perceived lack of security performance within their organization. Based on a survey of 207…

As the number of connected medical devices continues to rise, so does healthcare organizations’ attack surface. “Most medical devices available in the healthcare system today were not built with security in mind and it will take years until they are replaced (if they are at all) with next-generation devices,” says Leon Lerman, CEO and co-founder…