16 Jan 2019

U.S. Spies to Americans: China and Russia Are Coming to Get You – Featuring insights from OODA’s Bob Gourley

Kimberly Dozier of the The Daily Beast has spoken to various U.S. counterintelligence specialists about the very real threat that foreign hackers pose to U.S. organizations. Bob Gourley of OODA was among the experts she consulted. In the article, Bob Gourley explains that for over 20 years, the U.S. government

Read More
16 Jan 2019

BEC Scammers Go After Employee Paychecks

Cybersecurity experts have noticed an uptick in business email compromise (BEC) scams in which threat actors go after monthly employee paychecks. The scam starts with a threat actor impersonating an employee of a targeted company in an email to the firm’s department that is in charge of payroll. The crook will

Read More
16 Jan 2019

Judge: Law Enforcement Can’t Force Suspects to Unlock iPhones with FaceID

According to a new ruling by a U.S. federal judge, law enforcement officials are not authorized to compel suspects to unlock personal devices protected by biometric authentication, such as fingerprint scanners, facial recognition and vein authentication. The judge of the U.S. District Court for Northern California ruled that the Fourth and Fifth Amendments

Read More
16 Jan 2019

Data breaches, cyberattacks are top global risks alongside natural disasters and climate change

The World Economic Forum (WEF) has released its Global Risks Report for 2019. According to the organization, the number one risk for this year is extreme weather. The second biggest risk has to do with shortcomings in global efforts to address climate-change, while natural disasters clinched the third spot. Cybersecurity

Read More
16 Jan 2019

Researchers Link Chilean Interbank Attack to North Korea

Flashpoint research indicates that a December 2018 cyberattack targeting Redbanc, a Chilean interbank network, may have been the work of the advanced persistent threat group Lazarus, which has been linked to the North Korean government. Researchers based their assumption on the fact that the attackers used PowerRatankba, a malware toolkit that has

Read More
16 Jan 2019

Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials

Research by Check Point has uncovered serious vulnerabilities in the user login process of Fortnite, the immensely popular online battle royale game. The flaws, which have recently been patched, could enable attackers to manipulate the login process by means of a phishing link, in order to steal users’ login credentials

Read More
15 Jan 2019

Don’t Ignore These 10 Global Business Risks In 2019

In order for companies to thrive in 2019, business leaders need to prepare for a great number of cyberthreats and other risks. According to Chloe Demrovsky, CEO of Disaster Recovery Institutce International (DRI), the most important risks include the potential start of a new worldwide financial crisis; steep fines companies may need

Read More
15 Jan 2019

Cryptocurrency mining malware is the number one malware menace – again

The latest edition of Check Point’s Most Wanted Malware list indicates that cryptojackers – malware that covertly mines cryptocurrency on infected devices – remain the most prevalent type of malware. The four highest entries are all cryptojackers, with Coinhive clinching the top spot once again. A notable newcomer on the

Read More
15 Jan 2019

Criminals wielding Ryuk ransomware specialize in targeting enterprises

Research by CrowdStrike and FireEye sheds light on the success and modus operandi of Grim Spider, the threat group behind Ryuk ransomware. Over the last six months, Grim Spider has only gone after enterprises, a strategy that seems to be paying off, since the threat actors have already earned about $3,7 million

Read More
15 Jan 2019

Arm yourselves for healthcare’s cybersecurity war

US healthcare organizations (HCOs) are highly popular targets for cyberattacks for two reasons. First of all, HCOs are easy to breach, since a majority of them lack a proper cybersecurity program based on the NIST Cybersecurity Framework, and many organizations use poorly secured medical internet of things (IoT) devices. Secondly, threat actors

Read More