German Chancellor Angela Merkel on Tuesday indicated that her country is not likely to exclude Huawei telecommunications technology from it’s 5G networks, saying that she doesn’t believe in discussing “these very sensitive security questions publicly” nor in “excluding a company simply because it’s from a certain country.” Experts interpreted the
A new report by TrustArc indicates that with less than 10 months left before California’s sweeping new data protection law, the California Consumer Privacy Act (CCPA) goes into effect, only 14% of organizations are already compliant with the new legislation, while 16% of firms haven’t even started preparing for compliance
Financial Trojans are among the biggest global cyber threats, and the risks for organizations and users only appear to be increasing, for new IBM research shows that the cybercrime groups behind various prominent financial Trojans are increasingly collaborating with each other in order to launch more successful malware campaigns. Last
Researchers with Palo Alto Network’s Unit 42 have discovered a campaign targeting wireless presentation and display systems used by enterprises. The campaign was launched in January and involves a new variant of Mirai, an internet of things (IoT) botnet that up until now was known to target consumer IoT devices.
The latest worrisome example of the vulnerability of critical infrastructure to cyberattacks comes from Texas, where an unknown threat actor last week managed to hack into a total of 30 tornado emergency sirens in two towns, and subsequently set off the alarms in the middle of the night. As a
The European Union has adopted a new response protocol for large cross-border cyberattacks. The protocol should facilitate the exchange of information between law enforcement agencies at the national, regional and international level, while also making it easier to coordinate assessment and response efforts in response to a major cross-border attack.
New research by Positive Technologies shows that distributed denial-of-service (DDoS) attack are getting increasingly powerful. Last year, two DDoS attacks broke all previous records, peaking at 1.35 and 1.7 terabits per second, respectively. In the last quarter of 2018, DDoS attacks mostly hit government agencies and IT firms. The researchers
Norwegian aluminum giant Norsk Hydro has suffered a severe cyberattack forcing the company to switch to manual production, while some production plants in Europe and the US had to shut down altogether. A statement by the company said that “IT systems in most business areas are impacted and Hydro is
In a disturbing example of the utter lack of morals displayed by many threat actors, opportunistic cybercriminals are trying to take advantage of the recent mass shootings in two mosques in Christchurch, New Zealand in order to steal money or for other nefarious purposes. Some cyber crooks have launched online
Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.