08 Feb 2019

Australia parliament hit by cyber-hack attempt

An unknown threat actor launched a cyberattack on the computer network of the Australian parliament on Thursday, prompting a precautionary reset of all user passwords. According to lawmakers, no proof had been found to indicate that the hacker accessed or stole sensitive information, which could include internal communications between members of

Read More
08 Feb 2019

Business Email Compromise Attacks See Almost 500% Increase

A new report by Proofpoint indicates that business email compromise (BEC) scams surged 476% between between Q4 2017 and Q4 2018. Moreover, that same period saw a 226% increase of email fraud attempts targeting businesses.. Other key findings of the research where a dramatic increase (442%) of phishing attacks involving fake social

Read More
07 Feb 2019

Which Countries Have the Worst and Best Cybersecurity?

A new study by Comparitech ranking the cybersecurity performance of 60 countries, shows that there is no clear top performer and that there is ample room for improvement everywhere. The study looked at a wide variety of categories, including mobile and computer malware infections, cyberattack preparedness and cybersecurity legislation. In

Read More
06 Feb 2019

Why your business needs to work with the government to fight cyber warfare

A new report by the Foundation for Defense of Democracies (FDD) and the Chertoff Group highlights the importance of private and public sector cooperation in the fight against cyberattacks. As part of the research, business executives and former top-level government officials participated in a tabletop exercise. In the scenario, heightened geopolitical tensions

Read More
05 Feb 2019

ExileRat Targeting Tibetan Supporters via Malicious PowerPoint Docs

Researchers with the Cisco Talos Group have discovered a malspam campaign targeting the mailing list of the Central Tibetan Administration (CTA), which is also referred to as the Tibetan Government in Exile. In the first stage of the attack, threat actors sent an email to everyone on the mailing list, while making

Read More
01 Feb 2019

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate

According to a new report by Agari on email fraud, one out of every five advanced email attacks is an account takeover-based (ATO) attack. In these attacks, threat actors take control of a legitimate account, which they can then use to carry out other cybercrimes. ATO’s are hard to detect since

Read More
31 Jan 2019

Massive DDoS Attack Generates 500 Million Packets per Second

Cybersecurity firm Imperva says it has stopped a record-breaking DDoS attack against one if its clients on January 10. At the peak of the attack, the target received over 500 million packets per second, which is a higher packet volume than has been previously recorded. Imperva categorized the attack as

Read More
30 Jan 2019

Cyberattacks: China and Russia can disrupt US power networks warns intelligence report

According to this year’s edition of the The Worldwide Threat Assessment of the US Intelligence Community, the major cyberthreats for the US and its allies come from China and Russia. The report states that “China presents a persistent cyber espionage threat and a growing attack threat to our core military and

Read More
30 Jan 2019

Theoretical Ransomware Attack Could Lead to Global Damages Says Report

A new report by Cambridge University, Nanyang Technological University, Lloyd’s, Aon, MSIG, and SCOR TransRe, describes the effects of a hypothetical global ransomware attack of unprecedented scale. According to the speculative cyber risk scenario, over 600,000 organizations around the globe would be impacted by a ransomware strain in less than 24 hours. The attack

Read More
29 Jan 2019

Japan law will allow government to hack civilian IoT devices

In an effort to address the growing problem of insecure internet of things (IoT) devices, the Japanese government has approved an amendment to a law that authorizes government employees to assess the scope of the issue by hacking civilian IoT devices. The program is intended to minimize the possibility of threat

Read More