10 Feb 2020

Powerful Cyber Attack Takes Down 25% Of Iranian Internet

Iran has allegedly experienced a critical cyberattack that has compromised a large portion of its servers, disrupting internet connection throughout the country. The NetBlocks internet observatory maps the internet freedom in real-time confirmed that there was a widespread interruption of telecommunications on the morning of February 8. The company NetBlocks

Read More
07 Feb 2020

Sentar Awarded $164m Cybersecurity Task Order by US Defense Health Agency

Sentar Inc. is a female operated small business that was recently awarded $164 million USD to provide cybersecurity services to the Defense Health Agency. The company announced yesterday that it will be the recipient o of a task order from the Naval Information Warfare Center to provide the DHA with

Read More
07 Feb 2020

U.S. Finance Sector Hit with Targeted Backdoor Campaign

The United States’s financial sector experienced an increase in cyberattacks last month, the majority of which delivered a powerful backdoor named Minebridge. Minebridge gives cyberattackers advantage over a victim’s machine, allowing them to have full access to all functions. The attack chain employed in the US financial services sector included

Read More
06 Feb 2020

Why the Iranian cyberthreat has become ‘more dynamic’

A top military leader stated that since the US drone strike on Iran that killed Major General Qassem Soleimani in January, the cyber threat coming from Iran has been more dynamic. Gregg Kendrick, executive director of the Marine Corps Forces Cyberspace Command stated that the Iranian regime is likely planning

Read More
06 Feb 2020

Cisco Flaws Put Millions of Workplace Devices at Risk

Researchers at the enterprise security firm Armis have reported a group of new flaws in Cisco enterprise products such as desk phones, web cameras, and network switches. These vulnerabilities could be exploited to compromise corporate networks at a significant level. Cisco currently dominates the network equipment market, therefore, the bugs

Read More
06 Feb 2020

ODNI Plans to Share More About Cyber Threats Under New Counterintelligence Strategy

On Tuesday, the Office of the Director of National Intelligence unveiled plans for a new approach to combatting cyber threats that encourages greater private sector participation. A document related to the strategy will be released on Monday. An overview of the plan was released at an event hosted by the

Read More
06 Feb 2020

IoT Malware Campaign Infects Global Manufacturing Sites

Researchers at TrapX Labs uncovered a malware campaign built to exploit flaws in connected devices has emerged, and it has been targeting manufacturers around the world. The campaign affects products ranging from small technology like smart printers to heavy operational equipment. TrapX Labs initially found the attack targeting Latin American

Read More
05 Feb 2020

Why many security pros lack confidence in their implementation of Zero Trust

Zero Trust has been deemed a necessary security approach to combat cyber threats and is a system in which an organization or country trusts nobody and nothing internally and externally when granting access to data or assets. All types of access must be verified and authorized before gaining access to

Read More
05 Feb 2020

HPE Acquires Identity Management Firm Scytale

Hewlett Packard Enterprise (HPE) announced on Monday that it had acquired an identity management startup named Scytale. Scytale was launched in 2017 and specializes in cloud-native security and zero trust networking. Scytale is the company that created Secure Production Identity Framework for Everyone (SPIFFE), which is a set of open-source

Read More
05 Feb 2020

Why DevOps Is An Attractive Target For Cybercrime Syndicates

DevOps environments have increasingly become targets since they have become vulnerable due to several reasons, including that they are migrating to the cloud. DevOps are challenged by the dynamic and ever-changing components and configurations of public cloud environments. DevOps teams already occupy a high paced field that requires the use

Read More