Researchers fight ransomware attacks by leveraging properties of flash-based storage
A new research paper by two University of Illinois students and their assistant professor proposes a new approach to tackling ransomware attacks that takes advantage of “properties of flash-based storage that currently exist in most laptops, desktops, mobiles, and even IoT devices.” The innovative approach relies on the way flash-based
Security overconfidence and immaturity continue to endanger organizations
New research by Centrify and Techvangelism paints a bleak picture of the state of Privileged Access Management (PAM) in organizations. While nearly 74% of breaches involve privileged access abuse, almost eight in ten (79%) firms do not have a mature PAM strategy to protect privileged accounts. Despite this, a whopping
Majority of CISOs plan to ask for an increase in cybersecurity investment
New research by the Financial Services Information Sharing and Analysis Center (FS-ISAC) shows that in the face of growing cyber threats, almost 3 in 4 (73%) CISOs in the finance sector will request their CFO to expand the cybersecurity budget in the coming year. Currently, the majority of organizations (56%)
IoT cyberattacks are the new normal, the security mindset isn’t
New research by Irdeto sheds light on the growing threat to the machines and gadgets that make up the Internet of things (IoT). It shows that in the past 12 months, around eight out of ten firms suffered a cyberattack targeting IoT devices, costing the firms an average of $330,000
Siemens Medical Products Affected by Wormable Windows Flaw
A Siemens investigation found that the recently discovered critical Windows security flaw known as BlueKeep impacts various medical devices produced by Siemens Healthineers, a Siemens division. The vulnerability, tracked as CVE-2019-0708, impacts RDP implementations on Windows XP, Windows 7, Windows Server 2003, Windows Server 2008 and other older Windows operating
High-risk behaviors expose most travelers to cyber risks
A new IBM report exposes a disturbing discrepancy between the cyber threat perceptions of travelers and the actual risks resulting from their behavior while on the road. While just 40% of respondents think it likely that cybercriminals may target them when they are traveling, 70% of people are not doing
Most security pros have considered quitting due to a lack of resources
Almost three in four (72%) security professionals have thought about quitting their jobs over a lack of resources at their organization. Almost eight out of ten (79%) companies suffer from skills and or technology shortages. The survey also shows that infosec pros actually list security staff shortages (50%) and security
How to block hijacking attacks on your Google account
Securing your Google account against the vast majority of account hijacking attempts is as simple as adding a recovery phone number, new research by Google, New York University, and the University of California, San Diego shows. The researchers discovered that the mere addition of a recovery phone number sufficed to
Fifth of Docker Containers Have No Root Passwords
New research by Kenna Security found that Docker containers are often not protected with root passwords. Containers are standardized software units that allow software to be run in isolation, so that performance is not influenced by the underlying infrastructure. A security researcher found that 194 (19.4%) of the 1000 most
Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter
The first quarter of this year broke the record for reported security vulnerabilities, a new report by Risk Based Security shows. A total of 5,501 new flaws were disclosed during this period, most of which were web-based (56.8%). Two additional findings from the report are especially worrisome. The first is