31 May 2019

Researchers fight ransomware attacks by leveraging properties of flash-based storage

A new research paper by two University of Illinois students and their assistant professor proposes a new approach to tackling ransomware attacks that takes advantage of “properties of flash-based storage that currently exist in most laptops, desktops, mobiles, and even IoT devices.” The innovative approach relies on the way flash-based

Read More
30 May 2019

Security overconfidence and immaturity continue to endanger organizations

New research by Centrify and Techvangelism paints a bleak picture of the state of Privileged Access Management (PAM) in organizations. While nearly 74% of breaches involve privileged access abuse, almost eight in ten (79%) firms do not have a mature PAM strategy to protect privileged accounts. Despite this, a whopping

Read More
30 May 2019

Majority of CISOs plan to ask for an increase in cybersecurity investment

New research by the Financial Services Information Sharing and Analysis Center (FS-ISAC) shows that in the face of growing cyber threats, almost 3 in 4 (73%) CISOs in the finance sector will request their CFO to expand the cybersecurity budget in the coming year. Currently, the majority of organizations (56%)

Read More
29 May 2019

IoT cyberattacks are the new normal, the security mindset isn’t

New research by Irdeto sheds light on the growing threat to the machines and gadgets that make up the Internet of things (IoT). It shows that in the past 12 months, around eight out of ten firms suffered a cyberattack targeting IoT devices, costing the firms an average of $330,000

Read More
28 May 2019

Siemens Medical Products Affected by Wormable Windows Flaw

A Siemens investigation found that the recently discovered critical Windows security flaw known as BlueKeep impacts various medical devices produced by Siemens Healthineers, a Siemens division. The vulnerability, tracked as CVE-2019-0708, impacts RDP implementations on Windows XP, Windows 7, Windows Server 2003, Windows Server 2008 and other older Windows operating

Read More
24 May 2019

High-risk behaviors expose most travelers to cyber risks

A new IBM report exposes a disturbing discrepancy between the cyber threat perceptions of travelers and the actual risks resulting from their behavior while on the road. While just 40% of respondents think it likely that cybercriminals may target them when they are traveling, 70% of people are not doing

Read More
24 May 2019

Most security pros have considered quitting due to a lack of resources

Almost three in four (72%) security professionals have thought about quitting their jobs over a lack of resources at their organization. Almost eight out of ten (79%) companies suffer from skills and or technology shortages. The survey also shows that infosec pros actually list security staff shortages (50%) and security

Read More
21 May 2019

How to block hijacking attacks on your Google account

Securing your Google account against the vast majority of account hijacking attempts is as simple as adding a recovery phone number, new research by Google, New York University, and the University of California, San Diego shows. The researchers discovered that the mere addition of a recovery phone number sufficed to

Read More
21 May 2019

Fifth of Docker Containers Have No Root Passwords

New research by Kenna Security found that Docker containers are often not protected with root passwords. Containers are standardized software units that allow software to be run in isolation, so that performance is not influenced by the underlying infrastructure. A security researcher found that 194 (19.4%) of the 1000 most

Read More
20 May 2019

Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter

The first quarter of this year broke the record for reported security vulnerabilities, a new report by Risk Based Security shows. A total of 5,501 new flaws were disclosed during this period, most of which were web-based (56.8%). Two additional findings from the report are especially worrisome. The first is

Read More