Keith Melancon, deltarisk.com, June 6, 2019
As more details emerge on the Baltimore cyber attack, you might be wondering if you’re doing enough to protect yourself from a cyber security standpoint. If you’re not, what steps do you need to take to get there? Learn the answers in our latest blog.
krebsonsecurity.com, June 3, 2019
Media publications have cited sources saying the version of the ransomware strain Robbinhood that hit Baltimore city computers was powered by “Eternal Blue,” a hacking tool developed by the U.S. National Security Agency (NSA) and leaked online in 2017. But new analysis suggests that while Eternal Blue could have been used to spread the infection, the Robbinhood malware itself contains no traces of it.
databreachtoday.com, May 24, 2019
Moody’s Investors Service changed its financial outlook for Equifax to “negative” from “stable,” reflecting concerns about how the credit reporting giant is recovering from the 2017 data breach that exposed the personal information of 148 million Americans. Moody’s reports that this is the first time that concerns over a cyber security event led it to change a company’s outlook.
scmagazine.com, May 13, 2019
In Equifax’s latest Security and Exchange Commission filing the company estimated it spent about $1.4 billion recovering from its 2017 data breach. The data breach exposed the PII of 148 million customers. This includes a $690 million charge made during the first quarter of 2019 related to outstanding litigation and potential fines related to the 2017 cyber security incident.
nytimes.com, May 4, 2019
The FTC’s five commissioners agreed months ago that they wanted to pursue a historic penalty that would show the agency’s teeth. But the members are split on the size and scope of the tech company’s punishment, according to three anonymous people with knowledge of the talks. One of the most contentious undercurrents is the degree that Facebook CEO Mark Zuckerberg should be held personally liable for any violation of a 2011 agreement.
wired.com, May 3, 2019
A software supply chain attack represents one of the most insidious forms of hacking. By breaking into a developer’s network and hiding malicious code within apps and software updates that users trust, supply chain hijackers can smuggle their malware onto hundreds of thousands—or millions—of computers in a single operation, without the slightest sign of foul play.
cyberscoop.com, May 8, 2019
Seventy-one percent of the data breaches that occurred in the last year were financially motivated, according to Verizon’s annual Data Breach Investigations Report. While there’s been uptick in espionage targeting the manufacturing sector, the overwhelming majority of cybercrime still is carried out by hackers primarily interested in making a buck.
Organizations continue to adopt cloud computing at a rapid pace to benefit from the promise of increased efficiency, better scalability, and improved agility. So, what is and isn’t working for security operations teams when it comes to securing the cloud? Read our latest white paper to learn more.