August 9, 2017
Pymnts Staff, pymnts.com, August 4, 2017
The distributed denial-of-service (DDoS) attack has made a massive resurgence in Q2, particularly Ransom DDoS, or RDoS. In an RDoS attack, cybercriminals threaten to launch a DDoS attack on a victim’s critically important online resources if they don’t pay up. The threat is often accompanied by a smaller-scale DDoS attack to demonstrate that the criminal means business.
Constantine Pavlis, deltarisk.com, August 4, 2017
Delta Risk’s Stephanie Ewing-Ottmers, Senior Associate, and Constantine Pavlis, Cyber Intrusion Analyst, made return appearances to Black Hat and DEF CON last week. In their own words, here’s what they experienced at the 2017 conferences.
Mark Hagland, healthcare-informatics.com, July 31, 2017
An excellent “Perspective” op-ed article published online earlier this month in The New England Journal of Medicine is bringing forward for industry leaders to consider a very important and alarming new possibility around data breaches involving PHI (protected health information).
Medium Staff, medium.com, August 4, 2017
Of all of the connections brought about by the Internet of Things, nothing is more frightening than the notion of an unsecured medical device. The magnitude of risk associated with medical devices and the Internet of Things is a gripping proposition with 67% of medical device makers expecting an attack on their devices while only 17% taking measures to prevent an attack, according to Ponemon.
Help Net Security Staff, helpnetsecurity.com, August 2, 2017
According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies faced. Furthermore, nearly half (49 percent) said they were in the process of developing a formal incident response plan with provisions to address insider threat.
Richard Tomkins, upi.com, August 4, 2017
Baltimore Cyber Range LLC and Elbit subsidiary Cyberbit Ltd., have opened a cyber-security training and simulation center in Maryland. The center is powered by the Cyberbit Range Platform and provides simulation training in protecting national assets and infrastructure.
Mirko Zorz, helpnetsecurity.com, August 2, 2017
Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services companies. Among its customers are big corporations such as Volkswagen, Daimler, Phillips, Airbus, and BP.
Michael Mimoso, threatpost.com, August 2, 2017
Black Hat 2017 was a vocabulary lesson for white-hats, and yes, words matter. Words such as nihilism, empathy and inclusion have to matter, because what you’re doing now matters so much.
Pymnts Staff, pymnts.com, August 3, 2017
Fraudsters are good at what they do. Payments got faster, but so did criminals. Banks built more defenses, and bad guys jumped over them with glee. But Uri Rivner, BioCatch co-founder, head of cyber strategy and vice president, said in a recent webinar with PYMNTS’ Karen Webster that things are getting better.