INFOSECURITY NEWSLETTER

August 9, 2017

In a Ransom DDoS Attack, It Doesn’t Pay to Pay

Pymnts Staff, pymnts.com, August 4, 2017

The distributed denial-of-service (DDoS) attack has made a massive resurgence in Q2, particularly Ransom DDoS, or RDoS. In an RDoS attack, cybercriminals threaten to launch a DDoS attack on a victim’s critically important online resources if they don’t pay up. The threat is often accompanied by a smaller-scale DDoS attack to demonstrate that the criminal means business.

Read More

DEF CON 25 and Black Hat 2017 Roundup: What We Learned in Vegas

Constantine Pavlis, deltarisk.com, August 4, 2017

Delta Risk’s Stephanie Ewing-Ottmers, Senior Associate, and Constantine Pavlis, Cyber Intrusion Analyst, made return appearances to Black Hat and DEF CON last week. In their own words, here’s what they experienced at the 2017 conferences.

Read More

Could Cybercriminals Be on the Verge of Executing a New, Terrible Type of Attack on Healthcare?

Mark Hagland, healthcare-informatics.com, July 31, 2017

An excellent “Perspective” op-ed article published online earlier this month in The New England Journal of Medicine is bringing forward for industry leaders to consider a very important and alarming new possibility around data breaches involving PHI (protected health information).

Read More

Hackers and Hospitals: An Infographic on Medical Device Security

Medium Staff, medium.com, August 4, 2017

Of all of the connections brought about by the Internet of Things, nothing is more frightening than the notion of an unsecured medical device. The magnitude of risk associated with medical devices and the Internet of Things is a gripping proposition with 67% of medical device makers expecting an attack on their devices while only 17% taking measures to prevent an attack, according to Ponemon.

Read More

Most Damaging Threat Vectors for Companies? Malicious Insiders

Help Net Security Staff, helpnetsecurity.com, August 2, 2017

According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies faced. Furthermore, nearly half (49 percent) said they were in the process of developing a formal incident response plan with provisions to address insider threat.

Read More

Cyber-Security Training Center Opens in Maryland

Richard Tomkins, upi.com, August 4, 2017

Baltimore Cyber Range LLC and Elbit subsidiary Cyberbit Ltd., have opened a cyber-security training and simulation center in Maryland. The center is powered by the Cyberbit Range Platform and provides simulation training in protecting national assets and infrastructure.

Read More

How Enterprise IT Security Conversations Have Changed

Mirko Zorz, helpnetsecurity.com, August 2, 2017

Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services companies. Among its customers are big corporations such as Volkswagen, Daimler, Phillips, Airbus, and BP.

Read More

Will the Real Security Community Please Stand Up

Michael Mimoso, threatpost.com, August 2, 2017

Black Hat 2017 was a vocabulary lesson for white-hats, and yes, words matter. Words such as nihilism, empathy and inclusion have to matter, because what you’re doing now matters so much.

Read More

Slowing Down Faster Payments Fraud

Pymnts Staff, pymnts.com, August 3, 2017

Fraudsters are good at what they do. Payments got faster, but so did criminals. Banks built more defenses, and bad guys jumped over them with glee. But Uri Rivner, BioCatch co-founder, head of cyber strategy and vice president, said in a recent webinar with PYMNTS’ Karen Webster that things are getting better.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points