September 27, 2017
Help Net Security Staff, helpnetsecurity.com, September 26, 2017
Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. The quarterly report, which measured more than 8,300 attacks, demonstrated that hackers continued to rely on volumetric attacks to overwhelm system resources.
Noah Powers, deltarisk.com, September 21, 2017
While insider threat attacks continue to make waves in the news, the origins of insider threats go back decades and even centuries. Insiders have emerged in religious texts, insiders have brought down empires, and insiders have stolen money and information from various organizations.
Constance Douris, forbes.com, September 21, 2017
The National Institute of Standards and Technology released a report in February identifying products available to enhance the electric grid’s cybersecurity. New technologies employed onto the grid are multiplying the number of access points for cyber threats.
Matthew Wall, bbc.com, September 22, 2017
It was an ordinary day at a busy hospital – doctors, nurses and surgeons rushed about attending to the health of their patients. For Hussein Syed, chief information security officer for the largest health provider in New Jersey, it was the health of his IT network that was keeping him busy.
Aatif Sulleyman, independent.co.uk, September 19, 2017
More than two million people used an extremely popular software cleaning tool that had been infected with malware. CCleaner was compromised “in a sophisticated manner” in August, and the problem was only spotted and fixed in mid-September.
Help Net Security Staff, helpnetsecurity.com, September 22, 2017
An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s phishing attacks are highly targeted, sophisticated, hard to detect, and difficult for users to avoid.
Steven Melendez, fastcompany.com, September 20, 2017
It’s some of the most common security advice on the internet: Never use the same password between different accounts. That’s because despite all the attention paid to hackers exploiting so-called “zero-day” exploits, or previously undiscovered security holes, plenty of prominent digital attacks still rely on stolen passwords.
Maria Korlov, csoonline.com, September 21, 2017
“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point .”
Jessica Davis, healthcareitnews.com, September 26, 2017
The state of healthcare cybersecurity is bad enough without a host of inaccurate information floating around the industry. Hackers honed in on healthcare’s technology weaknesses in 2016, pummeling the industry with massive spear phishing campaigns and ransomware attacks.