Forewarned is Forearmed: Boost Your Cyber Defenses with Threat Hunting

Forewarned is Forearmed: Boost Your Cyber Defenses with Threat Hunting

by Angel Icusca, from Business Insights , on 27.03.2020

Intrusion detection, incident response, and digital forensics - these are all essential stages of managing a cyberattack. While different in nature, they all share one thing: they come after an attack has breached your systems. read more

Legal Sector Has a Big Problem with Intentional Data Breaches

Legal Sector Has a Big Problem with Intentional Data Breaches

by Silviu Stahie, from Business Insights , on 27.03.2020

The legal sector is a prime target for cybercriminals, and the vast majority of IT leaders in the industry consider insider threats a significant concern. 77% think employees are directly responsible for exposing valuable data by mistake. read more

4 Million Passwords Tied to Fortune 1000 Companies Are Available on the Dark Web, Research Shows

4 Million Passwords Tied to Fortune 1000 Companies Are Available on the Dark Web, Research Shows

by Filip Truta, from Business Insights , on 26.03.2020

A snapshot of the breach exposure of major enterprises has revealed 23 million pairs of credentials containing Fortune 1000 corporate email addresses and plaintext passwords. read more

Android Apps and Malware Capitalize on Coronavirus

Android Apps and Malware Capitalize on Coronavirus

by Liviu ARSENE, from Bitdefender Labs , on 26.03.2020

As new developments regarding the coronavirus outbreak emerge, Android developers (malware developers included) have started capitalizing the topic. Bitdefender researchers have recently analyzed Android telemetry from Google Play – and other third-party marketplaces – regarding coronavirus-themed legitimate apps and malware in Europe, and found huge spikes in application scans containing “covid” or “corona” in the […] read more

Your children’s social media apps are more important than ever. How do you keep them safe?

Your children’s social media apps are more important than ever. How do you keep them safe?

by Cristina POPOV, from IoT Security Insights , on 27.03.2020

The coronavirus outbreak is forcing many of us to stay home. So families are spending more time online, children included. Not only for work, learning, conferences, entertainment or printing coloring pages, but also to keep in touch with others. We all crave social interactions, and we miss face-to-face meetings with friends, brothers, sisters, grandparents. Social ... The post Your children’s social media apps are more important than ever. How do you keep them safe? appeared first on Bitdefender. read more

Mobile App in UK Uses Crowdsourcing to Track Coronavirus Infection Rates

Mobile App in UK Uses Crowdsourcing to Track Coronavirus Infection Rates

by Silviu STAHIE, from IoT Security Insights , on 26.03.2020

An application called the COVID Symptom Tracker is being used to gather data from the public on the rate of infection in the general population, highlighting a use for the Internet of Things that wasn’t anticipated until now. The Internet of Things (IoT) covers pretty much everything connected to the Internet, and that includes smartphones. ... The post Mobile App in UK Uses Crowdsourcing to Track Coronavirus Infection Rates appeared first on Bitdefender. read more

OpenWrt Vulnerability Could Be Used to Trick Users into Installing Fake Packages

OpenWrt Vulnerability Could Be Used to Trick Users into Installing Fake Packages

by Silviu STAHIE, from IoT Security Insights , on 25.03.2020

A critical remote code execution vulnerability was found in OpenWrt, a Linux-based operating system designed for embedded devices, such as routers. Embedded devices used to route traffic are essential pieces of hardware that require greater scrutiny than most other devices in the Internet of Things ecosystem. When such devices are compromised, cybercriminals can access internal ... The post OpenWrt Vulnerability Could Be Used to Trick Users into Installing Fake Packages appeared first on Bitdefender. read more

Are You Ready for Managed Detection and Response?

Are You Ready for Managed Detection and Response?

by Michael Rosen, from Business Insights , on 25.03.2020

Security’s challenge is matching awareness of external threats to internal goals and the ability to execute Managed Detection and Response addresses key customer gaps in visibility, alerts, skills, and outcomes Outsourcing security operations to a managed SOC allows internal teams to focus on higher-value projects read more

New Router DNS Hijacking Attacks Abuse Bitbucket to Host Infostealer

New Router DNS Hijacking Attacks Abuse Bitbucket to Host Infostealer

by Liviu ARSENE, from Bitdefender Labs , on 25.03.2020

Bitdefender researchers have recently found a new attack that targets home routers and changes their DNS settings to redirect victims to a malware-serving website that delivers the Oski infostealer as a final payload. What’s interesting about the attack is that it stores malicious payloads using Bitbucket, the popular web-based version control repository hosting service. To […] read more

Next >>