Vietnam Rises as Cyberthreat

Vietnam Rises as Cyberthreat

The country’s rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity. Vietnam has rarely been associated with cybercrime…

View More Vietnam Rises as Cyberthreat
What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams
'Malware-free' attacks now most popular tactic amongst cybercriminals

‘Malware-free’ attacks now most popular tactic amongst cybercriminals

More than half of attacks last year leveraged fileless or “malware-free” techniques, as hackers increasingly turn to stolen credentials in their efforts to breach corporate…

View More ‘Malware-free’ attacks now most popular tactic amongst cybercriminals
Cyber Kill Chain - Lockheed Martin

Cyber Kill Chain – Lockheed Martin

Security incidents are events that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them…

View More Cyber Kill Chain – Lockheed Martin
The Risk of “Credential Stuffing” to the Smart Home

The Risk of “Credential Stuffing” to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the cost of having a connected “smart home” also decreases. Sensors…

View More The Risk of “Credential Stuffing” to the Smart Home
Malaysia warns of Chinese hacking campaign targeting government projects

Malaysia warns of Chinese hacking campaign targeting government projects

A Chinese state-sponsored hacking group has been targeting Malaysian government officials, computer experts with the Malaysian government said on Wednesday. The purpose of the attacks…

View More Malaysia warns of Chinese hacking campaign targeting government projects
Hackers using coronavirus scare to spread Emotet malware in Japan

Hackers using coronavirus scare to spread Emotet malware in Japan

Cybercriminals are using global fears about the virus to spread the Emotet trojan. Researchers with IBM X-Force and Kaspersky have discovered that cybercriminals are spreading…

View More Hackers using coronavirus scare to spread Emotet malware in Japan
Hospital Cyberattacks Linked to Increase in Heart Attack Mortality

Hospital Cyberattacks Linked to Increase in Heart Attack Mortality

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds. Ransomware attacks and data breaches targeting hospitals may cause a…

View More Hospital Cyberattacks Linked to Increase in Heart Attack Mortality
New vulnerability lets attackers sniff or hijack VPN connections

New vulnerability lets attackers sniff or hijack VPN connections

Academics have disclosed this week a security flaw impacting Linux, Android, macOS, and other Unix-based operating systems that allows an attacker to sniff, hijack, and…

View More New vulnerability lets attackers sniff or hijack VPN connections
Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying

Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying

Even if you’re diligent about app permissions, sometimes you just can’t predict how or when a bad actor will abuse them. This time around, a…

View More Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying