Category: Frontline Security

Pawn Storm Targets French and German Politics

Pawn Storm Targets French and German Politics

Trend Micro has released its latest research report on the activity of Pawn Storm (aka APT28 and Fancy Bear), an active cyber espionage group that targets the global defence industry and politicians, among others. The report exposes how the group targets and attacks individuals in high value organisations using sophisticated socially engineered phishing emails. Pawn […]

China/Aus CyberSec agreement "tacit acknowledgement" of theft levels; could make Australian firms less safe

China/Aus CyberSec agreement “tacit acknowledgement” of theft levels; could make Australian firms less safe

Here is a statement from Tim Wellsmore, the Director of Threat Intelligence, Asia Pacific at FireEye on the recently announced pact between Australia and China to enhance cybersecurity cooperation: This China-Australia agreement is good news for Australia, but not because it stops China from hacking to steal intellectual property. It’s good news because it’s a […]

Malwarebytes Integrates with ForeScout to Deliver Real-Time Threat Visibility and Remediation

Malwarebytes Integrates with ForeScout to Deliver Real-Time Threat Visibility and Remediation

Malwarebytes has announced an integration with ForeScout Technologies to provide joint customers real-time threat visibility and remediation for both managed and unmanaged devices. The vast majority of today’s attacks occur in just minutes, with the bulk of subsequent data theft beginning within seconds following a breach. Malicious attackers have dozens of tools, techniques and attack vectors […]

Unveiling Verizon’s Threat Research Advisory Center

Unveiling Verizon’s Threat Research Advisory Center

When it comes to data theft, cybercriminals can break in and steal data in a matter of minutes. Verizon’s 2016 Data Breach Investigations Report found that in 93 percent of the cases analysed, attackers were able to compromise systems in minutes or less. On the other hand, most organizations didn’t discover that a breach had even occurred […]

ST Electronics Announces Partnerships with the Sri Lanka and Singapore Governments on Cyber Security Initiatives

ST Electronics Announces Partnerships with the Sri Lanka and Singapore Governments on Cyber Security Initiatives

Contract Win to Implement Sri Lanka’s First National Security Operations Centre and MOU to Strengthen the Singapore Armed Forces’ Cyber Defence Training Singapore Technologies Electronics Limited (ST Electronics) has announced key collaborations with local and overseas governments to strengthen their national cyber security capabilities and counter cyber threats, building on ST Electronics’ comprehensive capabilities and deep […]

Boeing names CSIRO a 'Supplier of the Year'

Boeing names CSIRO a ‘Supplier of the Year’

CSIRO’s 28-year-collaboration with Boeing has soared to new heights with the aerospace company naming CSIRO a “Supplier of the Year” for calendar year 2016. Outstanding performance in research and development, including a breakthrough innovation to keep Boeing’s employees safer, were cited as some of the reasons for CSIRO being given the Technology Award, which was […]

HID Global launches new indoor positioning services for workforce optimisation

HID Global launches new indoor positioning services for workforce optimisation

New HID location services enable better building management and increase operational efficiency HID Global has announced its new HID Location Services that provide organisations with visibility into the location of their workforce in a facility, making it possible to analyze room usage for better building management and increased operational efficiency. The offering is tailor-made for enterprises, […]

The Chinese New Year heist

The Chinese New Year heist

A traditional Chinese New Year celebration with volumes of ‘prosperity and good luck’ money gifts, asynchronous working days across 2 time zones, procedural and regulatory vulnerabilities, straight-through automated processing – these were among the elements that contributed to delays in detecting and responding to the Bangladesh Central Bank cyber break-in, and allowed sophisticated well-organized criminals […]

Russia's Cyber War: Options before the US

Russia’s Cyber War: Options before the US

US intelligence’s findings holding Russian President Vladimir Putin directly responsible for a cyber campaign that ensured Republican Donald Trump’s victory in the 2016 presidential election betrays Washington’s weakness as much as Moscow’s deceit. After initially discounting Russia’s manipulation, President-elect Trump accepted the findings and spoke of possible action in response, his incoming chief of staff […]

Nothing’s Certain, Except Death and Taxes…and Phishing

Nothing’s Certain, Except Death and Taxes…and Phishing

“…But in this world, nothing can be said to be certain, except death and taxes.” – Benjamin Franklin We should add phishing to this idiom, too. Many businesses and their employees have recently fallen victim to a very successful spear-phishing attack that dupes an unsuspecting employee into sending the company’s W-2s to a company executive, who […]