Category: Spotlight on Security

Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report

Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report.  Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cybercriminals. Nearly 2,000 breaches were analysed in […]

McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations

McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations

McAfee Links Series of Shamoon Malware Campaigns Targeting Saudi Arabia; Suggests One Common Actor Behind Attacks NEWS HIGHLIGHTS McAfee to invest more in investigation of the technology and tactics of the latest cyberwarfare and cybercrime campaigns McAfee discloses detailed analysis of the evolution of Shamoon malware campaigns from 2012 attacks to 2016 and 2017 campaigns Commonalities […]

Pawn Storm Targets French and German Politics

Pawn Storm Targets French and German Politics

Trend Micro has released its latest research report on the activity of Pawn Storm (aka APT28 and Fancy Bear), an active cyber espionage group that targets the global defence industry and politicians, among others. The report exposes how the group targets and attacks individuals in high value organisations using sophisticated socially engineered phishing emails. Pawn […]

China/Aus CyberSec agreement "tacit acknowledgement" of theft levels; could make Australian firms less safe

China/Aus CyberSec agreement “tacit acknowledgement” of theft levels; could make Australian firms less safe

Here is a statement from Tim Wellsmore, the Director of Threat Intelligence, Asia Pacific at FireEye on the recently announced pact between Australia and China to enhance cybersecurity cooperation: This China-Australia agreement is good news for Australia, but not because it stops China from hacking to steal intellectual property. It’s good news because it’s a […]

Unveiling Verizon’s Threat Research Advisory Center

Unveiling Verizon’s Threat Research Advisory Center

When it comes to data theft, cybercriminals can break in and steal data in a matter of minutes. Verizon’s 2016 Data Breach Investigations Report found that in 93 percent of the cases analysed, attackers were able to compromise systems in minutes or less. On the other hand, most organizations didn’t discover that a breach had even occurred […]

Akamai Online Retail Performance Report: Milliseconds Are Critical

Akamai Online Retail Performance Report: Milliseconds Are Critical

Web Performance Analytics Show Even 100-Millisecond Delays Can Impact Customer Engagement and Online Revenue Akamai Technologies has announced the release of the latest State of Online Retail Performance report, a biannual study that analyses performance metrics for leading retail websites. The report was previously issued by SOASTA, acquired by Akamai in April 2017. The data, gathered by […]

Critical Communications World promises to deliver the largest CCW in Asia to date

Critical Communications World promises to deliver the largest CCW in Asia to date

Critical Communications World (May 16-18, Hong Kong) is on track to attract over 3000 critical communications professionals with 90% of the current registrations coming from outside Hong Kong, cementing CCW as a truly global event. Hosting this year’s 19th Annual event in Hong Kong provides the perfect setting, with this year’s theme focused on network […]

Big data and machine learning: A perfect pair for cyber security?

Big data and machine learning: A perfect pair for cyber security?

Online threats are emerging at a faster rate than ever. Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicious programs becoming more sophisticated, and in turn, they’re harder to detect and mitigate quickly. Many organizations simply cannot keep up with the pace of cyber threats as there’s little […]

Gemalto releases findings of 2016 Breach Level Index

Gemalto releases findings of 2016 Breach Level Index

Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases across industries Gemalto has released the findings of the Breach Level Index revealing that 1,792 data breaches led to almost 1.4 billion data records being compromised worldwide during 2016, an increase of 86% compared to 2015. Identity theft was the leading type of data […]

Nothing’s Certain, Except Death and Taxes…and Phishing

Nothing’s Certain, Except Death and Taxes…and Phishing

“…But in this world, nothing can be said to be certain, except death and taxes.” – Benjamin Franklin We should add phishing to this idiom, too. Many businesses and their employees have recently fallen victim to a very successful spear-phishing attack that dupes an unsuspecting employee into sending the company’s W-2s to a company executive, who […]