The devastating ransomware attack on the Irish Health Service Executive (HSE), was the work of the Conti ransomware gang, also known as Wizard Spider, according to reports. The Irish National Cyber Security Centre (NCSC), which is leading on triage and investigation, said it had activated its incident response procedures and was providing ongoing support to […]
Government seeks input on supply chain security
The government has unveiled new proposals to help UK businesses manage cyber security in their digital and third-party IT services supply chains, as a growing body of evidence suggests that the risks to business continuity are hitting unprecedented heights. With supply chains demonstrably threatened through high-profile cyber attacks – a recent spate of incidents sparked […]
Colonial Pipeline paid $5m ransom, reports say
Colonial Pipeline, the US operator of fossil fuel distribution infrastructure that was hit by a DarkSide ransomware attack last week, may have paid a $5m ransom to the ransomware operators within hours of being locked out of critical systems, according to reports. According to anonymous sources close to the incident, Colonial Pipeline paid the ransom […]
The shape of fraud and cyber crime: 10 things we learned from 2020
As we settle into our new digital lives, where the internet has become our workplace, our classroom, our shopping venue and our social lifeline, our behaviours have changed forever. While a pandemic-driven increase in cyber crime and an exacerbation of existing fraud trends were, to a large extent, to be expected, the LexisNexis risk solutions UK […]
Beyond MFA: Rethinking the Authentication Key
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Apple’s ‘Find My’ Network Exploited via Bluetooth
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Evolution not revolution: Why mobile fingerprint sensors are here to stay
Around the world, we have fallen in love with our mobile devices. There are 10+ billion devices in circulation, we check them 58 times daily on average and 65% of Americans check their smartphones up to 160 times a day! We estimate that time spent unlocking using PINs and passwords equates to 41 minutes each week, or about 4 months of […]
What’s the difference between sandboxes vs. containers?
Containers and sandboxes are two terms that often come up when talking about malware prevention, leaving many enterprises… wondering which is best to implement. The answer is a combination of both, but many organizations may not be able to afford or have the expertise to implement both. To find the best option for your enterprise’s […]
Publishing exploit code does more harm than good, says report
Cyber security researchers and ethical hackers may wish to consider easing off on publicly disclosing vulnerability exploit code before patches have been made available, because doing so gives malicious actors a “clear and unequivocal” advantage, according to new data crunched by vulnerability management specialist Kenna Security and Cyentia Institute. In the research study, Prioritisation to prediction, […]
Verizon DBIR underscores year of unprecedented cyber challenge
Verizon has released its 2021 Data breach investigations report (DBIR), looking back on a year of cyber security challenges, including vast spikes in cyber attacks, as the Covid-19 pandemic wrought havoc across the tech sector. Like many other cyber security supplier reports, the latest edition of the firm’s long-running DBIR series cannot help but underline […]