highlights

now browsing by tag

 
 

#comptia | #ransomware | Check Point report highlights latest cyber-threats worldwide

Source: National Cyber Security – Produced By Gregory Evans

Check Point Research has published its 2020 Cyber Security Report.

The report highlights the main tactics cyber-criminals are using to attack organisations worldwide across all industries and gives cybersecurity professionals and C-Level executives the information they need to protect their organisations from today’s fifth-generation cyber-attacks and threats.

The 2020 Security Report reveals the key attack vectors and techniques observed by Check Point researchers during the past year.

Highlights include:

Cryptominers still dominate malware landscape – Even though cryptomining declined during 2019, linked to cryptocurrencies’ fall in value and the closure of the Coinhive operation in March, 38% of companies globally were impacted by crypto-miners in 2019, up from 37% in 2018.

This is because the use of cryptominers remains a low-risk, high-reward activity for criminals

Botnet armies surge in size – 28% of organisations globally were hit by botnet activity, an increase of over 50% compared with 2018.

Emotet was the most common bot malware used, primarily because of its versatility in enabling malware and spam distribution services.

Other botnet actions such as sextortion email activity and DDoS attacks also rose sharply in 2019.  

Targeted ransomware hits hard – While the number of impacted organisations is relatively low, the severity of the attack is much higher – as seen in 2019’s damaging attacks against US city administrations.

Criminals are choosing their ransomware targets carefully, with the aim of extorting the maximum revenue possible.

Mobile attacks decline – 27% of organisations worldwide were impacted by cyber-attacks that involved mobile devices in 2019, down from 33% in 2018.

While the mobile threat landscape is maturing, organisations are also increasingly aware of the threat, and are deploying more protection on mobiles.

The year Magecart attacks became an epidemic – These attacks which inject malicious code into e-commerce websites to steal customers’ payment data hit hundreds of sites in 2019, from hotel chains to from commerce giants to SMBs, across all platforms.

Rise in cloud attacks – Currently more than 90% of enterprises use cloud services and yet 67% of security teams complain about the lack of visibility into their cloud infrastructure, security, and compliance.

The magnitude of cloud attacks and breaches has continued to grow in 2019.

Misconfiguration of cloud resources is still the number one cause for cloud attacks, but now we also witness an increasing number of attacks aimed directly at cloud service providers. 

“2019 presented a complex threat landscape where nation states, cybercrime organisations and private contractors accelerated the cyber arms race, elevating each other’s capabilities at an alarming pace, and this will continue into 2020,” says Check Point Software Technologies major intelligence officer Lotem Finkelsteen.

“Even if an organisation is equipped with the most comprehensive, state-of-the-art security products, the risk of being breached cannot be completely eliminated. Beyond detection and remediation, organisations need to adopt a proactive plan to stay ahead of cybercriminals and prevent attacks.

“Detecting and automatically blocking the attack at an early stage can prevent damage. Check Point’s 2020 Security Report shares what organisations need to look out for, and how they can win the war against cyber-attacks through key best practices.”

Check Point’s 2020 Security Report is based on data from Check Point’s ThreatCloud intelligence, the largest collaborative network for fighting cybercrime which delivers threat data and attack trends from a global network of threat sensors; from Check Point’s research investigations over the last 12 months; and on a brand new survey of IT professionals and C-level executives that assesses their preparedness for today’s threats.

The report examines the latest emerging threats against various industry sectors, and gives a comprehensive overview of the trends observed in the malware landscape, in emerging data breach vectors, and in nation-state cyber-attacks.

It also includes analysis from Check Point’s thought leaders, to help organisations understand and prepare themselves for today’s and tomorrow’s complex threat landscape.

Source link

The post #comptia | #ransomware | Check Point report highlights latest cyber-threats worldwide appeared first on National Cyber Security.

View full post on National Cyber Security

Cybersecurity Task Force Highlights Hurdles Facing Healthcare

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans “Healthcare cybersecurity is a key public health concern that needs immediate and aggressive attention,” according to a report by a federal task force. However, healthcare delivery organizations are hampered by a lack of resources, necessitating a “unified effort” among the public and private sectors. “Many organizations […] View full post on AmIHackerProof.com | Can You Be Hacked?

Agencies’ approach to IoT security highlights differences in cybersecurity approach

Source: National Cyber Security – Produced By Gregory Evans

Despite recent White House efforts to bring some standardization to federal cybersecurity, agencies are still taking different paths to secure their systems and data. Speaking at the July 18 AFCEA Energy and Earth Science IT symposium in Washington, D.C., Sean Kelley, chief information security officer at the Environmental Protection Agency, said when…

The post Agencies’ approach to IoT security highlights differences in cybersecurity approach appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

K-12 and the Supreme Court: Highlights From 2015-16 – Education Week

Affirmative action, teachers’ union fees, and deportation relief for undocumented parents of U.S. citizen children were among the top education-related issues in the U.S. Supreme Court’s recent term.

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post K-12 and the Supreme Court: Highlights From 2015-16 – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Hacker highlights public wi-fi dangers in Dubai

dub

Source: National Cyber Security – Produced By Gregory Evans

A few seconds spent on wifi in a Media City cafe was all it took for Jason Hart to steal my identity, and probably gain access to my bank account. The former hacker sets his laptop down on a table and connects a gadget that looks like a wifi router, with two small antennae (he […]

The post Hacker highlights public wi-fi dangers in Dubai appeared first on National Cyber Security.

View full post on National Cyber Security

Sexually Transmitted Zika Highlights Brazil’s Rampant Inequality

On Friday, scientists detected Zika virus in both urine and saliva for the first time, classifying the virus in the bodily fluid samples as “active.” That means the fluid samples are capable of transmitting Zika. This finding, coupled with recent reports of a sexually transmitted Zika case in Texas, indicates that sexual contact may become a significant mode of transmission for the disease.

The conclusion bodes poorly for the most impoverished women in Brazil and other Latin American countries, where access to comprehensive sex education and reproductive care — including abortion — is spotty to nonexistent.

While Brazilian researchers cautioned that it was too soon to say whether the virus can be transmitted via urine or saliva, the U.

Read More

The post Sexually Transmitted Zika Highlights Brazil’s Rampant Inequality appeared first on Parent Security Online.

View full post on Parent Security Online

Cybercom: OPM Hack Highlights China Big Data Spying

Source: National Cyber Security – Produced By Gregory Evans

Cybercom: OPM Hack Highlights China Big Data Spying

China’s theft of millions of records on Americans was part of a Big Data spying program conducted by Beijing that has prompted the Pentagon to take new steps to secure large data concentrations. That was the assessment of U.S. Cyber Command commander Adm. Mike Rogers who on Thursday called the compromise of 22 million records from the Office of Personnel Management, as well as millions of heath care records in an earlier attack disclosed last year, a new form of cyber spying. The Chinese cyber attacks from 2014 “get more to the idea of what’s acceptable, what’s not acceptable, what’s within established norms,” Rogers said during remarks at the Atlantic Council on Jan. 21. The commander said nations around the world commonly use certain capabilities to learn about the world. “Hey, we call that spying and espionage,” he said. However, the hack of government personnel records, along with the Chinese hacking of the health care provider Anthem, highlighted the targeting of seemingly unimportant caches of data. Analyzing large data repositories is a new trend in cyber espionage, Rogers says. “If you go back five, ten years ago, I remember discussions where we thought there is just so much data here, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cybercom: OPM Hack Highlights China Big Data Spying appeared first on National Cyber Security.

View full post on National Cyber Security

French Dating Site Toutafaitmoi.net Highlights Defects

01AMOUR – Dec 27 – Toutafaitmoi (AbsolutelyMe) works just like any other dating site except users have to disclose three of their worst qualities in their profiles. Read More….

The post French Dating Site Toutafaitmoi.net Highlights Defects appeared first on Dating Scams 101.

View full post on Dating Scams 101

Rural crime forum highlights illegal pig hunting problem

guddeah

Source: National Cyber Security – Produced By Gregory Evans

At a rural crime forum in Gunnedah, primary producers voiced their concerns to police. Farmer Peter Middlebrook said he had tried to confront the hunters, who often steal diesel and vandalise fences and tanks. He said not enough was being done to prevent these pig chasers from trespassing. “It virtually happens every week at home. They come from the local villages and they are usually only hobos that don’t have farms themselves,” he said “Two years ago, we lost $45,000 worth of gear out of our sheds, that’s diesel, compressors, welders. They must have had a damn semitrailer to take it all away. We rang the police and they left a card. “A police station in a town Gunnedah’s size that only works from eight till five and no weekends, I think that’s appalling in this day and age. “If we could control the pig hunters and let on who we want to let on, not the bloke who’s going to cut your diesel tank and let it all down the drain, I think we’d be far better off.” Unmanned aircraft could be the future Farmer Kerry Swain said drone technology might eventually be the answer to patrolling property boundaries. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Rural crime forum highlights illegal pig hunting problem appeared first on National Cyber Security.

View full post on National Cyber Security

School security forum highlights need for armed security guards, metal detectors – Parent Security Online

parentsecurityonline.com – Education officials on Monday evening hosted the New Jersey Task Force on School Security inside the auditorium of International High School to elicit community concerns relating to school safety. …

View full post on Hi-Tech Crime Solutions Weekly