What is Ghimob Malware?

A new Android malware strain ‘Ghimob’ is mimicking third-party mobile (mainly banking) apps to spy and steal user data when downloaded and installed. This Trojan virus steals data from users, primarily targeting online banking and cryptocurrency. As of the end of 2020, it is believed to siphon data from more than 153 apps by asking […]

The post What is Ghimob Malware? appeared first on Security Intelligence.

Continue reading What is Ghimob Malware?

Biden Administration Drafting EO to Help U.S. Gov’t Secure Digital Supply Chain

The Biden administration said it’s drafting an executive order to help the United States government better defend itself against digital supply chain attacks. A Step Up for Federal Procurement According to NPR, the executive order that’s being drafted … Continue reading Biden Administration Drafting EO to Help U.S. Gov’t Secure Digital Supply Chain

How to Talk to Leadership About a Zero Trust Model That’s Right For You

This is the second blog in a series about zero trust. Lack of requisite budget can be a major roadblock when it comes to adding a zero trust model. Why is this so much of a problem? And, how can a SOC team make the C-suite see how zero trust helps the business? In the […]

The post How to Talk to Leadership About a Zero Trust Model That’s Right For You appeared first on Security Intelligence.

Continue reading How to Talk to Leadership About a Zero Trust Model That’s Right For You

How Zero Trust Can Help Close the Cybersecurity Skills Gap

Using a zero trust model can help tackle some of the major challenges in cybersecurity today, including the skills gap.  In July 2020, Deloitte surveyed webinar attendees about their organizations’ plans to implement a zero trust model. The poll found that four challenges had disrupted the efforts of many employers. A lack of skilled workers […]

The post How Zero Trust Can Help Close the Cybersecurity Skills Gap appeared first on Security Intelligence.

Continue reading How Zero Trust Can Help Close the Cybersecurity Skills Gap

Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack

The Sodinokibi ransomware gang is trying to extort Apple following an attack against one of the tech giant’s business partners. According to Bloomberg News, someone using the moniker “Unknown” announced on April 18 that the Sodinokibi/REvil gang w… Continue reading Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack

Cloud Native Tools Series Part 3: Get the Right Tools

As we near the end of our journey into cloud native tools, let’s take a look at visibility. In a previous post, I discussed how business entities need to understand their end of the Amazon Web Services (AWS) shared security model to uphold their cloud defense duties. This knowledge can help them safeguard their digital […]

The post Cloud Native Tools Series Part 3: Get the Right Tools appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 3: Get the Right Tools

How VPNs Are Changing to Manage Zero Trust Network Access

What do a growing number of cyberattacks, emerging tech, such as artificial intelligence, and cloud adoption have in common? They’re all helping fuel the rise of zero trust. Zero trust network access is, in turn, changing the way we access the internet for work. Let’s take a look at how another common tool today — the […]

The post How VPNs Are Changing to Manage Zero Trust Network Access appeared first on Security Intelligence.

Continue reading How VPNs Are Changing to Manage Zero Trust Network Access

Beware of These 3 Scams Making the Rounds This Tax Season

On March 17, the U.S. Internal Revenue Service (IRS) and the Treasury Department announced the extension of the federal income tax filing due date from April 15, 2021 to May 17, 2021. This decision is designed “to help taxpayers navigate the unusual ci… Continue reading Beware of These 3 Scams Making the Rounds This Tax Season

The IT-OT Connection: How the Two Work Together

Where hardware meets software, attackers can sneak in. More and more, threat actors are targeting Industrial Control Systems (ICS) and Operational Technology (OT). IBM X-Force found that the number of attacks against those types of assets increased by over 2,000% between 2018 and 2019, with the number of ICS and OT attacks in 2019 having […]

The post The IT-OT Connection: How the Two Work Together appeared first on Security Intelligence.

Continue reading The IT-OT Connection: How the Two Work Together

3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help)

The events of 2020 left a lasting impression on the way people work. A third of Americans polled in September 2020 were always working remotely — down from more than half (51%) just a few months earlier. These changes continue to echo across many aspects of our lives. In the digital security space, the shift to […]

The post 3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help) appeared first on Security Intelligence.

Continue reading 3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help)