Zero-Day Exploits: The Anatomy of Unexpected Attacks

Zero-day attacks are on the rise. Not only was 2021 a record-breaking year for the total number of zero-day attacks, but it also accounted for 40% of the zero-day breaches over the last decade. In part, this race to zero is tied to the sheer number of web, mobile and cloud-based applications being developed and […]

The post Zero-Day Exploits: The Anatomy of Unexpected Attacks appeared first on Security Intelligence.

Continue reading Zero-Day Exploits: The Anatomy of Unexpected Attacks

Third-Party App Stores Could Be a Red Flag for iOS Security

Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European Union’s (EU) Digital Markets Act (DMA), which looks to ensure open markets by reducing the ability of digital “gatekeepers” to restrict content on […]

The post Third-Party App Stores Could Be a Red Flag for iOS Security appeared first on Security Intelligence.

Continue reading Third-Party App Stores Could Be a Red Flag for iOS Security

Defensive Driving: The Need for EV Cybersecurity Roadmaps

As the U.S. looks to bolster electric vehicle (EV) adoption, a new challenge is on the horizon: cybersecurity. Given the interconnected nature of these vehicles and their reliance on local power grids, they’re not just an alternative option for getting from Point A to Point B. They also offer a new path for network compromise […]

The post Defensive Driving: The Need for EV Cybersecurity Roadmaps appeared first on Security Intelligence.

Continue reading Defensive Driving: The Need for EV Cybersecurity Roadmaps

What the New Federal Cybersecurity Act Means for Businesses

On December 21, 2022, President Biden signed the Quantum Computing Cybersecurity Preparedness Act. The risk of quantum-powered password decryption is increasing exponentially. The new legislation is designed to help federal agencies proactively shift to a post-quantum security posture. Agencies have until May 4, 2023, to submit an inventory of potentially vulnerable systems, and the Act […]

The post What the New Federal Cybersecurity Act Means for Businesses appeared first on Security Intelligence.

Continue reading What the New Federal Cybersecurity Act Means for Businesses

Why SMB Cybersecurity May Be Changing for the Better

Cyberattacks represent a serious problem for small to medium-sized businesses (SMBs). Consider that in 2019, 43% of attackers went after small businesses, and in 2021, 60% of SMBs said they were victimized by a cyberattack. Even more worrisome? For small and midsize businesses, cyberattack impacts go beyond downtime, lost data and reduced consumer trust. According […]

The post Why SMB Cybersecurity May Be Changing for the Better appeared first on Security Intelligence.

Continue reading Why SMB Cybersecurity May Be Changing for the Better

RomCom RAT Attack Analysis: Fake It to Make It

The RomCom RAT has been making the rounds — first in Ukraine as it went after military installations, and now in certain English-speaking countries such as the United Kingdom. Initially a spear-phishing campaign, the RomCom attack has evolved to include domain and download spoofing of well-known and trusted products. In this piece, we’ll break down […]

The post RomCom RAT Attack Analysis: Fake It to Make It appeared first on Security Intelligence.

Continue reading RomCom RAT Attack Analysis: Fake It to Make It

Laid Off by Big Tech? Cybersecurity is a Smart Career Move

Big technology companies are laying off staff as market conditions change. The move follows a hiring blitz initially triggered by the uptick in pandemic-powered remote work — according to Bloomberg, businesses are now cutting jobs at a rate approaching that of early 2020. For example, in November 2022 alone, companies laid off more than 52,000 […]

The post Laid Off by Big Tech? Cybersecurity is a Smart Career Move appeared first on Security Intelligence.

Continue reading Laid Off by Big Tech? Cybersecurity is a Smart Career Move

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today

WannaCry wasn’t a particularly complex or innovative ransomware attack. What made it unique, however, was its rapid spread. Using the EternalBlue exploit, malware could quickly move from device to device, leveraging a flaw in the Microsoft Windows Server Message Block (SMB) protocol.  As a result, when the WannaCry “ransomworm” hit networks in 2017, it expanded […]

The post Worms of Wisdom: How WannaCry Shapes Cybersecurity Today appeared first on Security Intelligence.

Continue reading Worms of Wisdom: How WannaCry Shapes Cybersecurity Today