Reverse Tabnabbing

Reverse Tabnabbing is an attack where a page linked from the target page is able to rewrite that page, for example to replace it with a phishing site. Here, the redirection happens through links  from the parent site to attacker’s site. In tabnabbing attackers take advantage and control of victims unattended browser tabs by hijacking […]

The post Reverse Tabnabbing appeared first on Security Intelligence.

Continue reading Reverse Tabnabbing

Posted in Uncategorized

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there’s the […]

The post Emotional Blowback: Dealing With Post-Incident Stress appeared first on Security Intelligence.

Continue reading Emotional Blowback: Dealing With Post-Incident Stress

Posted in Uncategorized

Cyber insurance costs soar amid ransomware attacks

Ransomware attacks and recurring breaches cause insurers to rethink risk as prices rise and policies get increasingly harder to obtain. That cyberattacks have been on the rise is one fact we unfortunately read every year. The cost of these attacks has also been rising steadily, standing at a global average of $4.35 million, according to […]

The post Cyber insurance costs soar amid ransomware attacks appeared first on Security Intelligence.

Continue reading Cyber insurance costs soar amid ransomware attacks

Posted in Uncategorized

What TrickBot tells us about the future of

What TrickBot tells us about the future of malware  Malware attackers are increasingly sophisticated. Here’s what to know  On TrickBot and the future of malware    Malware threats have plagued organizations for decades, but that’s no reason to be complacent with a security strategy that has to date protected your organization. Now more than ever, malware is […]

The post What TrickBot tells us about the future of appeared first on Security Intelligence.

Continue reading What TrickBot tells us about the future of

Posted in Uncategorized

Why Phishing Is Still the Top Attack Method

Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email signature look like? What’s the color and size of the charity’s logo?    This kind of information is priceless to attackers. From there, attackers can craft […]

The post Why Phishing Is Still the Top Attack Method appeared first on Security Intelligence.

Continue reading Why Phishing Is Still the Top Attack Method

2021 Manufacturing and Supply Chain Security Roundup

In 2020, ransomware actors demanded $17 million from a laptop maker and $34 million from a Taiwanese electronics contract company. The past two years have also delivered major disruptions for supply chains. The pandemic pushed supply chain attack issues front-and-center, with disruptions up 67% in 2020 and problems expected to persist as global markets adjust to the ‘new […]

The post 2021 Manufacturing and Supply Chain Security Roundup appeared first on Security Intelligence.

Continue reading 2021 Manufacturing and Supply Chain Security Roundup

IoT Security: Are Personal Devices Dragging Your Work Network Down?

How many connected devices have you added to your household since March 2020? Be sure to count fitness trackers, speakers, gaming machines and even your Tesla, if there’s one in your driveway. Were you one of the many people who waited months for a Peloton? Don’t overlook your new bike. Now add in all your […]

The post IoT Security: Are Personal Devices Dragging Your Work Network Down? appeared first on Security Intelligence.

Continue reading IoT Security: Are Personal Devices Dragging Your Work Network Down?

CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid

In terms of database security, any bad practice is dangerous. Still, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently deemed some behavior as “exceptionally risky.” Are your teams engaged in these high-risk practices? What can you do to mitigate the risk of a data breach? As per CISA, “The presence of these Bad Practices […]

The post CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid appeared first on Security Intelligence.

Continue reading CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid

Secure Coding with DDD

Domain-Driven Design for Secure Code   With the ever-growing software ecosystem, attributes for successful product are performance, security, maintainability, and usability. When it comes to delivering product the priorities are quality assurance, time to market and it need to stay within budget. The security-related tasks in the backlog keep getting lower priority compared to the […]

The post Secure Coding with DDD appeared first on Security Intelligence.

Continue reading Secure Coding with DDD

Posted in Uncategorized

Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup

This month in digital security, scam text messages may seem like an easy attack to dodge, but they’re getting smarter. Meanwhile, chief information security officers are wearing lots of hats. And, is it really possible to ‘future proof’ anything? The World Economic Forum says the way we look at it now isn’t working. Here’s your […]

The post Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup appeared first on Security Intelligence.

Continue reading Risk Management, C-Suite Shifts & Next-Gen Text Scams: Your March 2021 Security Intelligence Roundup