Moody’s Rating adds telecoms, airlines, utilities to highest risk category

The financial ratings service says industry digital reliance increases cyber risk.

The post Moody’s Rating adds telecoms, airlines, utilities to highest risk category appeared first on CyberScoop.

Continue reading Moody’s Rating adds telecoms, airlines, utilities to highest risk category

North Korean-linked hackers were caught experimenting with new macOS malware

Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild.

The post North Korean-linked hackers were caught experimenting with new macOS malware appeared first on CyberScoop.

Continue reading North Korean-linked hackers were caught experimenting with new macOS malware

Criminals Exploiting FBI Emergency Data Requests

I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too.

Turns out the same thing is true for non-technical backdoors:

The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information…

Continue reading Criminals Exploiting FBI Emergency Data Requests

The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileg… Continue reading The changing face of identity security

Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust str… Continue reading Evaluating your organization’s application risk management journey

Ambitious cybersecurity regulations leave companies in compliance chaos

While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also introduced a considerable set of challenges that organizations and their lea… Continue reading Ambitious cybersecurity regulations leave companies in compliance chaos