State Department announces $10M bounty for Russian intelligence hackers behind NotPetya

The State Department is offering $10 million for the location of six Russian intelligence officers in the Sandworm unit.

The post State Department announces $10M bounty for Russian intelligence hackers behind NotPetya appeared first on CyberScoop.

Continue reading State Department announces $10M bounty for Russian intelligence hackers behind NotPetya

Attacks on Operational Technology From IBM X-Force and Dragos Data

Operational Technology Threats in 2021: Ransomware, Remote Access Trojans and Targeted Threat Groups Organizations with operational technology (OT) networks face many unique — and often complicated — considerations when it comes to cybersecurity threats. One of the main challenges facing the community is the convergence of an increasingly OT-aware and capable threat landscape with the […]

The post Attacks on Operational Technology From IBM X-Force and Dragos Data appeared first on Security Intelligence.

Continue reading Attacks on Operational Technology From IBM X-Force and Dragos Data

How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation… Continue reading How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

Data Poisoning: When Attackers Turn AI and ML Against You

Stopping ransomware has become a priority for many organizations. So, they are turning to artificial intelligence (AI) and machine learning (ML) as their defenses of choice. However, threat actors are also turning to AI and ML to launch their attacks. One specific type of attack, data poisoning, takes advantage of this. Why AI and ML Are at […]

The post Data Poisoning: When Attackers Turn AI and ML Against You appeared first on Security Intelligence.

Continue reading Data Poisoning: When Attackers Turn AI and ML Against You

3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help)

The events of 2020 left a lasting impression on the way people work. A third of Americans polled in September 2020 were always working remotely — down from more than half (51%) just a few months earlier. These changes continue to echo across many aspects of our lives. In the digital security space, the shift to […]

The post 3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help) appeared first on Security Intelligence.

Continue reading 3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help)

DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script c… Continue reading DDoS attacks and 5G: everything you need to know

Cybersecurity Trends and Emerging Threats in 2021

The year 2021 is finally here, bringing with it the promise of a brighter future — but a long road ahead. In this piece, we’ll dive into five cybersecurity trends that pose significant potential risk in 2021 and offer practical advice to help entities reduce overall risk. The first quarter of 2021 represents a cybersecurity […]

The post Cybersecurity Trends and Emerging Threats in 2021 appeared first on Security Intelligence.

Continue reading Cybersecurity Trends and Emerging Threats in 2021

Moving Threat Identification From Reactive to Predictive and Preventative

In a previous post, we focused on organizations’ characteristics, such as sector, geography, risk and impact, when discussing the pillars of building a threat identification program. Now, we move deeper into the concept and expand upon the threat identification process through example scenarios, helping translate the conceptual framework into daily practice. It’s Always About Business […]

The post Moving Threat Identification From Reactive to Predictive and Preventative appeared first on Security Intelligence.

Continue reading Moving Threat Identification From Reactive to Predictive and Preventative