5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.

The post 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays appeared first on Security Intelligence.

Continue reading 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape

In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.

The post Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape appeared first on Security Intelligence.

Continue reading Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape

Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers

X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors.

The post Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers appeared first on Security Intelligence.

Continue reading Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers

How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy?

According to recent research, only 1 percent of media companies are very confident in their cybersecurity strategy and policy.

The post How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy? appeared first on Security Intelligence.

Continue reading How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy?

4 New Smart Office Security Risks and How to Mitigate Them

The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.

The post 4 New Smart Office Security Risks and How to Mitigate Them appeared first on Security Intelligence.

Continue reading 4 New Smart Office Security Risks and How to Mitigate Them

Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

Given the increasingly sophisticated and interconnected nature of the cyberthreat landscape, organizations must collaborate across sectors to improve cyber resilience around the world.

The post Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook appeared first on Security Intelligence.

Continue reading Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

How Will You Face the High Price of DDoS Attacks?

The largest distributed denial-of-service (DDoS) attack that occurred in the spring of 2018 targeted GitHub and lasted more than eight minutes and measured 1.3 Tbps. How will you face such an attack?

The post How Will You Face the High Price of DDoS Attacks? appeared first on Security Intelligence.

Continue reading How Will You Face the High Price of DDoS Attacks?

Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

With so much data being moved to the cloud, it’s more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks.

The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 appeared first on Security Intelligence.

Continue reading Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers

The memcached vulnerability isn’t new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.

The post Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers appeared first on Security Intelligence.

Continue reading Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers

Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1

Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems.

The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 appeared first on Security Intelligence.

Continue reading Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1