Bug Poaching: A New Extortion Tactic Targeting Enterprises

Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.

The post Bug Poaching: A New Extortion Tactic Targeting Enterprises appeared first on Security Intelligence.

Continue reading Bug Poaching: A New Extortion Tactic Targeting Enterprises

Insider Attacks May Be Closer Than They Appear

Security policies and employee education are just two of the many ways that organizations can mitigate the threat of insider attacks.

The post Insider Attacks May Be Closer Than They Appear appeared first on Security Intelligence.

Continue reading Insider Attacks May Be Closer Than They Appear

Telnet: An Attacker’s Gateway to the IoT

Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.

The post Telnet: An Attacker’s Gateway to the IoT appeared first on Security Intelligence.

Continue reading Telnet: An Attacker’s Gateway to the IoT

Footprinting and Brute-Force Attacks Remain Prevalent

With so much attention focused on APTs and mutating malware, it’s easy to overlook brute-force attacks — which can still be successful.

The post Footprinting and Brute-Force Attacks Remain Prevalent appeared first on Security Intelligence.

Continue reading Footprinting and Brute-Force Attacks Remain Prevalent

Understanding EdgeHTML’s Attack Surface and Exploit Mitigations

EdgeHTML’s large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security.

The post Understanding EdgeHTML’s Attack Surface and Exploit Mitigations appeared first on Security Intelligence.

Continue reading Understanding EdgeHTML’s Attack Surface and Exploit Mitigations

Time Is Money: GozNym Launches Redirection Attacks in Poland

The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe.

The post Time Is Money: GozNym Launches Redirection Attacks in Poland appeared first on Security Intelligence.

Continue reading Time Is Money: GozNym Launches Redirection Attacks in Poland

Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities

The “IBM 2016 Cyber Security Intelligence Index” reveals IBM X-Force’s collected data on the threat landscape and attack types affecting all industries.

The post Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities appeared first on Security Intelligence.

Continue reading Reviewing the Cyber Threat Landscape with IBM X-Force: Serious Data Breaches, Major Attacks and New Vulnerabilities

Three Steps to Stop a Threat Before It Becomes an Incident

Threats today use devices and servers to gain access to data and the corporate environment. That’s why organizations need an incident response strategy.

The post Three Steps to Stop a Threat Before It Becomes an Incident appeared first on Security Intelligence.

Continue reading Three Steps to Stop a Threat Before It Becomes an Incident