News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed

Insider threats, the CIA’s bad security policies, and malicious Chrome extensions were the topics of discussion during this week’s news wrap podcast. Continue reading News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed

ABCs of UEBA: Q is for Qualitative Analysis

The most difficult task of a machine learning based User and Entity Behavior Analytics (UEBA)…
The post ABCs of UEBA: Q is for Qualitative Analysis appeared first on Gurucul.
The post ABCs of UEBA: Q is for Qualitative Analysis appeared first on Secu… Continue reading ABCs of UEBA: Q is for Qualitative Analysis

Copied master key forces South African bank to replace 12 million cards

Fraudsters stole more than $3.2 million from the banking division of South Africa’s post office, after – in a catastrophic breach of security – employees printed out the bank’s master key. According to South African media report… Continue reading Copied master key forces South African bank to replace 12 million cards

South Africa’s PostBank is Replacing 12 Million Bank Cards After Major Security Breach

South Africa’s Postbank has suffered a major data breach, forcing the financial institution to replace 12 million bankcards after rogue employees stole its 36-digit master key. Data breaches have become a day-to-day struggle for businesses and or… Continue reading South Africa’s PostBank is Replacing 12 Million Bank Cards After Major Security Breach

Employees abandoning security when working remotely

48% of employees are less likely to follow safe data practices when working from home, a report from Tessian reveals. The global shift to remote working poses new security challenges for businesses and traditional security solutions are failing to curb… Continue reading Employees abandoning security when working remotely

External attacks on cloud accounts grew 630 percent from January to April

The McAfee report uncovers a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic, along with an increase in cyber attacks targeting the cloud… Continue reading External attacks on cloud accounts grew 630 percent from January to April

Why Everyone Is Needed to Make Cybersecurity Matter

When it comes to cybersecurity, everyone needs to be part of the solution if we ever hope to slow the rising tide of cyberattacks Nearly 4.5 billion people—about 60% of the world’s population—were actively online last year. Every one of these individua… Continue reading Why Everyone Is Needed to Make Cybersecurity Matter

Top 3 Security Holes to Address for Companies with WFH Employees

The widespread decision corporations have made to allow employees to WFH is a great thing – both for business and for humanity during the COVID-19 crisis. However, it must be done safely. If companies heed this advice, they can ensure that their … Continue reading Top 3 Security Holes to Address for Companies with WFH Employees

Levandowski Admits to Stealing Waymo’s IP

The prosecution of former Google engineer Anthony Levandowski ended March 20 when he agreed to plead guilty to one count of theft and attempted theft of trade secrets from Alphabet’s Waymo after pilfering Waymo’s intellectual property (IP). In e… Continue reading Levandowski Admits to Stealing Waymo’s IP