Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Botnet and Exploit Activity Goes Up as Cybercriminals Shift Focus, Report Shows

Aug 31 by Silviu Stahie
  • Botnet activity is on the rise in Q2 2020
  • Threat actors no longer interested in COVID-10 themes
  • ZeroAccess botnet responsible for much of the current activity

Threat actors have changed their attack vectors and other techniques and procedures (TTP), shifting from COVID-19 themes to more timely subjects like the Black Lives Matter movement and the upcoming US election, according to a new report.

Read More

Why Hosted Security Matters?

Aug 31 by Bogdan Carlescu
  • Hosted Security solutions are quick to deploy, operationally friendly, flexible and more effective
  • To choose the best hosted security platform, organizations should look at the ability to detect threats as well as how the solution deals with the human element
  • GravityZone Ultra won PC Mag’s Editors’ Choice award as the Best Hosted Endpoint Protection and Security Software for 2020
Read More

Even Prior to the Pandemic and Work-From-Home, Many Organizations Were Bolstering Cyber Security

Aug 27 by Bob Violino

The coronavirus pandemic has created a number of new cyber security threats and vulnerabilities, not the least of which is the need to support a massive shift to remote work. The worldwide health crisis has presented hackers and other cyber criminals with opportunities to take advantage of the upheaval in business.

Read More

ISPs Have to Protect Smart Homes to Protect Their Business

Aug 26 by Silviu Stahie

  • Smart homes are already here
  • Cybercriminals look for IoT vulnerabilities
  • Smart home security is a job for ISPs

More and more people have smart homes these days, and the IoT industry's expansion will likely rapidly increase the number of smart homes. It's a situation that should make everyone happy, but the current state of IoT security should have ISPs a lot more worried.

Read More

APT Mercenary Groups Pose Real Threat to Companies But Detecting Tactics and Techniques is Within Reach

Aug 26 by Liviu Arsene
  • Bitdefender identified a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service
  • The targeted company is engaged in architectural projects with billion-dollar luxury real-estate developers in New York, London, Australia and Oman
  • The Bitdefender technology stacks detect the used payloads as well as the malicious behavior
Read More

Bitdefender’s MDR – Lessons Learned in Uniform

Aug 25 by Daniel Clayton
  • Forward thinking security operations are steered by threat intelligence and built on data-driven analytics to hunt
  • ‘Active defense’ measures were developed within the military and have proven effective against even the most advanced and persistent of adversaries
  • Security is no longer just a technology problem, but a people problem too
Read More

Law Enforcement Agencies Warn of Vishing Attacks Targeting Employees

Aug 25 by Silviu Stahie

The FBI and Cybersecurity and the US Infrastructure Security Agency (CISA) issued an advisory regarding a voice phishing, or vishing, campaign directly targeting employees working from home.

Read More

BEC Operators Switch Focus on Finance Department Employees (over Executives), New Data Shows

Aug 24 by Filip Truta

The shift to remote work amid the COVID-19 pandemic makes employees more susceptible to BEC attacks and gives threat actors the opportunity to apply tactics likely to be successful given these working conditions, new research shows.

Read More

Nearly 40 Percent of UK Businesses Laid Off Staff Due to Security Policy Breaches Since Work-from-Home Shift

Aug 21 by Alina Bizga

The sudden shift to remote work has revealed new risks that threaten the stability and integrity of company infrastructure. From the beginning of the pandemic, it was clear that the new remote workforce faltered in maintaining good cyber hygiene and security policies.

Read More

Healthcare Data Breach Costs Rise

Aug 20 by George V. Hulme

Getting to understand the costs of data breaches is always tricky. Deciding what variables need to be part of the equation is always tricky. And so is determining the actual costs of such nebulous concepts as "customer churn." But whether it's possible to peg the precise cost of a data breach, there is plenty to learn from trying and looking at trends. One lesson that is clear year after year is that it's regulated industries that pay more for data breaches. This year healthcare is the regulated market that spent the most due to a data breach.

Read More

Four in Ten Organizations Suffered a Breach Due to Unpatched Vulnerabilities in the Past Two Years

Aug 19 by Filip Truta

The most dangerous security flaws continue to expose valuable assets as a result of chasing down vulnerabilities that pose minimal risks, according to 60% of IT security professionals. Four in ten admitted to suffering a breach because of unpatched flaws in their systems.

Read More

Average Ransom Payment Rises 60 Percent in Three Months, Study Finds

Aug 19 by Silviu Stahie

Companies continue to pay ransomware demands, and the latest data reveals a 60 percent increase in the average ransom payment in just three months.

Read More

New Report Examines the Pandemic’s Impact on Cyber Security

Aug 18 by Bob Violino

The coronavirus pandemic has presented a “once-in-a-lifetime opportunity for hackers and online scammers,” according to a new report from the Information Systems Security Association (ISSA), a community of international cyber security professionals, and independent industry analyst firm Enterprise Strategy Group (ESG).

Read More

Are You Using the Full Potential of Your SOC? 5 Trends That Will Reshape Modern Security Operations

Aug 17 by Andrei Pisau

From darkweb networks to state-sponsored groups, cybercrime has long outgrown its traditional image. Now, the myth of the lone wolf who carries out complex operations alone has all but disappeared.

Read More

Small Business Owners in the US Hit with Phishing Campaign Impersonating SBA Officials

Aug 17 by Silviu Stahie

An unknown cyber actor is spoofing the Small Business Administration (SBA) COVID-19 loan relief website, trying to trick people into entering their credentials, according to the Cybersecurity and Infrastructure Security Agency (CISA.)

Read More

Most CIOs Consider Adopting Emerging Security Technologies in 2020

Aug 14 by Silviu Stahie

CIOs are switching focus from the security of endpoints to the protection of identity access, which is a critical aspect of cybersecurity now that so many people work from remote locations.

Read More

ISPs Should Offer Network Parental Controls and Customers Should Demand It

Aug 13 by Silviu Stahie

Parental Control is something that parents will eventually come to consider when their children start to interact with technology and the online world. Not only can ISPs help with that, but ISPs should consider offering extra features to its customers to stay ahead of the competition.

Read More

Cyber Security a Big Concern of Local and County Government Technology Leaders

Aug 13 by Bob Violino

Cyber security and data loss prevention dominate the daily concerns of local and county government technology leaders, according to a survey report by the Computing Technology Industry Association (CompTIA) and the Public Technology Institute (PTI).

Read More

Most BEC Attacks Come from a Small Pool of Malicious Accounts, Study Finds

Aug 12 by Silviu Stahie

Business email compromise (BEC) attacks tend to arrive from similar sources, affecting different companies. Barracuda's latest report reveals that 45 percent of all BEC attacks detected since April 1 come from malicious accounts. 

Read More

12 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level

Aug 11 by Ericka Chickowski

Offensive security measures like penetration testing can help enterprises discover the common vulnerabilities and exploitable weaknesses that could put an them at risk of costly cybersecurity incidents. By pitting white hat hackers against an organization's deployed infrastructure, organizations can gain a better understanding of the flaws they should fix first—namely the ones most likely to be targeted by an everyday criminal.

Read More

Cloud Breaches to Become Faster and Bigger, Research Suggests

Aug 10 by Alina Bizga

Cloud breaches continue to riddle organizations’ threat landscape, with misconfigured cloud storage services and poor security practices leading to more than 200 breaches in the past two years, according to the latest Accurics report.

Read More

Use of High-Risk Apps and Websites Increased 161% Amid Work-from-Home Shift, New Research Shows

Aug 07 by Alina Bizga

The August 2020 edition of the Netskope Cloud and Threat Report highlights a 161% increase in visits to high-risk apps and sites brought on by a 64% remote workforce.

Read More

70% of Large Businesses Believe Work-from-Home Makes Them More Vulnerable to Cyberattacks

Aug 06 by Alina Bizga

Nearly three quarters of large businesses are convinced that the shift to remote work makes them more vulnerable to cyberattacks, a new AT&T survey has revealed.

Read More

18 Percent of Businesses Would Consider Sabotaging a Rival Online Business, New Research Shows

Aug 05 by Alina Bizga

According to a report published by Reboot Digital, one in five business owners would consider sabotaging an online competitor if they knew they could get away with it.

Read More

5 Tools Out of Black Hat to Gain Better IoT Visibility

Aug 05 by Ericka Chickowski

Even in the COVID era, August can't officially start for the cybersecurity community without Black Hat USA researchers offering up some juicy exploit announcements and dropping useful security tools onto GitHub. This year's event is fully virtual, which means no rockin' Vegas parties—but still plenty of interesting research lined up.

Read More

Security Automation Cuts Breach Costs in Half, New Research Shows

Aug 04 by Filip Truta

A growing divide in breach costs separates businesses that implement advanced security technologies from laggards, according to a new report.

Read More

Murphy’s Law and Essential Lesson Enterprises Need To Learn From The Twitter Attack

Aug 04 by George V. Hulme

On the evening of July 15, 2020, Twitter users watched one of the most high-profile attacks to occur in years unfold in real-time as imposters sent a series of fraudulent Tweets from the accounts of about 130 celebrities, politicians, and tech industry luminaries. Tweets that promised to provide $2,000 for every $1,000 sent to a Bitcoin address. There are a number of important lesson here for all enterprises, but one that especially stands out.

Read More

Bitdefender, Ranked #1 In AV-Test Results Halfway Into 2020

Aug 03 by Andra Cazacu

Winner of its 6th AV-Test Award In 6 Years, Bitdefender Maintains High Detection Accuracy During Pandemic.

Read More

Open-Source Security Is Essential To Enterprise Security

Aug 03 by George V. Hulme

Nearly a decade ago, Marc Andreessen wrote in the Wall Street Journal how software was “eating the world.” And in this age of digital transformation, that’s most certainly true. Software is now everywhere and consists of everything. Today, enterprises build more customer-facing and software-driven services than ever before. Software bots are automating manual processes, and software plays an increasingly central role in every machine and device we use.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets