Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.
Disinformation campaigns with ties to Russia are continuing in an attempt to impede other governments' responses to the COVID-19 pandemic, complicating public health efforts to combat the disease, European officials warn.
Security technologies are evolving at an incredible pace to protect the dynamic business IT environment against an innovative and agile threat landscape. Unfortunately, the staple of security testing is still based on pen-testing which can take several weeks, even months from initial engagement to the final report. A...
Security threats are advancing - but is your cybersecurity plan?
Develop a successful analytics-driven security operations strategy to improve your security operations center (SOC). No security journey can be successful without the right technology, and it's important to continually increase the efficiency of your...
Bots touch virtually every part of our digital lives; they populate our news feed, tell the weather, provide stock market updates, and control search rankings. We use bots to book travel, access online customer support - even turn on the lights in our own homes.
It's no wonder that bots also now account for over half...
Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.
Threat intelligence consumers must realize the limitations faced by producers and formulate their own analysis and integration of third-party threat intelligence to incorporate other sources to fill in gaps where possible.
Download this report and learn how:
Malware-exclusive analysis may miss vital aspects of a...
The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
As sophisticated malware continues to evade existing detection tools and
processes, security teams must adopt new technologies and use them to deploy
new detection, hunt, and response capabilities.
Security teams looking to improve
threat intelligence, hunting, analysis, and rapid response capabilities...
Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.
Breach and Attack (BAS) simulation enables security practitioners to think and act like an adversary. BAS that connects the MITRE ATT&CK TTPs into a full APT kill chain enables them to effectively answer the question "How would an APT attack affect our organization?"
Download this eBook to learn more about:
How BAS...
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
The human element is a fundamental component of some of the newest cyberattacks that Sophos has been tracking, says the firm's principal research scientist, Chet Wisniewski, who advises organizations to adapt their security and protection plans accordingly.
Malware defenses today too often function as black boxes, producing binary results that make it difficult for security teams to prioritize, when what's needed is transparency, to enable defenders to better understand threats and prioritize their response, says Mario Vuksan, CEO of ReversingLabs.
Threat intelligence and visualization technology can play huge roles in improving vulnerability management. Mieng Lim of Digital Defense outlines the potential benefits.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.