Cyber Risk & Security
5.3K views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Dan Solomon
Scoop.it!

Critical Flaw in Apache Struts2 Lets Hackers Take Over Web Servers

Critical Flaw in Apache Struts2 Lets Hackers Take Over Web Servers | Cyber Risk & Security | Scoop.it
A Critical remote code execution vulnerability (CVE-2017-9805) has been discovered in Apache Struts web application framework
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Locky ransomware: Why this menace keeps coming back | ZDNet

Locky ransomware: Why this menace keeps coming back | ZDNet | Cyber Risk & Security | Scoop.it
It's one of the most successful forms of ransomware. Here's why the Locky ransomware keeps disappearing - only to reappear again.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Deconstructing Petya: how it spreads and how to fight back

Deconstructing Petya: how it spreads and how to fight back | Cyber Risk & Security | Scoop.it
It's been 24 hours since the outbreak first hit: here's what we know now about how Petya behaves
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Ransomware, the weapon wielded in cyber attacks - ET CIO

Ransomware, the weapon wielded in cyber attacks - ET CIO | Cyber Risk & Security | Scoop.it
Ransomware demands which hit a clutch of multinationals Tuesday are the latest in a wave of international cyber attacks in recent months
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon

Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon | Cyber Risk & Security | Scoop.it
Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Researcher Finds Kill Switch for new variant of WannaCry Ransomware

Researcher Finds Kill Switch for new variant of WannaCry Ransomware | Cyber Risk & Security | Scoop.it
Internet users worldwide are now familiar with the WannaCry or WanaCrypt0r ransomware attack and how cybercriminals used it to infect cyber infrastructure
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide

Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide | Cyber Risk & Security | Scoop.it
Experts from Bitdefender have uncovered the Netrepser Cyber espionage campaign that compromised more than 500 Government organizations worldwide.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera | Cyber Risk & Security | Scoop.it
Chinese security researcher Xudong Zheng demonstrates a Punycode Phishing Page using Homograph attack, which is almost Impossible to Detect On Chrome, Firefox and Opera
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

An Unprecedented Heist Hijacked a Brazilian Bank’s Entire Online Operation | WIRED

An Unprecedented Heist Hijacked a Brazilian Bank’s Entire Online Operation | WIRED | Cyber Risk & Security | Scoop.it
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

McAfee report reveals five challenges to cyber threat intelligence

McAfee report reveals five challenges to cyber threat intelligence | Cyber Risk & Security | Scoop.it
McAfee Labs’ latest report details the challenges facing threat intelligence sharing efforts and reveals growing trends in malware, ransomware, mobile malware and other threats.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Raising cyber security grasp is biggest challenge, says GCHQ chief

Raising cyber security grasp is biggest challenge, says GCHQ chief | Cyber Risk & Security | Scoop.it
Everyone has a role to play in cyber security, and the NCSC has the right pedigree to co-ordinate and balance the efforts of government, industry and academia, says GCHQ director Robert Hannigan.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Skype users hit by ransomware through in-app malicious ads

Skype users hit by ransomware through in-app malicious ads | Cyber Risk & Security | Scoop.it
Several users have complained about "fake Flash" ads, which if triggered, can lead to a ransomware attack.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Honeypot catches social engineering scams on social media

Honeypot catches social engineering scams on social media | Cyber Risk & Security | Scoop.it
Research company investigates 40,000 fake accounts to find impersonator tactics. 
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

DATA STORY: The millions lost by companies every year due to data breaches

DATA STORY: The millions lost by companies every year due to data breaches | Cyber Risk & Security | Scoop.it
Indian companies experienced the most number of breaches (average 33,167) during the year, almost double that of Australia
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Your brand is under siege

Your brand is under siege | Cyber Risk & Security | Scoop.it
The stark reality that the half-life of the breach continues to wreak havoc on the reputation of a company, draining brand value, customer perception, and inevitably profits. Collateral damage associated with cyber-attacks in 2017 will surpass the loss of customer data. The new face of cybercrime directly impacts a corporations reputation. Major breaches over the past decade have forced consensus that compliance with security standards does not equate to cybersecurity. Security awareness within the C-suite is required to mitigate cyber-risk. Responsibility to protect brands from cyber threats extend beyond CISOs. CMOs must prepare to defend their brand and company with dynamic tools and strategies to combat almost inevitable cybersecurity events.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Defining Security: The Difference Between Safety & Privacy

Defining Security: The Difference Between Safety & Privacy | Cyber Risk & Security | Scoop.it
Words matter, especially if you are making a case for new security measures, state-of-the-art technology or personnel.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Petwrap Ransomware massive attack – 24 hours later

Petwrap Ransomware massive attack – 24 hours later | Cyber Risk & Security | Scoop.it
A new strain of the infamous Petya ransomware dubbed Petwrap, is infecting computers in different states, mostly in Ukraine and Russia.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Security Alert: Uiwix Ransomware Is Here and It Can Be Worse Than Wannacry - Heimdal Security Blog

Security Alert: Uiwix Ransomware Is Here and It Can Be Worse Than Wannacry - Heimdal Security Blog | Cyber Risk & Security | Scoop.it
Uiwix ransomware is an even bigger threat than WannaCry, lacks killswitch and is likely to be one of many developments.
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Uiwix, yet another ransomware like WannaCry - only more dangerous

Uiwix, yet another ransomware like WannaCry - only more dangerous | Cyber Risk & Security | Scoop.it
In the last few days, the internet has been caught off guard with numerous updates being posted regarding the sprawling effects of the WannaCry ransomware
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Android devices can be fatally hacked by malicious Wi-Fi networks

Android devices can be fatally hacked by malicious Wi-Fi networks | Cyber Risk & Security | Scoop.it
Broadcom chips allow rogue Wi-Fi signals to execute code of attacker's choosing.
more...
No comment yet.
Rescooped by Dan Solomon from Geo & OS Intelligence
Scoop.it!

Improving Intelligence Studies as an Academic Discipline

Improving Intelligence Studies as an Academic Discipline | Cyber Risk & Security | Scoop.it
As the field of intelligence studies develops as an academic complement to the practice of national security intelligence, it is providing a base of knowledge for intelligence practitioners to interpret their past, understand their present, and forecast their future. It also provides the basis for broader understanding of intelligence as a function of government for other government and security officials, academicians, and the general public. In recent years there has been significant growth in the numbers and kinds of intelligence-related educational and training opportunities, with the knowledge taught in these courses and programs derived from the body of intelligence studies scholarship. The question posed here is: to what extent is this body of knowledge sufficient as a basis for the development of intelligence studies as an academic discipline?

Via Fernando Gil
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

The data centre as a time machine

The data centre as a time machine | Cyber Risk & Security | Scoop.it

The data centre as a time machine – how lessons from the past are helping us protect our future
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Why ‘data hoarding’ increases cyber security risk - Information Age

Why ‘data hoarding’ increases cyber security risk - Information Age | Cyber Risk & Security | Scoop.it
What are the risks of holding onto data without properly curating it and deciding what content is valuable?
more...
No comment yet.
Scooped by Dan Solomon
Scoop.it!

Windows zero-day affects 600,000 older servers, but likely won't be patched

Windows zero-day affects 600,000 older servers, but likely won't be patched | Cyber Risk & Security | Scoop.it
The security vulnerability is publicly exploitable, but Microsoft only fixes "currently supported versions."
more...
No comment yet.