Advertise

Advertise

Form-based phishing attacks impersonate branded file-sharing, productivity sites

Researchers are warning users to be on the lookout for form-based phishing attacks whereby scammers abuse or imitate branded file-sharing, content-sharing and productivity websites in order to trick users into giving up their credentials or their account access. In a blog post on Thursday, Barracuda Networks says that from January through April 2020, these form-based…

How to Protect Your Applications From Sophisticated Bot Attacks

Today’s sophisticated bots reside on compromised residential devices, enabling  fraudsters to blend in with legitimate user traffic across the web. These sophisticated  bots can mimic human keystrokes, mouse movement, and browser history. They look and  act like humans when they visit websites and commit fraud and abuse of applications  including account takeover attacks, automated account…

COVID-19: You won’t get a pass on cybersecurity

The COVID-19 outbreak provides ripe opportunities for criminal actors to exploit fear, uncertainty, and companies ill prepared to to secure remote workers, driven to home offices by travel restrictions and social-distancing. The first threat comes in the form of misinformation and weaponized websites and documents. Websites and apps with outbreak maps are attracting unwitting victims…

Applying the 80/20 Rule to Cloud Security

The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work smarter, not harder.   How can we apply Pareto’s principle to cloud security? Within your security activities, what is the key 20 percent that will produce 80 percent of your results when it comes to reducing risk?  One effort that absolutely falls into the…

facebook

Hackers ran ad scams after hijacking account at Facebook data partner LiveRamp

Hackers took over the account of an employee at LiveRamp – one of Facebook’s significant data partners and a marketer extraordinaire that helps advertisers target ads – to access its Business Manager account and launch a campaign to run scam ads, tapping other user accounts to pay for them and deceiving customers. “The instance to…

The Dearth of Skilled Cybersecurity Personnel

The cybersecurity industry is currently experiencing a shortage of trained staff in epidemic proportions.   While complex and sophisticated malware is generated in increasing numbers daily, the skilled personnel needed to prevent or remediate the ever-increasing malevolent code is simply not to be found. In 2018-2019, 53 percent of organizations reported a “problematic shortage” of cybersecurity…

Beating the Bullet: Moving Beyond EDR

How deep learning technology acts pre-emptively to stop attackers before they cause serious damage A core evaluation of artificial intelligence (AI) in cyber threat landscape indicates that AI is on the verge of overhauling the attack domain. Organizations need to be ready for the next wave of attacks because the reality on the ground will…

Managed Detection and Response:

Separating the players from the pretenders Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) addresses the fact that threat actors have increased their ability to circumvent traditional detection measures. As early as 2011, MDR emerged (uncategorized at the time) with a single guiding principal: Acknowledge that a breach…

Next post in Security News