Abnormal Security researchers discovered attackers were impersonating the Texas Department of State Health Services to send fake Request for Quotations (RFQs) to vendors in a type of multi-layered email attack.
Threat Intelligence (TI) analysts are one of the key groups of experts in Security Operation Centers (SOCs) and play an important role in making sure IT systems are functioning properly. They are in charge of identifying attack vectors that most threaten the organization, define their company’s defensive strategy and help other team members make informed decisions about potential threats. However, handling such a vast amount of responsibilities, data and managing repetitive tasks is the exact type of work that makes TI employees prone to burnout.
The health, safety and security challenges that business owners and managers have faced in 2020 have made one thing very clear: COVID-19 has acted as a catalyst for a flurry of investments designed to spur the reopening of retail stores, commercial office space and public venues. Such investments don’t need to be singularly focused on opening the doors, but instead can be part of a more sustainable solution that can offer long-term value and flexibility that can be applied to a variety of situations.
This is where smart security cameras connected to the IoT can help.
Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, the investigation allowed Check Point to connect the different campaigns and attribute them to the same attackers.
The National Retail Federation (NRF) will be hosting the NRF PROTECT ALL ACCESS, a free, four-day online event taking place September 22 – 25, 2020, featuring dynamic speakers, a virtual expo highlighting 75 retail security collaborators and networking opportunities catered to the retail security community. With 16 sessions spanning topics from talent and culture to theft and fraud to cyber and digital crime, attendees will have access to the latest information for the loss prevention, asset protection and cyber risk communities.
Currently, cryptographic algorithms are based on factorization. RSA and Elliptic Curve Cryptography (ECC) algorithms are difficult to solve using traditional binary computers because the computer is forced to work through an incomprehensibly long list of probabilities. A traditional binary computer solves that mathematical problem slowly, whereas a quantum computer with an efficient algorithm can solve that problem much more quickly. Maybe a million times faster!
The Duesseldorf University Clinic in Germany was hit by a ransomware attack last week that forced staffers to direct emergency patients elsewhere. The cyberattack “crippled the entire IT network of the hospital." As a result, a woman seeking emergency treatment for a life-threatening condition died after she had to be taken to another city for treatment, according to several outlets.
The Common Vulnerabilities and Exposures (CVE®) Program announced it is granting authority to the Cybersecurity and Infrastructure Security Agency (CISA) for managing the assignment of CVE Identifiers (IDs) for the CVE Program.