Threat Round Up for Sept 22 – Sept 29

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 22 and September 29. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior….

Retirement Plans at Risk for Identity Theft

While many cyber threats have special names, e.g., ransomware, malware, cryptolocker, advanced persistent threats or GRIZZLY STEPPE (a malicious cyber attack that occurred late in 2016), your retirement plan’s data may be most at risk from common… By: Winstead PC

SonicWall makes biggest product roll-out in its history

Small and mid-sized businesses with limited IT staff are constantly on the look-out for products that will improve their ability to secure networks. Today SonicWall announced what it says is its largest product roll out in company history, vowing they build a wired and wireless network protection platform.

Taking care of security should be simple

Vulnerabilities, and the exploitation of them by threats, are still the root cause of most information security breaches today. However, too much focus is placed on high-profile exploits and malware, rather than these underlying root causes. Although not all breaches result from a vulnerability being exploited, most do.

French companies are still struggling to comply with latest data protection regulations

Nine in ten IT professionals in France are concerned with the security of the public cloud, and almost 20% do not deploy security for sensitive data stored outside the company’s infrastructure, according to a recent Bitdefender survey. Half of those surveyed admit cloud migration has significantly….,20170928,74013.html

New Research Shows Cyber Criminals Focused on Credential Theft

WatchGuard’s latest Internet Security Report reveals rise of Mimikatz, finds that 47 percent of all malware is new or zero day and offers comprehensive analysis of WannaCry28 September 2017 – Criminal tactics used to access user credentials are growing in prevalence and sophistication, according to….

The hapless user: secure from the inside out

Originally written by Nick Ismail on Information Age The current cyber threat landscape is increasingly complex, with cyber attacks becoming far more widespread, sophisticated and more straightforward to execute. In such an environment, organisations face a catch-22 situation: it’s becoming harder….

Obama Sanctions Russian Spy Agencies, Expels 35 Officers – BY: Bill Gertz Follow @BillGertz December 29, 2016 6:35 pm President Barack Obama hit back against Russia on Thursday for intelligence operations targeting the 2016 presidential election by imposing … Tweeted by @tomtomokie