Here’s an overview of some of last week’s most interesting news and articles:
Leading domain name registrars suffered data breach
Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach.
Exploring the benefits of cybersecurity certification
In this interview, Tony Vizza, Director of Cybersecurity Advocacy APAC, (ISC)2, talks about the benefits of earning a cybersecurity certification, the most common misconceptions related to getting certified, the cybersecurity skills shortage, and much more.
Office 365 users targeted with fake voicemail alerts in suspected whaling campaign
Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found.
Apple releases fresh security updates for macOS, iOS
Apple has staggered security updates for many of its products, including the recently unveiled macOS Catalina.
PHP RCE flaw actively exploited to pop NGINX servers
A recently patched vulnerability (CVE-2019-11043) in PHP is being actively exploited by attackers to compromise NGINX web servers, threat intelligence firm Bad Packets has confirmed.
DevOps firewall: How pre-configuring your cloud deployment can ensure compliance
Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable to compliance and security issues. In this case, federal prosecutors charged a Seattle woman with stealing more than 100 million credit applications. As the details of the attack became public, the Capital One AWS environment came under scrutiny.
UniCredit says personal data of 3 million customers was compromised
Italian global banking and financial services giant UniCredit has announced that its cybersecurity team has identified “a data incident” that resulted in the compromise of personal data of 3 million of its customers.
Is the enterprise on the brink of a global web supply chain attack?
Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a real security threat – and one which the enterprise is vastly unprepared for.
Keeping up with the evolving ransomware security landscape
Cybersecurity must always be a fluid practice, one that is designed to meet novel threats and constantly upgraded and evaluated.
The nastiest ransomware, phishing and botnets of 2019
Webroot released its annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the most attack payloads to phishing attacks that wreaked the most havoc, it’s clear that cyber threats across the board are becoming more advanced and difficult to detect.
Want to overcome patching challenges once and for all? Automation is the key
The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent Beaming report, UK businesses faced cyberattacks every 50 seconds in the second quarter of 2019.
Examining security process maturity in 400 organizations
There’s an overall failure in maturity of security processes of over 400 organizations in industries ranging from e-commerce, retail and payment processor to telecommunications, petroleum and more, a SecureTrust report reveals.
Whitepaper: Building a Threat Intelligence Programme
ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact of those programmes.
G Suite admins get context-aware access controls, rule-based automated actions and alerts
Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules to automate actions and alerts through the security center.
Integrating security into IoT projects is not easy, but it’s increasingly urgent
With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to ABI Research.
Investigations are an unfortunate fact of life for most corporations
Corporate investigations, which can be triggered by any number of events, have become a fact of life for most companies, according to a survey from H5.
New protocol extends Wi-Fi range, can be used with existing hardware
A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young University computer engineering professor.
Majority of 2019 breaches were the result of unapplied security patches
Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data silos and poor organizational coordination, ServiceNow study finds.
Whitepaper: Busting the myth that more threat intel feeds lead to better security
It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to confusion, disorganization, and inaccurate threat reports. Instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your organization’s security operations.
Cybercriminals using custom phishing tools to target the world’s largest tech brands
Cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, with 42.63% of domains observed targeting Microsoft, PayPal, DHL, and Dropbox, according to Akamai.
New infosec products of the week: November 1, 2019
A rundown of infosec products released last week.