Threat

Google launches Advanced Protection Program for Cyber Threat Probables

Google announced an Advanced Protection Program yesterday for probables vulnerable to cyber threats. Thus, those who opt for the program will require a physical USB security key to connect to a desktop computer before each log-in. And for users using mobile devices to access emails, a Bluetooth wireless device will be required to access. The […]

Smart Watches used by teenagers are vulnerable to Cyber Attacks

Consumer experts say that Smart Watches which are being used by Teenagers are at a risk of being cyber attacked due to some software related security flaws. They add that even high tech devices, costing $50 to $75 could be putting children in danger, especially those who are residing in the UK, Europe, and the […]

Kaspersky Lab signs Cyber Threat Intelligence agreement with Interpol

Kaspersky Lab has decided to raise its commitment towards fighting cybercrime and so has signed a Cyber Threat Intelligence agreement with INTERPOL. And according to sources reporting to our Cybersecurity Insiders, the agreement is designed as a legal framework to facilitate and develop cooperation between Kaspersky and Interpol by sharing data related to threat intelligence […]

Chinese hackers launch Cyber Attack on Australian Defense Contractor

A Chinese hacker or a hacking group named ‘Alf’ is said to have launched a cyber attack on an Australian Defense Contractor to access critical info about the nation’s defense secrets. Australian Federal Minister Dan Tehan has confirmed the news and said that the hacker/s had access to the network of the contractor for an […]

Job posts put on social media are vulnerable to Cyber Attacks

Next time when you post a job description or some details about your company on social media, please think twice before doing it. Because nowadays, these social media posts are being targeted by hackers and cybercriminals. United States Federal Bureau of Investigation(FBI) has issued a warning that hackers are scouring through the posts of employees […]

Exploring the Origins of Threat Hunting

This post was originally published here by Sqrrl Team. Threat hunting is one of the fastest-growing information security practices today. But what really defines threat hunting and how did the practice start? Recently, Sqrrl partnered with Richard Bejtlich from TaoSecurity to bring together a panel discussion comprised of the original General Electric CIRT incident handler […]

Kaspersky Security Software of Russia to be banned in the United States

Use of Kaspersky Security Software in government agencies of United States will now on be banned as per a new law formulated by House Science Committee. And according to the details available to our Cybersecurity Insiders, usage of the said security software has already been restricted in 22 US government agencies which include General Services […]

Threat Hunting for HTTP User Agents

This post was originally published here by Chris Sanders. An attacker will use the minimal amount of effort required to compromise your network. That means when it’s possible to reuse applications, tools, and protocols…. they’ll do it! This is one reason why attackers often use HTTP to facilitate communication to and from infected hosts. In […]

Threat Hunting Through Email Headers

This post was originally published here by Hem Karlapalem. The art of Threat Hunting can be especially fun when dealing with isolated individual pieces of puzzle. This article brings out the importance of email header analysis and how it can help in a hunt trip. Email header analysis is one of the oldest techniques employed […]

Insider Threats are increasing due to BYOD trend!

A recently conducted ‘Insider Threat’ survey by DTex confirms that BYOD explosion is helping threat landscape increase in organizations across the United States. The security vendor also confirmed in its report that nearly half or 48% of the 400 IT pros participating in the survey have confirmed that detecting and mitigating insider threats is becoming […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!