Current Activity

How to Secure Critical Infrastructure When Patching Isn’t Possible

Cyberattacks are on the rise and threatening our digital life and our most intimate information — but also our operational realities. Read More

The importance of risk reduction for robotic process automation

Less than half of organizations have a privileged access management strategy in place for digital transformation technologies, like RPA, according to a CyberArk report.

The report provides practical recommendations from information security executives based on their first-hand experiences. They share key recommendations for how organizations can securely adopt RPA while mitigating potential risks, including: Read More

Increased monetization means more ransomware attacks

Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28% lower than the 78-day median observed in the previous year, according to FireEye.

Read More

Cyber Criminals Choosing APIs as Choice of Target to Attack Financial Institutions

Akamai Technologies has published the Akamai 2020 State of Internet / Security: Hostile Takeover Attempts report which revealed that from May 2019 till this day there is a shift in mode of attack from cyber criminals who started attacking APIs. In this report, the application programming interfaces, or APIs, that criminal targeted with credential stuffing attacks using REST and SOAP to access resources. This includes account summary pages with personal information, account records, and balances, as well as other tools or services within the platform. This was done in an effort to bypass all security controls. Read More

Attackers Target US Critical Infrastructure, CISA Issues Warning

Attackers targeted a gas compression plant with a spear-phishing emails to infect its network with ransomware.

The victim organization lacked robust segmentation between its IT and OT networks, allowing the attacker to pervade both.

The Department of Homeland Security (DHS) revealed that a ransomware attack on a US natural gas facility forced it to shut down operations for two days. Read More

US Senator Proposes New Data Protection Bill

The senator argues that the FTC Act does not address data protection challenges.

The law, if passed, would apply to any company with revenues over $25 million, or which manages the personal data of 50,000 or more people.

A US senator for New York announced draft legislation known as the ‘Data Protection Act’ to establish an independent data protection agency in the country. Read More