Cybersecurity & Espionage Articles
Original article at SCMagazine.com
To prevent these types of attacks, researchers recommend users be careful about the devices they connect to their computers, invest in encrypted USB devices from trusted brands, and make sure all data stored on the USB is also encrypted. In addition, users should have a security solution that checks all removable media for malware before it’s connected to the network as even trusted brands can be compromised through their supply chain. Businesses should go a step further and be sure to educate employees on safe USB practices and manage the use of USB on their network.
0 Comments
Original article at SkyHighNetworks.com
As the case plays out, we may or may not find out if Anthony Levandowski did steal proprietary information owned by Waymo. But this story offers a wake up call to companies on threats represented by insiders acting maliciously or inadvertently, at a time when cloud services are being used to exchange large volumes of sensitive data. According to Skyhigh’s Cloud Adoption and Risk Report, 18.1% of files uploaded by enterprise users to cloud-based file sharing and collaboration services contained sensitive data such as passwords, credit cards, social security numbers, health information, and confidential company IP such as product schematics or source code. Original post at FifthDomain.com
Sixty percent of hackers in the Thycotic survey said that social engineering was the fastest way to compromise users Original post at FCW.com
Over the past two years, a mysterious group calling itself "Intrusion Truth" has been releasing blog posts providing detailed information about Chinese-linked hackings groups. Their latest findings purport to show that two Chinese nationals and a contracting firm associated with an Advanced Persistent Threat group named Stone Panda are actively working for or with the Chinese government. In particular, the group provides photo evidence, satellite imagery and even Uber receipts that show two individuals associated with Stone Panda regularly traveling to a Ministry of State Security compound in Tianjin, China. They also provided separate evidence purporting to show how the group uses contracting firms to recruit hackers on behalf of the Chinese government |
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |