Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Microsoft Data Leaks and the Importance of Open-Source Intelligence

E-mail Print PDF
Microsoft Data Leaks and the Importance of Open-Source Intelligence

Author: Vaidotas Šedys, Head of Risk Management at Oxylabs

Interconnected digital technology advances at a rapid pace, and so do the tactics and strategies employed by malicious individuals, criminal groups, and even nation-states. The World Economic Forum predicts global cybercrime will reach $10.5 trillion by 2025, forcing businesses and governments to look for next-generation solutions against emerging digital threats.

Unfortunately, deliberate criminal activity is only part of the challenge in this data-driven era. Costly leaks of sensitive data might happen due to simple human errors — in September, Microsoft’s data was leaked two times, not only disclosing the company’s plans for the next-gen Xbox but also exposing private employee data. As we already know, at least one of these events happened due to an accidentally misconfigured URL link.

October is Cybersecurity Awareness Month, so it is a perfect time to ask how businesses could improve their cyber resilience. Raising public awareness, educating employees, and implementing standard security measures (such as data encryption, multi-factor authentication, or routing traffic through VPNs) are good recommendations for increased organizational security. However, they are hardly enough today if one does not employ open-source intelligence.

What is open-source intelligence?

Open-source intelligence, or OSINT, defines the efforts of collecting, analyzing, and utilizing information from publicly available web sources, including forums, libraries, open databases, and even the dark web. Though OSINT can be used to gather commercially important business information and perform market analysis, at Oxylabs, we usually use it in the context of cyber threat intelligence.

Read more...

Trend Micro: Cybercriminal Underground Lacks Trust!

E-mail Print PDF
Trend Micro: Cybercriminal Underground Lacks Trust!

According to Trend Micro research, trust has eroded among criminal interactions, leading to a switch to e-commerce platforms and communications via Discord, both to increase user anonymisation.

"This report highlights the threat intelligence we collect and analyze from global cybercriminal networks that enables us to alert, prepare and protect our corporate customers and partners," the company says. "This research helps us inform businesses early about emerging threats, such as Deepfake ransomware, AI bots, Access-as-a-Service and highly targeted SIM-swapping. A layered, risk-based response is vital for mitigating the risk posed by these and other increasingly popular threats."

The report claims law enforcement efforts are leaving an impact on the cybercrime underground. Global police entities have taken down a number of forums, and the remaining forums are currently experiencing persistent DDoS attacks and log-in problems, impacting their usefulness. Meanwhile the loss of trust has lead to the creation of DarkNet Trust, a website created to verify vendors and increase user anonymity. Other underground markets are launching new security measures, including direct buyer-to-vendor payments, multi-signatures for cryptocurrency transactions, encrypted messaging and a ban on JavaScript.

Read more...

European Supercomputers Hacked to Mine Bitcoin!

E-mail Print PDF
European Supercomputers Hacked to Mine Bitcoin!

Supercomputers all across Europe have been infected with cryptocurrency mining malware, leading to a number of shutdowns during the crucial period where such machines should be dedicated to research on the coronavirus (aka Covid-19) pandemic.

Security incidents come from all over the continent, including the UK, Germany, Switzerland and, at least rumours insist, Spain. According to a ZDNet report, the first supercomputer to be affected by the malware is the ARCHER system at the University of Edinburgh. The organisation shut down the ARCHER system following a "security exploitation on the ARCHER login nodes," before resetting SSH passwords to prevent further intrusion.

Read more...

Thunderbolt Flaw Leads to Hacking!

E-mail Print PDF
Thunderbolt Flaw Leads to Hacking!

Dutch researcher Björn Ruytenberg reveals the common Thunderbolt port has a serious flaw-- "Thunderspy," a means for hackers to bypass the login screen of a sleeping or locked PC in order to gain full access of the data within.

The flaw resides in essentially all Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, and allows for what the security industry dubs an "evil maid attack." This involves the potential attacker being alone with the PC (for example, in a hotel room), and simply requires opening the case of the target laptop with a screwdriver. Once the machine is open, the attacker simply needs to momentarily attach a device, reprogram the firmware and reattach the backplate for full access to the laptop. The operation, Ruytenberg says, takes all of 5 minutes.

Read more...

Acronis Ships Cyber Protect

E-mail Print PDF
Acronis Ships Cyber Protect

Acronis announces the availability of Cyber Protect, a solution integrating backup, disaster recovery, next-gen anti-malware, cybersecurity and endpoint management tools in a single service.

As Acronis puts it, the lack of integration between vendor solutions complicates employee training, productivity and usability while increasing support and licensing costs. Cyber Protects gives MSPs a single solution to deliver backup, anti-malware, security and endpoint management capabilities such as vulnerability assessments, URL filtering and patch management. Such integrated capabilities allow MSPs to proactively avoid threats, minimise downtime, ensure fast and easy recoveries and automate the configuration of client protection, all at a lower cost.

Read more...

Page 1 of 67

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »