Tag Archives: Thycotic

10Fold Security Never Sleeps- Fancy Bear, IoT Security

RUSSIA’S ‘FANCY BEAR’ HACKERS USED LEAKED NSA TOOL TO TARGET HOTEL GUESTS

“Russian espionage campaign used WiFi networks to spy on guests”

High profile customers have been targeted by Russia’s ‘Fancy Bear’malware, now with upgraded NSA hacking tool EternalBlue leaked out to the public on the internet. According to FireEye, the attacks are are hitting victims through minimal security hotel WiFi routers. The security firm has also stated that they suspect the group is working with Russian Intelligence agency GRU.

8 Critical IoT Security Technologies

“Necessary as prevalence grows”

Gartner has recently reported a prediction of nearly 20.4 billion connected IoT devices in just the next three years. That’s a rate of about 5.5 million new ‘Things’ per day! These metrics suggest that standard security practices will be insufficient in the very near future to counter the cyber threats that face IoT devices.

Report: SMBs Better Prepared For IoT Security Threats Than Large Enterprises

“SMB prioritize cyber threats more effectively”

IoT security firm Pwine Express has found that SMB’s are far more equipped to handle and identify threats to their workplace networks than larger competitive businesses. About 41% of IT security pro’s at large firms did not know what types of attacks had actually occurred on their devices last year, compared to 25% at SMB-based companies.

Hackers Say Humans Most Responsible for Security Breaches

“Hackers asked about methods and practices”

About 250 hackers at Black Hat 2017 were polled on the processes they use in hacking systems. Thycotic surveyed many of these individuals, finding that 51% identify as ‘white hats,’ 34% as ‘grey hats,’ and 15% as ‘black hats.’ Defenders can use this data to understand better how to safeguard their own systems.

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 192

GOOGLE FINDS AND BLOCKS SPYWARE LINKED TO CYBERARMS GROUP

“Android spyware blocked”

Google has discovered a new strain of Android malware, Lipizzan, that is able to surveil users text message, emails, calls, and much more. It has yet to appear on many devices, but experts say that it has all the telltale signs signs of a professional, targeted malware intending to attack users in wealthier nations.

Four-Star Kentucky Hotel: Data Breach Could Affect Guests

“Breach threatens customer information”

The Galt House hotel in Louisville, Kentucky has stated that an internal investigation revealed malware has been feeding off the payment processing systems. Any guests staying at the hotel between December 21, 2016 and April 11 are said to have possibly been affected.

Hackers are winning the war as companies worldwide fail on cyber security

“Too many firms are falling short in security”

A new report from Thycotic has shown that most companies worldwide are failing to accurately assess cyber security effectiveness. Survey criteria based on internationally accepted standards in ISO 27001 and best practices from industry experts provides a comprehensive way to define and measure IT security.

Gas Pump Skimmer Sends Card Data Via Text

“Can be detected with mobile devices”

Gas pump card skimming devices most often rely on Bluetooth connectivity to collect the stolen credit card data wirelessly. While often very effective, there is a very apparent downside. Bluetooth-based skimmers can be detected by any user with a bluetooth connected device, and investigators are starting to see these devices send stolen data via text message.

Cyber security not a priority for most sectors, study finds

“Little concern despite huge losses”

A recent study from Savoy Stewart has shown that although data breaches cost UK firms almost £30bn last year, cyber security is still not a big concern for industry sectors. Just 60% of directors or senior managers in finance and insurance consider it a high priority, with data taken from 1,500 firms.

Enjoy your read? Check out our other content here.