Skip to main content

Analysis of More than 60,000 Breach Reports Over Three Years

UScellular Breach Allowed Hackers to Port Phone Numbers | Security Resolutions for 2021
  Your SecurityWeek Briefing Webcasts
RSS Feed
01.29.21


Friday, January 29, 2021

Event

Virtual Event - February 3rd
IoT Lockdown

IoT Lockdown is a fully immersive virtual event that will present innovative strategies and tools that security teams can use to mitigate the risk of IoT devices.

Register Today!



Unemployment Fraud - Preying on Those Most in Need
By implementing controls to prevent fraud and implementing fraud monitoring capabilities, state agencies can greatly reduce the amount of unemployment fraud that happens under their auspices.
Read the Full Column
by Joshua Goldfarb



Security Resolutions to Make in 2021
In 2021 we will see challenges and changes, but the moves forward will be positive and empower both users and the business to succeed securely.
Read the Full Column
by Laurence Pitt




In the Hacker's Crosshairs: Active Directory
Domain controllers, Active Directory, and servers are prime reconnaissance targets to hunt for additional privileged credentials and privileged access.
Read the Full Column
by Torsten George





In a Remote Work Era, a People-First Approach Keeps Threat Intelligence Teams on Track
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Read the Full Column
by AJ Nash



Beyond the Pandemic: Far-ranging and Lasting Change Ahead for Industrial Networks
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Read the Full Column
by Yaniv Vardi


Perseverance. Pushing Security Operations Forward in 2021
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Read the Full Column
by Marc Solomon



Integrating Fraud Data Into Your Workflow
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Read the Full Column
by Joshua Goldfarb





Getting SASE, Without the Hyperbole
In the world of information security, it's hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
Read the Full Column
by Laurence Pitt



Event

New Report: Cybersecurity Is a Boardroom Issue

Cybersecurity is now a business decision requiring informed decision making from the executive team and the board. ESG and BitSight surveyed organizations across the globe to learn more about this change and the questions being asked at a board-level.

[Read Report]




See All Recent Articles at SecurityWeek.Com

In Focus: Analysis of More than 60,000 Breach Reports Over Three Years: Analysis of 60,000 breaches over the last three years provides extensive data on where things are going wrong, and highlights trends on what is likely in the future. Read More

UScellular Breach Allowed Hackers to Port Customer Phone Numbers: Hackers tricked employees of UScellular into installing malware, used it to access CRM software, and accessed customer accounts. Read More

Tanium Announces $150 Million Funding Investment From Ontario Teachers': The security firm wants to scale operations to better serve the middle market. Read More

Elusive Lebanese Threat Actor Compromised Hundreds of Servers: Updated versions of Lebanese Cedar's Explosive RAT and Caterpillar web shell found on victim networks. Read More

Attacks on Individuals Fall as Cybercrime Shifts Tactics: Cybercriminals shifted away from stealing individual consumers' information in 2020 to focus on bigger, more profitable attacks on businesses. Read More

Encrypted Services Providers Concerned About EU Proposal for Encryption Backdoors: European encrypted services providers ProtonMail, Threema, Tresorit and Tutanota have urged the EU to rethink a resolution that would require the implementation of encryption backdoors. Read More

TPG Capital Acquires Majority Stake in PAM Solutions Provider Centrify: TPG will acquire a majority stake in Centrify from Thoma Bravo. Terms of the deal were not disclosed. Read More

Many WordPress Sites Affected by Vulnerabilities in 'Popup Builder' Plugin: Impacting most AJAX methods, the Popup Builder plugin flaws can be abused to send newsletters, delete subscribers, and perform other site actions. Read More

Apple CEO Escalates Battle With Facebook Over Online Privacy: Apple CEO Tim Cook fired off a series of thinly veiled shots at Facebook and other social media companies, escalating an online privacy battle pitting the iPhone maker against digital services that depend on tracking people to help sell ads. Read More

Apple Adds 'BlastDoor' to Secure iPhones From Zero-Click Attacks: Apple has quietly fitted several anti-exploit mitigations into its flagship mobile operating system in what appears to be a specific response to zero-click iMessage attacks observed in the wild. Read More

For Microsoft, Security is a $10 Billion Business: NEWS ANALYSIS: Microsoft generated a whopping $10 billion in security-related revenues in just the last 12 months and is now positioned as an enterprise cybersecurity powerhouse. Read More

Many European CISOs Shift Focus to Mobile Security: Survey: A survey commissioned by Ivanti shows that a majority of CISOs in Europe have shifted the focus of their cybersecurity strategy to mobile devices due to increasing remote work. Read More

Law Enforcement Planning Emotet Cleanup Operation Following Botnet Takedown: An update served by law enforcement will trigger the cleanup operation. Read More

Apple to Crack Down on Tracking iPhone Users in Early Spring: Apple says it will roll out a new privacy control in the spring to prevent iPhone apps from secretly shadowing people. Read More

Stack Overflow Shares Technical Details on 2019 Hack: Stack Overflow has shared technical details on how its systems were hacked in 2019, and it turns out that the attacker often viewed questions posted on Stack Overflow. Read More

NetWalker Ransomware's Sites Seized by Law Enforcement: Law enforcement authorities in the U.S. and Europe have seized the dark web sites associated with the NetWalker ransomware operations and also charged a Canadian national in relation to the malware. Read More

Ten-Year-Old Sudo Vulnerability Gives Root Privileges on Host: Qualys researchers discover a major security hole in the well-known Sudo utility. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2020 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...