Skip to main content

UK's Nuclear Deterrence Theory for Cyberspace

The Often-Overlooked Element of a Hack: Endpoints | Iranian Hackers Target Personnel in US, Israel
  Your SecurityWeek Briefing Webcasts
RSS Feed
03.31.21


Wednesday, March 31, 2021

Event

The Threat of Extortion is Real

DON'T NEGOTIATE. MITIGATE.

DDoS extortion attacks are on the rise, continuing to grow faster than most can keep up with. NETSCOUT's Arbor Smart DDoS protection assures a swift mitigation, so you never have to negotiate with these cyber extortionists.

Learn More



The Often-Overlooked Element of a Hack: Endpoints
Understanding not just the tail end of the cyber-attack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today's threats.
Read the Full Column
by Torsten George




AI is Security's Best Defense
Using Machine Learning (ML) with AI means that security tools can be trained to work better with data and the ML system will be able to make recommendations for improvements.
Read the Full Column
by Laurence Pitt



The Growing Need for a New Security Platform
In today's highly dynamic environments, integration needs to go beyond just the security elements of a platform.
Read the Full Column
by John Maddison





5 Things IT Should Ask Managed Security Providers
While it'd be impossible to dig into all of the requests I've received over the years, here are some of the types of requests we've received that may make sense for you to ask your own managed security provider.
Read the Full Column
by Tim Bandos



The Case for Taking Down Dark Web Sites
Taking down dark web sites may cause headache for both the bad guys and the good guys, but it can also have a profound positive effect on the fight against cybercrime.
Read the Full Column
by Idan Aharoni




The Cusp of a Virtual Analyst Revolution
Once live stomping around vendor-packed expo halls at security conferences returns, it is highly probable that "Virtual Analyst" will play a starring role in buzzword bingo.
Read the Full Column
by Gunter Ollmann




The VC View: Hot Trends in Security After the Pandemic
"What's hot right now in security?" is one of the most common questions I hear from CISOs, vendors and VCs alike.
Read the Full Column
by William Lin




How Your Security Approach Can Drive Resiliency in the Industrial Economy
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Read the Full Column
by Yaniv Vardi



Event

The Threat of Extortion is Real

DON'T NEGOTIATE. MITIGATE.

DDoS extortion attacks are on the rise, continuing to grow faster than most can keep up with. NETSCOUT's Arbor Smart DDoS protection assures a swift mitigation, so you never have to negotiate with these cyber extortionists.

Learn More




See All Recent Articles at SecurityWeek.Com

Analyzing the UK's Nuclear Deterrence Theory for Cyberspace: Britain indicates that it could launch Trident missiles in response to a serious cyber-attack against the country. Should this be taken seriously? What are the real world consequences? Read The Feature

Dutch Data Protection Authority Fines Booking.com Over Incident Notification: The Dutch Data Protection Authority has fined Booking.com half a million dollars for not reporting a 2018 data breach within the required 72 hours. Read More

Living Security Raises $14 Million for Its Human Risk Management Platform: Living Security has raised $14 million in a Series B funding round, which the company says it will use to expand and further develop its human risk management platform. Read More

Iranian Hackers Target Medical Personnel in US, Israel: Iran-linked TA453 attempted to phish senior medical professionals in the United States and Israel, who specialized in various research. Read More

Critical Infrastructure Protection Firm OPSWAT Secures $125 Million Growth Funding: Critical infrastructure protection firm OPSWAT has secured $125 million growth funding from Brighton Park Capital. Read More

Chinese Researchers Earn Another $20,000 for Chrome Sandbox Escape: Researchers from Qihoo 360 have earned another $20,000 for a Chrome sandbox escape vulnerability, bringing the total earned by the Chinese company's employees in the past year to over $150,000. Read More

Cyan Forensics Raises $6.9 Million to Combat Pedophiles and Terrorists: Scotland-based start-up Cyan Forensics has secured approximately $6.9 million to grow its technology business that helps identify and block illegal content such as child pornography and terrorist material. Read More

Cybercriminals Publish Data Allegedly Stolen From Shell, Multiple Universities: Files from Shell and various universities were likely stolen in a cyber-attack involving Accellion's FTA file transfer service. Read More

Child Unknowingly Tweets From US Nuclear Command's Account: Some jokingly said the cryptic tweet, ";l;;gmlxzssaw," was a US nuclear launch code. Others, that the Pentagon had been hacked. Read More

Microsoft: Firmware Attacks Outpacing Security Investments: A study of 1,000 enterprise security decision makers found that businesses aren't paying close enough attention to malicious activity below the operating system. Read More

Biden Extends Executive Order on Cyberattack Sanctions: President Joe Biden has extended an executive order issued by Barack Obama in 2015 regarding sanctions for malicious cyber activities. Read More

Akamai Sees Largest DDoS Extortion Attack Known to Date: Over the past month, Akamai has mitigated three of the six biggest volumetric DDoS attacks the company has met to date. Read More

What's Behind the Surge in Cybersecurity Unicorns?: Several industry professionals have shared thoughts on why we are seeing a surge in cybersecurity unicorns. Some believe the trend is a result of speculative strategies while others believe it reflects the growing importance of cybersecurity. Read More

Linux Kernel Vulnerabilities Can Be Exploited to Bypass Spectre Mitigations: A researcher has discovered two vulnerabilities in the Linux kernel that can be exploited to bypass mitigations for Spectre attacks. Read More

Vulnerability in 'netmask' npm Package Affects 280,000 Projects: A serious security bug in the 'netmask' npm package leads to misinterpretation of IP addresses. Read More

CompuCom Cyber-Attack Costs Could Reach $28M: CompuCom shares information on the cost of recovering from a cybersecurity incident, including loss of revenue and major service disruptions. Read More

More Ransomware Gangs Targeting Vulnerable Exchange Servers: The Black Kingdom/Pydomer ransomware operators join other threat actors targeting unpatched Microsoft Exchange servers. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2021 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...