Report: Organizations remain vulnerable to increasing insider threats

Credit to Author: Jovi Umawing| Date: Thu, 05 Dec 2019 16:00:00 +0000

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Categories:

Tags:

(Read more…)

The post Report: Organizations remain vulnerable to increasing insider threats appeared first on Malwarebytes Labs.

Read more

FEC: Campaigns Can Use Discounted Cybersecurity Services

Credit to Author: BrianKrebs| Date: Thu, 11 Jul 2019 20:41:21 +0000

The U.S. Federal Election Commission (FEC) said today companies can offer discounted cybersecurity services to political campaigns without running afoul of existing campaign finance laws, provided they already do the same for other non-political entities. The decision comes amid much jostling on Capitol Hill over election security at the state level, and fresh warnings from U.S. intelligence agencies about impending cyber attacks targeting candidates in the lead up to the 2020 election.

Read more

Fake DHS email – “Give us $350 in the next 24 hours”

Credit to Author: Christopher Boyd| Date: Fri, 08 Sep 2017 15:00:14 +0000

Every now and then, we see the 419 “Hitman deployed to kill you” missive doing the rounds. This time, we have a fake DHS notification telling you to pay a $350 fee within 24 hours – or else.

Categories:

Tags:

(Read more…)

The post Fake DHS email – “Give us $350 in the next 24 hours” appeared first on Malwarebytes Labs.

Read more

New Bill Seeks Basic IoT Security Standards

Credit to Author: BrianKrebs| Date: Tue, 01 Aug 2017 19:32:47 +0000

Lawmakers in the U.S. Senate today introduced a bill that would set baseline security standards for the government’s purchase and use of a broad range of Internet-connected devices, including computers, routers and security cameras. The legislation, which also seeks to remedy some widely-perceived shortcomings in existing cybercrime law, was developed in direct response to a series of massive cyber attacks in 2016 that were fueled for the most part by poorly-secured “Internet of Things” (IoT) devices.

Read more