All Systems Security articles – Page 5
-
NewsUS water companies given cybersecurity advice after attempt to poison city’s supply
Water companies across the US are being urged to be on heightened alert and monitor their computer systems for any unusual activity.
-
BlogBridging the gap between business goals and security requirements
Involving as many people as possible in the security process strengthens practices, thereby closing the gap between business users and security teams, argues Alex Armson
-
NewsSingtel caught in Accellion software hack
Singaporean telecommunications company Singtel has launched an investigation to establish the extent of a cyberattack on the Accellion File Transfer Appliance (FTA) system it uses.
-
FeatureEgregor Ransomware: what is it and why is it worrying the authorities?
A new ransomware group called Egregor has caught the attention of the Federal Bureau of Investigation, prompting it to issue a warning last month. GRC World Forums explains more about what it is and how it is being used in “double-extortion” attempts.
-
NewsScores of data breaches at UK’s merger watchdog
The anti-trust regulator in the UK was hit by 150 personal data breaches in the past two years, five more than in the previous two-year period.
-
NewsHacker’s attempt to poison US city’s water supply thwarted
The US secret service and other law enforcement agencies are investigating after a hacker reportedly tried to add a dangerous amount of a toxic chemical to Oldsmar water system in Florida.
-
News
Attack on UK estate agency was Egregor ransomware, according to experts
A malware attack on a large UK estate agency was carried out by the Egregor ransomware group and appears to be case of ‘double extortion’, according to threat intelligence experts.
-
News‘World’s most dangerous botnet’ used to infiltrate millions of machines taken down in international operation
A malware botnet that was used by cybercriminals to infiltrate thousands of companies and millions of computers worldwide has been taken down in an international operation.
-
News4,000 files feared stolen in cyber attack on Scottish regulator
An environmental regulator in Scotland has confirmed that at least 4,000 files have been accessed and likely stolen by criminals in an ongoing cyberattack on its systems.
-
FeatureConnected vehicles and the rise of automotive cyber security
Vehicles are now entertainment, communications and productivity hubs, connected to both the internet and their surroundings – so automotive cyber security is increasingly essential, writes Alexander Moiseev
-
SponsoredData locality is a compliance control, not a security control
Data locality is increasingly seen as important, but is there confusion as to why it matters? Microsoft’s Mark Anderson explains what he believes to be the real reason for its importance
-
NewsUAE suffers “250% increase” in cyber attacks this year
Cyber attacks have risen sharply this year, according to Mohamed Al-Kuwaiti, Executive Director of the UAE’s National Electronic Security Authority, CNBC reported.
-
VideoData Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
-
VideoHow Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
-
NewsTrump fires CISA Director over statement on US election security
The Director of the Cybersecurity and Infrastructure Security Agency (CISA) was fired by Donald Trump yesterday because he authorised a statement saying that the election was “the most secure in American history.”
-
NewsTicketmaster fined £1.25m over personal data breach
Ticketmaster has been fined £1.25m for failing to keep the personal data of millions of customers secure.
-
WebinarMany Ways to Defeat Multi-Factor Authentication
Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t!
-
ReportIdentifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
NewsAirbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
NewsUber former security chief charged in connection with attempted data breach cover-up
The US Department of Justice has charged Joseph Sullivan, former chief security officer at Uber, with obstruction of justice following a data breach.









