March 10, 2020 Durham, North Carolina Shuts Down Phone System Following Ryuk Ransomware Attack 2 min read - The city of Durham, North Carolina temporarily disabled its phone system last weekend after suffering a Ryuk ransomware attack.
March 9, 2020 Weekly Security News Roundup: Ransomware Attackers Targeting Victims’ Cloud Backups 3 min read - Security researchers investigated how ransomware actors are targeting victims' cloud-based backups to maximize their profits. Read on to learn what else happened last week in security news.
CISO March 6, 2020 9 Strategies for Retaining Women in Cybersecurity and STEM in 2020 4 min read - We still have a long way to go to improve gender diversity in the security workforce. Here are nine tips for recruiting and retaining women in cybersecurity and STEM.
CISO March 4, 2020 How Human Security Investments Created a Global Culture of Accountability at ADP 4 min read - Human security is what matters during a cybersecurity crisis, where skills and muscle memory can make the difference in make-or-break moments.
March 3, 2020 Researchers Estimate Krøøk Vulnerability Could Put a Billion Wi-Fi Devices at Risk 2 min read - Researchers estimate more than a billion devices may be vulnerable to a cyberthreat dubbed Krøøk that can intercept and decrypt Wi-Fi traffic using WPA2 connections.
Threat Intelligence March 3, 2020 State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends 6 min read - Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.
Intelligence & Analytics February 27, 2020 A Guide to Easy and Effective Threat Modeling 6 min read - Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker's point of view. Learn more about building a threat model.
February 25, 2020 Raccoon Malware Capable of Stealing Information From Nearly 60 Applications 2 min read - Security researchers discovered the Raccoon malware family is capable of stealing information from approximately 60 applications.
February 25, 2020 Phishing Schemes Use Google Forms to Steal Office 365 Credentials 2 min read - Phishing campaigns aimed at stealing Microsoft user credentials are using Google Forms to dupe potential victims, security researchers warn.
Government February 25, 2020 A Road Map for Better Government Cybersecurity From North Dakota 5 min read - Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, "Every student, every school, cyber-educated."