PRINT
PRINT
SEND MAIL
SEND MAIL

Category: THIS WEEK’S GURUS

Cyber ThreatsTHIS WEEK’S GURUS

Making the Cloud a Safe Space

The cloud has brought about many benefits for organisations and adoption is understandably increasing. Gartner earlier this year projected that the worldwide public cloud services market would grow 21.4 percent in 2018 whilst Forrester has found that global cloud services revenues totaled £112.5 billion in 2017, and is predicted to grow up to £137.2 billion by the end of 2018. With this huge growth in cloud adoption, effective security is paramount. Recent cyber-attacks have highlighted that organisations across all industries and of all sizes…

Cyber ThreatsTHIS WEEK’S GURUS

The Need for Effective Third-Party Risk Management in Financial Services

In the last few years we have seen the frequency and severity of third-party cyberattacks against global financial institutions continue to increase. One of the biggest reported attacks against financial organisations occurred in early 2016, when $81 million was taken from accounts at Bangladesh Bank. Unknown hackers used SWIFT credentials of Bangladesh Central Bank employees to send more than three dozen fraudulent money transfer requests to the Federal Reserve Bank of New York asking the bank to transfer millions of the Bangladesh Bank’s funds…

Cyber ThreatsTHIS WEEK’S GURUS

Iron Rain: What Defines a Cyber Insurgency?

“A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and standard bodies are collapsing. History does repeat itself. One should study the evolution of insurgencies to better grasp the nature of cybersecurity in 2018.   In the Red Rising Trilogy, Pierce…

Cyber ThreatsTHIS WEEK’S GURUS

Cybercriminals Targeting Popular Job Recruitment Portals About More Than PII

Job listing and recruitment portals have been an attraction for cybercriminals given the volume of personal information uploaded to those sites in the form of resumes, cover letters and other data specific to individuals.   But there’s more to criminals’ interest than just stealing personally identifiable information. Security shortcomings on some of these sites can expose job applicants, business account holders and the recruiters themselves to a number of different threats. For example, when threat actors gain access to legitimate business accounts at recruiting…

Cyber ThreatsTHIS WEEK’S GURUS

The real-life consequences of cryptocurrency hoarding

Ever since the Bitcoin boom, cryptocurrency has become a global phenomenon, and it’s here to stay. Unlike fiat currencies, cryptocurrency isn’t regulated by a central bank or government. Consequently, anyone with a digital wallet can process payments without a middleman involved. It is for this exact reason that the payment system holds major appeal for cyber criminals: the absence of traceable bank details means cryptocurrency is an ideal means of collecting ransomware victims’ money.   A year after WannaCry, ransomware remains one of the…

Cyber ThreatsTHIS WEEK’S GURUS

Combatting daily security threats within the healthcare sector

By Anthony Perridge, VP International, ThreatQuotient Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on 12th May, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents. According to the NAO’s published report earlier this year, WannaCry affected at least 81 of the 236 trusts across England, either directly or indirectly. In addition to preventing access to computers,…

Cyber ThreatsTHIS WEEK’S GURUS

Understanding The Cyber Threat Landscape

In early July IBM Security and the Ponemon Institute released a new report titled “Cost of a Data Breach Study” In this study it was reported that  that the global average cost of a data breach and the average cost for lost or stolen information both increased. The former is up 6.4 percent to £2.94 million while the latter increased by 4.8 percent year over year to $112.57. This shows that cyber attack on enterprises continue to rise.  In particular over the last two…

Cyber ThreatsTHIS WEEK’S GURUS

Cybersecurity Is an Ever-Changing Battlefield

Just like in combat operations, cyber operations are changing on a second-to-second basis. To effectively combat an insurgency, organisations must drive to an intelligence-driven operations centre. In this ever-changing battlefield, internal and external threat intel are now crucially important to combating attackers. Even as a steady drumbeat of headlines keeps the world’s attention focused on cybercrimes, such as ransomware and cryptojacking, in the dark corners of the internet, attackers are busy refining their craft. Cyber attackers are honing their ability to remain undetected inside…

Cyber ThreatsTHIS WEEK’S GURUS

Malware Loaders Continue to Evolve, Proliferate

Loaders, for the most part, have one job: grab malicious executables or payloads from an attacker-controlled server. But that doesn’t mean there isn’t more happening under the hood of some, such as a user-friendly UI, self-healing capabilities, or the equivalent of a retail shop where a botmaster can sell his bots to potential clients. Loaders are essentially basic remote access Trojans that give an attacker the ability to remotely interact with and control a compromised computer, or bot. While traditionally lightweight (smaller than 50…