News

Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.

0 Comments
In the wake of GandCrab shutting down and master decryption keys being released, a new ransomware threat is emerging. The GandCrab ransomware had been one of the more dangerous threats since its first appearance in early 2018, but the group behind the ransomware as a service (RaaS) announced its retirement last month. On Monday, the
0 Comments
Getting started can be the most tedious part of any task, especially when the task is as daunting and perplexing as network security. But the task is manageable, as long as one understands the topic’s basics. To ensure a network security strategy operates optimally and efficiently, IT pros should start with the basics, such as
0 Comments
Zoom faced privacy concerns after the disclosure of a vulnerability that could allow threat actors to use the video conferencing software to spy on users. The Zoom vulnerability, originally reported to only affect the Mac version of the software, has been found to partially affect Windows and Linux as well. Jonathan Leitschuh, software engineer at
0 Comments
The CryptoLocker virus turns your virtual servers — the life of your data center — into encrypted blocks of data waiting for an unlock code. Although no fix is ever completely effective, there are methods to more easily and safely recover your virtual data. CryptoLocker viruses are a form of malware that encrypts your data
0 Comments
It’s been called a tech pipeline: a recruitment path for graduates of computer science or national security, both traditionally male-dominated disciplines, into the cybersecurity workforce. This pipeline is one reason why the cybersecurity industry is so homogenous in terms of diverse backgrounds. When hiring managers choose from a pool of candidates who share similar backgrounds,
0 Comments
Three U.S. presidents have issued directives over the past 21 years on critical infrastructure protection of the natural and man-made resources the U.S. depends on to function, as well as the systems needed for their delivery and protection. Because all critical assets are not controlled by the federal government, President Bill Clinton in 1998 first laid
0 Comments
In early May, hackers infiltrated the Baltimore, Md., computer network. The ransomware attack ended normal business operations, interrupted critical city services, cost the city millions and inconvenienced hundreds of thousands of residents. Baltimore joined the list of other cities that have fallen victim to serious ransomware threats that affect business and commerce. While ransomware attacks
0 Comments
Cyber threat intelligence has become a critical tool for organizations trying to defend their networks. A 2019 survey from the cybersecurity-focused SANS Institute found that 72% of survey respondents are either consuming or producing cyber threat intelligence (CTI). Only 8% say they don’t use it and have no plans to start. Yet how well organizations
0 Comments
Although there is some debate over the value of certain security certification programs, most of them can deliver… more significant benefits to professionals than the traditional self-study options. A certification, for instance, covers topics that are broader than purely the interest of the student, which requires the student to learn more than just the minimum
0 Comments
Britain’s Information Commissioner’s Office (ICO) today hit British Airways with a record fine of £183 million for failing to protect the personal information of around half a million of its customers during last year’s security breach. British Airways, who describes itself as “The World’s Favorite Airline,” disclosed a breach last year that exposed personal details
0 Comments
An unknown hacker yesterday successfully managed to hack into the official GitHub account of Canonical, the company behind the Ubuntu Linux project and created 11 new empty repositories. It appears that the cyberattack was, fortunately, just a “loud” defacement attempt rather than a “silent” sophisticated supply-chain attack that could have been abused to distribute modified
0 Comments
While security is an essential factor in any organization’s network operations, it can also be a complicated and confusing topic. To get started, begin with network security terms and phrases. The following glossary includes some common network security terms — including firewall and VPN — as well as newer terms and technologies, such as software-defined
0 Comments
Chinese authorities are secretly installing surveillance apps on smartphones of foreigners at border crossings in the Xinjiang region who are entering from neighboring Kyrgyzstan, an international investigation revealed. Xinjiang (XUAR) is an autonomous territory and home to many Muslim ethnic minority groups where China is known to be conducting massive surveillance operations, especially on the
0 Comments
Although the terms security threat, security event and security incident are related, in the world of cybersecurity these information security threats have different meanings. A security threat is a malicious act that aims to corrupt or steal data or disrupt an organization’s systems or the entire organization. A security event refers to an occurrence during
0 Comments
Taiwanese networking equipment manufacturer D-Link has agreed to implement a “comprehensive software security program” in order to settle a Federal Trade Commission (FTC) lawsuit alleging that the company didn’t take adequate steps to protect its consumers from hackers. Your wireless router is the first line of defense against potential threats on the Internet. However, sadly,
0 Comments
President Donald Trump has announced plans to loosen the terms of the trade ban between U.S. companies and Huawei, but the details are unclear as to how national security concerns will be addressed. At the recent G20 Summit in Osaka, Japan, President Trump said he and Chinese President Xi Jinping planned to restart trade talks
0 Comments
Organizations are struggling to keep up with the growing number of cybersecurity threats and the inherent complexities involved with maintaining a proper security posture. In many cases, enterprise security teams offload those duties to a trusted third-party service provider that can plan and handle security incident responses. According to a recent MarketsandMarkets report, many organizations