News

Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.

0 Comments
Three U.S. presidents have issued directives over the past 21 years on critical infrastructure protection of the natural and man-made resources the U.S. depends on to function, as well as the systems needed for their delivery and protection. Because all critical assets are not controlled by the federal government, President Bill Clinton in 1998 first laid
0 Comments
In early May, hackers infiltrated the Baltimore, Md., computer network. The ransomware attack ended normal business operations, interrupted critical city services, cost the city millions and inconvenienced hundreds of thousands of residents. Baltimore joined the list of other cities that have fallen victim to serious ransomware threats that affect business and commerce. While ransomware attacks
0 Comments
Cyber threat intelligence has become a critical tool for organizations trying to defend their networks. A 2019 survey from the cybersecurity-focused SANS Institute found that 72% of survey respondents are either consuming or producing cyber threat intelligence (CTI). Only 8% say they don’t use it and have no plans to start. Yet how well organizations
0 Comments
Although there is some debate over the value of certain security certification programs, most of them can deliver… more significant benefits to professionals than the traditional self-study options. A certification, for instance, covers topics that are broader than purely the interest of the student, which requires the student to learn more than just the minimum
0 Comments
Britain’s Information Commissioner’s Office (ICO) today hit British Airways with a record fine of £183 million for failing to protect the personal information of around half a million of its customers during last year’s security breach. British Airways, who describes itself as “The World’s Favorite Airline,” disclosed a breach last year that exposed personal details
0 Comments
An unknown hacker yesterday successfully managed to hack into the official GitHub account of Canonical, the company behind the Ubuntu Linux project and created 11 new empty repositories. It appears that the cyberattack was, fortunately, just a “loud” defacement attempt rather than a “silent” sophisticated supply-chain attack that could have been abused to distribute modified
0 Comments
While security is an essential factor in any organization’s network operations, it can also be a complicated and confusing topic. To get started, begin with network security terms and phrases. The following glossary includes some common network security terms — including firewall and VPN — as well as newer terms and technologies, such as software-defined
0 Comments
Chinese authorities are secretly installing surveillance apps on smartphones of foreigners at border crossings in the Xinjiang region who are entering from neighboring Kyrgyzstan, an international investigation revealed. Xinjiang (XUAR) is an autonomous territory and home to many Muslim ethnic minority groups where China is known to be conducting massive surveillance operations, especially on the
0 Comments
Although the terms security threat, security event and security incident are related, in the world of cybersecurity these information security threats have different meanings. A security threat is a malicious act that aims to corrupt or steal data or disrupt an organization’s systems or the entire organization. A security event refers to an occurrence during
0 Comments
Taiwanese networking equipment manufacturer D-Link has agreed to implement a “comprehensive software security program” in order to settle a Federal Trade Commission (FTC) lawsuit alleging that the company didn’t take adequate steps to protect its consumers from hackers. Your wireless router is the first line of defense against potential threats on the Internet. However, sadly,
0 Comments
President Donald Trump has announced plans to loosen the terms of the trade ban between U.S. companies and Huawei, but the details are unclear as to how national security concerns will be addressed. At the recent G20 Summit in Osaka, Japan, President Trump said he and Chinese President Xi Jinping planned to restart trade talks
0 Comments
Organizations are struggling to keep up with the growing number of cybersecurity threats and the inherent complexities involved with maintaining a proper security posture. In many cases, enterprise security teams offload those duties to a trusted third-party service provider that can plan and handle security incident responses. According to a recent MarketsandMarkets report, many organizations
0 Comments
In general, it’s advisable for every organization to adopt a cybersecurity framework. The exact framework will depend on the business itself. In some cases, frameworks are necessary to comply with government or commercial regulatory standards that must be met. In other situations, framework adoption is completely voluntary. That said, even small businesses can gain peace
0 Comments
Many different types of firewalls share a basic gatekeeping function preventing unauthorized traffic from flowing… into or out of a private network, while allowing sanctioned traffic to continue uninterrupted. A firewall might sit between an enterprise network and the internet, for example, allowing internal users to access information from external networks with varying levels of
0 Comments
Cybersecurity researchers are warning about an ongoing Android malware campaign that has been active since 2016 and was first publicly reported in August 2018. Dubbed “ViceLeaker” by researchers at Kaspersky, the campaign has recently been found targeting Israeli citizens and some other middle eastern countries with a powerful surveillance malware designed to steal almost all
0 Comments
CERT, CSIRT, CIRT and SOC are terms you’ll hear in the realm of incident response. In a nutshell, the first three are often used synonymously to describe teams focused on incident response, while the last typically has a broader cybersecurity and security scope. Still, terminology can be important. Inconsistent terminology can cause misunderstandings of what
0 Comments
A popular gaming platform used by hundreds of millions of people worldwide has been found vulnerable to multiple security flaws that could have allowed remote hackers to takeover players’ accounts and steal sensitive data. The vulnerabilities in question reside in the “Origin” digital distribution platform developed by Electronic Arts (EA)—the world’s second-largest gaming company with
0 Comments
Cybersecurity researchers are warning about possible active exploitation of an unpatched security vulnerability in Apple’s macOS Gatekeeper security feature details and PoC for which were publicly disclosed late last month. Joshua Long, a security researcher at Intego, last week discovered four samples of new macOS malware on VirusTotal that leverage the GateKeeper bypass vulnerability to
0 Comments
Rising tensions between Iran and the U.S. have put enterprises at increased risk of cyberthreats. Christopher Krebs, director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), issued a statement over the weekend saying his agency was aware of a recent increase in Iranian cyberattacks from “regime actors and proxies” against both