Breaking News

Firewall concept art

A new standard in Firewall performance

Jan 20 – Purveyor of cyber security solutions Check Point Software has recently extended the Check Point Quantum portfolio with Quantum Lightspeed Firewalls; the biggest network security revolution of the past decade. The emergence of distributed SaaS applications and the need to provide stronger security support for remote workers mean that the modern data center is rapidly evolving...
Abstract, futuristic binary code

REvil ransomware attackers arrested…

Jan 18 -- On Friday, Russian authorities announced their interference with the REvil ransomware gang's activities. Fourteen of the groups members were arrested, and the groups overall operations could not continue. The takedown occurred at the behest of the US government, which aimed to prevent repeats of past, large-scale cyber security issues caused by REvil. According to Russia's Federal...
In 2022, will Web3 take off

A new iteration of the internet? Web3

Jan 12-- Is Web3 is more than “Silicon Valley’s latest identity crisis,” as NBC news describes it? This article delves into the definition of Web3, why it matters, what's ahead, all with an eye towards helping you shape your perspectives on the subject. Definition of Web3 Web3 is intended as a new configuration for the world wide web. The...
Digital abstract concept

C-levels as cyber attack targets…

Jan 10 –Sixty percent of IT leaders are worried about the prospect of targeted cyber threats reaching the c-suite. A growing list of mobile security threats, dangerous public wi-fi hotspots, and a constant fast-paced modus operandi contribute to the reasons for concern. C-level executives are highly visible, travel often, and often need to make split-second decisions. With 100...
Zepto ransomware concept art

Network security in the new normal…

Jan 4— In the past year, cyber criminals have been hard at work trying to break into networks. Many have zeroed in on the vulnerabilities associated with remote work, attempting to hack clouds, edge technologies, IoT devices, and more. In 2022, organizations will need to pay close attention to emerging network security threats and enhance security accordingly...
Digital transformation concept

Cyber security: What the future holds…

Dec 30— As we look ahead to 2022, we observe a series of trends that will reshape the cyber security landscape. Cyber security leadership teams can expect new challenges, as indicated within a recent report produced by Check Point Software. Report findings Experts expect that supply chain attacks will continue to proliferate. In turn, this may lead to...
Phishing concept

Holiday cyber security breaches

Dec. 28-- Over the Christmas holiday weekend, the digital photography site known as Shutterstock reported a cyber security incident to the public. According to experts, the attack took place several weeks before, and a combination of law enforcement and cyber security teams are working to address the issue. Holiday havoc Christmas is often considered a peak time for hackers...
Log4j vulnerabilities

Continued concern over Log4j vulnerabilities

Dec 20-- New Log4j vulnerabilities leave organizations with greater uncertainty than before. An alternative attack vector appears to rely on a simple Javascript WebSocket connection, which can trigger remote code-execution (RCE) on servers locally. The catalyst is a drive-by compromise. An exploit could impact services operating as localhost in internal systems not exposed to the network, according to...
Protecting your organization from dynamic threats

Log4j: Protecting your organization from dynamic threats

EXECUTIVE SUMMARY: “Is the internet on fire?” asked one anonymous cyber security expert, upon hearing of the Log4j vulnerability. In the ensuing days, many shared the sentiment. In case the Log4j vulnerability breezed by you, this article contains an overview of what the vulnerability is, why it matters and how to safeguard your organization, as to avoid a holiday...
Software concept, dark web

American officials warn of holiday hacks

Dec 17-- American officials warn that hackers have a habit of striking during holiday breaks. As stated in a White House letter, decision-makers must implement new layers of security now in order to reduce holiday cyber risk. Agencies also note that recent events highlight the fragility of digital infrastructure, and on this account, organizations must take more precautions...
abstract cybersecurity and fire concept

Security meltdown: Log4j vulnerability

Dec 13- A new security vulnerability affects digital systems across the internet, and across the globe. Hackers have begun to exploit the bug, and software developers are racing to fix it. Researchers state that the bug could lead to serious repercussions worldwide. The vulnerability The issues has to do with Log4j, a ubiquitous, if obscure, open-source Apache logging framework...
Coronavirus concept

Omicron variant sparks new phishing campaigns

Dec 10--The Omicron strain of the coronavirus provides hackers with further cover as they launch new phishing campaigns. Researchers have identified a fresh phishing threat that leverages concern over the spread of the Omicron variant to steal credentials, which are then used to gain illicit access into systems. Thus far, hackers have managed to use this trick in order...
Abstract cyber concept

Spyware found on US State Department phones

Dec 3-- Apple Inc recently notified a small group of US State Department employees about their phones as subjects of surveillance operations conducted by unknown perpetrators. For its part, Apple recently filed a lawsuit against the makers of the surveillance tool in use, which was designed to compromise the security of its phones, among others. At least nine US...
Cyber security abstract concept

Fighting misinformation and media manipulation

Dec 1—On Friday of last week, American news executives joined an off-the-record Zoom meeting designed to help everyone develop stronger foundational practices for fighting misinformation and media manipulation. The Zoom meetings were facilitated by Harvard academics at the Harvard University’s Shorenstein Center on the Media, Politics and Public Policy. Professionals presented case studies and raised important issues facing...
Malware families

Google Ads used for stealing cryptocurrency

Nov. 10— After observing the disappearance of hundreds of thousands of dollars’ worth of cryptocurrency from victims, researchers are warning of Google Ads scams used to steal crypto wallets. Google Ads scams In recent weeks, scammers have placed Google Ads at the top of Google Search, which mimicked popular crypto wallets and platforms; from Phantom App to Pancake Swap....
Digital clock interface, risk management concept

New cyber security order, Biden administration

Nov. 3– In the US, the Biden administration has ordered federal agencies to fix more than 200 cyber security flaws. Some of these flaws were first identified more than a decade ago. Previously, agencies have skirted cyber security issues due to lack of cyber security skill, budget, and differing perceptions around the importance of cyber security. The new...
Abstract concept

Audio deep fake tech, financial firm loses $35M

Oct 20-- Audio voice cloning may emerge as a pressing business security problem. Fraudsters are using voice-shaping tools to infiltrate enterprises and to carry out cyber attacks. Will detection technology be able to keep pace? In early 2020, a bank manager in Dubai believed himself to be speaking with the director of a partner group, who he had...
Software concept, dark web

228,000 subscribers, data on the dark web

Oct 15— Last year, more than 228,000 pieces of data belonging to the 3D printing site Thingiverse made their way onto the dark web. Since then, hackers have widely circulated the information, which includes real names, home addresses and website authentication credentials. Precisely how hackers are using or intend to use this data remains unclear. Nonetheless, the...
Cyber security concept

Army CDO says greater interoperability needed

Oct 8-- The US Army's Chief Data Officer (CDO) states that achieving zero-trust will be easiest if software and other tech infrastructures are interoperable. This represents a departure from traditional, competitive business practices that can result in "vendor lock-in." CDO David Markowitz advocates for the industry to be interoperable with itself. To enable greater interoperability, the army is...
cyber security concept

Central bank digital currency, costs and risks

Sept 24--In the US, the Federal Reserve is expected to release new research that weighs the costs, benefits and risks associated with the development of a central bank digital currency (CBDC). Experts want to fully analyze how a national digital currency could affect domestic financial stability and the financial system as a whole. Questions abound regarding how...
digital technology concept

FBI withheld Kaseya decryption key

Sept 22--New reports indicate that the US Federal Bureau of Investigation (FBI) withheld information pertaining to the Kaseya decryption key for nearly three weeks. This critical information could have enabled the IT group to unlock their network, and possibly those of clients in a timely manner. The decision not to provide Kaseya with the key appears to have...
Email security best practices concept

Why your inbox might be a growing risk

Sept 20--Over time, our inboxes become our repositories for the records, receipts and the revolving door of other documents that make up our lives; both business and personal. In the past year, more of our lives have migrated onto the internet than ever before. As a result, our inboxes are piling up with content, much of which...
Lateral network movement, abstract concept

Notorious Ragnarok ransomware gang shuts down

Sept 1—The Ragnarok ransomware gang, which began operations in 2019, formally announced its decision to wind down operations. Last week, Ragnarok provided all 12 of the victims listed on its dark web platform with instructions regarding file decryption. The group also offered victims a decryptor that includes a master decryption key. Ragnarok’s claims to fame The Ragnarok group gained...
Abstract security and news concept

Breaking News: $50M Ransom Demand on Saudi Aramco

Contributed by Justice Anyai, Office of the CTO, Check Point Software The Financial Times reported on July 21st that Saudi Aramco, the largest oil producer in the world, is currently faced with a ransomware payment situation. The cyber extortionist behind this attack has demanded a payment of $50M to an undisclosed cryptocurrency wallet or else troves of data...
Breaking News Image

Breaking News: Cyber Attack on US Critical Infrastructure Causes Shut Down!

Contributed by Edwin Doyle, Global Security Strategist.  May 10--A fifth generation cyber attack shut down the US fuel pipeline belonging to Colonial Pipeline Inc., which is responsible for pumping over 100 million gallons of gasoline 5,500 miles from Houston to New York Harbor. Was the attack intended to cause a catastrophic oil spill or to lead to a ransomware...
Chip shortage, semiconductors, driving in the slow lane

Breaking News: CNA Financial Breach

Contributed by Edwin Doyle, Global Security Strategist, Check Point Software.  March 29--Multi-billion dollar insurance conglomerate, CNA Financial, suffered a massive cyber breach that forced them to disconnect all systems from their network. CNA's website displayed the explanation, “The attack caused a network disruption and impacted certain CNA systems, including corporate email”. Why is this breach significant? CNA is listed...
Coronavirus vaccine concept

Breaking News: Coronavirus Insights

As distribution for the coronavirus vaccine in the United States continues to roll out, there are disparities between rural and urban cities receiving the vaccine. The Associated Press wrote a story about people driving hundreds of miles to get the vaccine in a neighboring cities when they were not eligible in their home town. It is in moments...
×

Subscribe to CyberTalk.org Weekly Digest for the most current news and insights.

×

 

We’d like to hear your thoughts!

Please take a minute to complete a brief survey!

Begin our Survey