The object of this new attack campaign is not swordfish or tuna but high-ranking executives within target organizations. Supply chain attacks are becoming an increasingly popular strategy for threat actors. According to Symantec, supply chain attacks rose by 78% in 2018, and a similar report by Carbon Black estimates that half of cyberattacks now target supply chains.
Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind. 1 of 8 Cybercriminals are increasingly taking aim at smaller organizations. This puts small and midsize businesses (SMBs) in a tough spot. Faced with a long list of cyberthreats, they also are operating with smaller budgets and staff
Industry observers applaud the program’s ability to find exploits but fear unintended consequences. Last week at Black Hat USA, Ivan Krstić, Apple’s head of security engineering and architecture, announced a massive expansion of the company’s bug-bounty program. In addition to expanding the program from iOS to all of Apple’s operating systems, the new program dramatically
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK’s common language. Biology, zoology, and related sciences have a tool to help scientists around the world communicate with one another: scientific names. These scientific names, generally rooted in Latin, provide a common set of terms for
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover. The concept of “the pivot” is well-understood by entrepreneurs, who often set out to build a business or technology and realize they need to shift their strategies. Visually, one foot remains firmly
Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels. The cloud-based infrastructures that enterprise organizations are increasingly using to run their business applications have become a major target for illicit cryptomining operations. According to new research from AT&T Cybersecurity, cryptomining has become the primary
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets. There were 12,449 new, authentic breaches and leaks in 2018, an increase of 424% from the year prior. But the average breach size was 216,884 records – 4.7 times smaller than