What is an Advanced Persistent Threat?
Advanced Persistent Threats explained. Advanced Persistent Threats (or “APTs”) are a dangerous form of cyber attack where a team of intruders use sophisticated hacking techniques to establish a long-term presence on a network. Their intention is usually to breach highly sensitive data and their methods are always evolving. These APT attacks usually come from very…
Read MoreHow Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security
Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…
Read MoreSatori Malware Aims at D-Link Routers
Satori isn’t new malware, but it’s the most infamous of its kind in the IoT world. Satori is a malicious application that scans the Internet for vulnerable devices and adds this vulnerable device to its botnet. It’s terribly effective for botnet creators – good for malware attackers but bad for innocent bystander users. The result:…
Read MoreThe Rise of Currency Miner Malware
Crypto currency is in high demand. Not just for everyday people, but for cyber criminals. Insider threats are considered the most malicious of cyber threats. Insiders already have access to everything. This makes the risk level extremely high. Most companies think of a cyber threat as someone who maliciously attacks the network, steals data, or…
Read MoreWhen CMS Software Such as Drupal is a Threat
Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem like innocuous software. Even CMS (content management system) software could pose a threat. This is exactly what happened with the latest Drupal threat. Drupal CMS…
Read MoreUnderstanding Permission Aggregation and Insider Threats
Insider threats are a growing concern for any large corporation. In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show that these types of attackers are just as popular as threats caused by employees, vendors or corporate contractors. Insider threats include anything from simple employee…
Read MoreResearch Shows that the Best Cyber Defense Teams are Antisocial
A new study that involved Army research to find the best cyber security defense team members showed that the best people for the job are antisocial, reconfirming what many people confirmed as the stereotypical programmer as the best person for the job. In March and April 2017, the Mid-Atlantic Collegiate Cyber Defense Competition studied a…
Read MorePhishing and Email Fraud are Top Security Risks for Corporations
Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…
Read More