Tag Archive : Cybersecurity

/ Cybersecurity

By Raphael Satter and Christopher Bing

WASHINGTON (Reuters) – Saudi diplomats, Sikh separatists and Indian business executives have been among those targeted by a group of hired hackers, according to research published on Wednesday by mobile firm BlackBerry Corp.

The report on the group, known publicly as Bahamut, the name assigned to the mythical sea monster of Arab lore, highlights how cybersecurity researchers are increasingly finding evidence of mercenaries online.

BlackBerry’s vice president of research, Eric Milam, said the diversity of Bahamut’s activities was such that he assumed it was working for a range of different clients.

“There’s too many different things going on across too many different ranges and too many different verticals that it would be a single state,” Milam said ahead of the report’s release.

In June, Reuters reported on how an obscure Indian IT firm called BellTroX https://www.reuters.com/article/idUSKBN23G1GQ offered its hacking services to help clients spy

Read More

Strike Graph co-founders Justin Beals and Brian Bero. (Strike Graph Photo)

Seattle startup Strike Graph raised a $3.9 million seed round led by Madrona Venture Group.

The company, founded less than a year ago and spun out of Madrona Venture Labs, helps companies prepare for the cybersecurity certification process.

Most B2B organizations need to pass cybersecurity audits to ensure their service meets security and privacy standards. Strike Graph says its customers can earn a SOC 2 Type 1 certification in 45 days and save $50,000 in consultant fees thanks to automation and customization features.

The 5-person startup is led by CEO Justin Beals, a veteran of NextStep, Koru, Roundbox Global, and other startups, along with Brian Bero, who previously co-founded Seattle tech stalwart Apptio and recently sold security startup Greytwist to SmartRIA.

The idea for Strike Graph came about after Beals struggled with the SOC 2 process as the CTO

Read More

New CyberStrong platform updates allow customers to quickly align with the Financial Services Sector Cybersecurity Profile and harmonize compliance standards across FFIEC, NIST, PCI, and others supported by patented automation.

CyberSaint, the developer of the leading platform for automated, intelligent cybersecurity program management, today announced the availability of new features supporting the Financial Services Sector Cybersecurity Profile within the CyberStrong platform, including automated mappings between those standards and the NIST Cybersecurity Framework, FFIEC, and others. These updates are supported by CyberSaint’s existing patented technology, which is used to optimize program performance and eliminate manual intervention for assessments, remediation, and reporting.

The Financial Services Sector Coordinating Council (FSSCC) cybersecurity profile was created by the Bank Policy Institute (BPI), leading organizations, and institutions to fulfill the need for a more efficient, tailored, and easily communicated framework to leverage across the financial services sector. The profile is designed for all financial services organizations

Read More

The Cybersecurity Infrastructure Security Agency (CISA) says a widespread Microsoft email outage Monday was not part of a “broader coordinated campaign” — but they’re still keeping an eye out for possible malicious activity.



logo: A man wearing a mask looks at this phone outside the Microsoft office in Beijing, China in a Friday, Aug. 7, 2020 file photo.


© Ng Han Guan/AP
A man wearing a mask looks at this phone outside the Microsoft office in Beijing, China in a Friday, Aug. 7, 2020 file photo.

Microsoft reported that a number of users in North America lost access Monday afternoon to its “Microsoft 365” services, including Outlook mail, Microsoft Teams and Teams Live Events, as well as Office.com services.

Loading...

Load Error

The company said late Monday night that the incident had been resolved and that “any users still experiencing impact should be mitigated shortly.”

Officials with CISA, the cybersecurity arm of the U.S. Department of Homeland Security, said that “at this point we have no indication of a broader coordinated campaign.”

“We’re working with a

Read More

Beenu Arora is the CEO of Cyble Inc, a SaaS-based solution offering cybercrime & deepweb intelligence and third-party security scoring.

Cybersecurity readiness has many benefits, but unless it is complemented with the right controls, that knowledge won’t stop malicious characters from breaching an organization’s security walls. According to a 2019 Juniper Research report, the cost of data breaches is forecast to rise from $3 trillion each year to $5 trillion by 2024. This is particularly important for large organizations that rely on third-party services to conduct their core operations. A 2018 study by Opus and Ponemon Institute found that almost 60% of companies experienced a data breach linked to a third-party vendor.

For example, in 2019, Quest Diagnostics announced the breach of 11.9 million patients’ information through its third-party bill collections agency. A more recent example comes from digital banking provider Dave, which in July disclosed a breach

Read More

According to Statista, there are about 4.57 billion active internet users globally as of July 2020. This number is great for businesses, especially those that are powered by the digital economy.





© metamorworks | Getty Images


As businesses continue to embrace the tech age as well as the opportunities that come with it, the presence of cybercriminals is increasing, too. The activities of these criminals cannot be ignored, as they are capable of crashing any business. Business leaders who wish to remain in business must pay better attention to cybersecurity.

Loading...

Load Error

Related: The Real Cost of a Data Breach for Your Brand (and How to Best Protect Yourself)

Whilst there is no definitive solution to what is seen as the biggest threat to modern businesses – cybercrime — business owners like you can take advantage of available cybersecurity solutions and knowledge to protect your business and its digital assets.

Read More