Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Top 5 Harmful Cyber Threat Types

Cybersecurity threats are evolving and the IT industry is on high alert. Modern cyber threats are more sophisticated and fast such as malware, phishing, cryptojacking, and IoT threats. The major cyber-attacks in 2019 witnessed that cybersecurity defenses were inefficient to prevent cyber threats altogether. The situation will even prevail in 2020. However, mitigation strategies can help to minimize the chances of data breaches.

The Biggest Cyber-attacks in 2019

Over the past couple of years, cyber-attacks have been increasing both in frequency and sophistication. 2019 also witnessed a surge in cyber-attacks and many companies were suffering a huge financial and reputational loss. According to CISCO, DNS hijacking and targeted malware were the serious cyber threats of 2019, along with various others. Cyber pests were using various tools to capture data and evade detection, from Remote Access Trojans (RATs) to hide threats in encrypted traffic.

IT Systems at Australian Shipping Giant Toll Group Shut Down Following Cyberattack

Australian transportation giant Toll Group was forced to shut down some of its online services after experiencing a cybersecurity incident last Friday. Toll Group said it discovered a piece of ransomware on its systems on Friday, January 31. In response, the company shut down several of its IT systems at multiple sites and business units across the country to resolve the issue.

What is Real Time Cyber Attack Map?

Real time cyber attack maps offer us an insight on the attacks going on around the globe. They sure are eye candies, but do they have any use? Read our article to learn more. Although their extent, kind and intent changes, one thing about cyber attacks remain the same: They never stop. At any given moment, there are hundreds of cyber attacks happening.

Using Splunk Attack Range to Test and Detect Data Destruction (ATT&CK 1485)

Data destruction is an aggressive attack technique observed in several nation-state campaigns. This technique under MITRE ATT&CK 1485, describes actions of adversaries that may “..destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives”.

Austria's Foreign Ministry Hit by 'Serious' Cyber Attack

The Austrian State Department's IT systems were hit by a cyberattack last Saturday and many believe that a "state actor" may be behind the attack. The attack, which was disclosed late Saturday night, is said to be "serious" and experts warn it could continue for several days, according to a joint statement from the Foreign Ministry (BMEIA) and the Ministry of the Interior (BMI).

Visa Reports PoS Attacks Targeting North American Gas Stations

According to Visa, cybercrime groups have targeted North American gas stations with point-of-sale (PoS) malware. In the summer of 2019, three separate attacks were detected, but only two of the attacks impacted the PoS systems of fuel dispenser merchants. Despite this, Visa believes that these businesses will become an increasingly attractive target for criminal groups.

Reduce Time To Remediate Threats: Lessons from a major US retailer

2019 has become another record-breaking year in eCommerce. This unprecedented growth has a dark side - since an overwhelming 71% of security incidents are financially motivated, digital retailers are becoming even more attractive targets for cyber attacks and fraud. As we near 2020, digital retailers will have to work hard to protect their digital assets. Here are a few factors that will make this task harder than ever.

Major data center provider hit by ransomware attack, claims report

CyrusOne, a major provider of enterprise data center services, is reported to have suffered a ransomware attack. The Dallas-headquartered company, which operates more than 30 data centers across the United States, China, London, and Singapore, is reported by ZDnet to have had some of its systems infected by the REvil (Sodinokibi) ransomware.

The "Great Cannon" Has Been Deployed Again

Summary The Great Cannon is a distributed denial of service tool (“DDoS”) that operates by injecting malicious Javascript into pages served from behind the Great Firewall. These scripts, potentially served to millions of users across the internet, hijack the users’ connections to make multiple requests against the targeted site. These requests consume all the resources of the targeted site, making it unavailable.