I am excited to share with you that Cisco Secure Endpoint (formerly AMP for Endpoints) has successfully completed the 2020 MITRE Engenuity ATT&CK® Evaluation. This round is particularly rewarding because we had to face the difficult challenge of performing well against a set of simulated attacks from the formidable threat […]
Security
Still smarting from last month’s dump of phone numbers belonging to 500 million Facebook users, the social media giant has a new privacy crisis to contend with: a tool that, on a massive scale, links Facebook accounts with their associated email addresses, even when users choose settings to keep them […]
The US Department of Justice (DoJ) is forming a new task force to deal with the “root causes” of ransomware. In an internal memo, the DoJ outlines the creation of a new initiative that will bring together current efforts in federal government to “pursue and disrupt” ransomware operations. As noted […]
Hacking activity in the Gaza Strip and West Bank has ramped up in recent years as rival Palestinian political parties spar with each other, the Israeli-Palestinian conflict continues, and Palestinian hackers increasingly establish themselves on the global stage. Now, Facebook has uncovered two digital espionage campaigns out of Palestine, active […]
“Basically I’m going to keep talking to you, but I’m going to disappear,” longtime security researcher Katie Moussouris told me in a private Clubhouse room in February. “We’ll still be talking, but I’ll be gone.” And then her avatar vanished. I was alone, or at least that’s how it seemed. […]
This blog is co-authored by Mohammad Iqbal and is part four of a four-part series about DevSecOps. The trend towards accelerated application development, and regular updates to an architecture through an agile methodology, reduces the efficacy and effectiveness of point-in-time threat modeling. This recognition led us to explore and strategize […]
What industries do hackers primarily target for financial gain? Financial services should come as no surprise, but the hospitality industry is up there too. That’s why MITRE Engenuity focused on hacker groups Carbanak and FIN7 in the 2020 ATT&CK® Evaluation. Both groups are well known and launch highly sophisticated attacks […]
As their problems mounted, they went so far as to mount Nest cams in the Frobot cabinets to capture video of what might be going wrong inside. On one occasion, they watched as the ingredients mixture inside a Tesla-factory Frobot bubbled up and out of the Taylor machine, catastrophically hemorrhaging […]
The cybersecurity industry is hiring. In November 2018, The New York Times reported that a total of 3.5 million cybersecurity jobs would be available but go unfilled by 2021. This employment gap increased in the year that followed. (ISC)2 estimated at the end of 2019 that it would take 4.07 […]
Adopting a zero trust security strategy can better safeguard organisations against third-party attacks, where suppliers should not simply be entrusted to do the right thing. In this second piece of a two-part feature, ZDNet looks at how businesses in Asia-Pacific can establish basic cyber hygiene as well as better data […]