Apple, Microsoft Top Orgs Used in Spear Phishing

Infosecurity Magazine | March 19, 2019

Apple, Microsoft Top Orgs Used in Spear Phishing
Attackers often exploit zero-day vulnerabilities in brand-impersonation attacks, which makes it easier to bypass traditional email security because they come from reputable senders and are typically hosted on domains that weren’t previously used as part of any malicious attack, the report said.

Spotlight

Until recently, most businesses took a traditional, perimeter-based approach to information security. The thinking was: "If we build a wall high enough, nothing will get in." That was fine until cyber criminals started looking for unguarded cracks in the masonry, forging counterfeit keys for the padlocks and tricking the guards into letting them in.

Related News

G-Cloud 12 Redscan services to help protect the public sector against cyber-attacks

prnewswire | September 28, 2020

Redscan, the Managed Detection and Response and Penetration Testing specialist, today announced the availability of its services on G-Cloud 12 – the latest iteration of the UK Government's cloud procurement platform. The Redscan services listed are ThreatDetect– Managed Detection and Response as well as CREST-accredited Penetration Testing and IT Health Checks. These services are designed to enable organisations to reliably secure their infrastructure and assets as well as rapidly detect and respond to threats.

Read More

Unisys Secures Biometric Identity Management on Cloud with New Versions of Stealth(identity)™ Software

Unisys | July 21, 2020

Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) strengthens defense against identity fraud by establishing trusted and irrefutable identities of individuals across multiple physical and digital channels. It also provides comprehensive control of biometric management processes and the flexibility to adapt to and leverage advancements in technology to consistently stay ahead of cyber criminals.Identity theft has proven to be particularly problematic during the COVID-19 pandemic. According to the U.S. Federal Trade Commission, more than 124,000 complaints regarding fraud schemes related to COVID-19 have already been filed from consumers, with nearly half (48%) saying they lost money in a scam. And according to the 2020 Unisys Security Index™, the longest-running snapshot of consumer security concerns conducted globally, identity theft ranks as the top area of concern for consumers both globally and in the U.S.

Read More

Artificial Intelligence (AI) in Cyber Security Market Next Big Thing BAE Systems, Cisco

openpr | April 21, 2020

The globally increasing IoT adoption and the number of connected devices have simultaneously increased the risk of cyberattacks. The rising number of cybercrimes is propelling the artificial intelligence (AI) in cyber security market. Some common cyber frauds faced by large enterprises are identity and payment card thefts, these cybercrimes when not resolved on time can lead to huge monetary losses. Cybersecurity providers are significantly using AI solutions for tackling such cyberattacks by early threat detection, response time reduction, and segregation as per priority.

Read More

Spotlight

Until recently, most businesses took a traditional, perimeter-based approach to information security. The thinking was: "If we build a wall high enough, nothing will get in." That was fine until cyber criminals started looking for unguarded cracks in the masonry, forging counterfeit keys for the padlocks and tricking the guards into letting them in.