State Attackers Moving from Stealing Data to Social Meddling

State Attackers Moving from Stealing Data

The new cyber intelligence report expects that the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. The cyber state attacker force is growing at an alarming rate. New bad actors. Few unexpected nation states are rising in the ranks of sponsored attackers, including spying on thousands of Read More »

MSSPs waste resources on False Positive alerts

MSSPs waste resources

One of the key findings from the survey of MSSP analysts conducted by Advanced Threat Analytics is that majority of the respondents report a false-positive security alert rate of more than 50%. Many analysts spend 5-6 hours a day investigating security alerts, with high false-positive rates. This frequently compromises security effectiveness and prevents security analysts from Read More »

MSSPs should provide Security Awareness Training

Security Awareness

MSSPs know that the protection provided by even their most powerful and comprehensive security solutions can be quickly undermined by careless or negligent behavior of their clients. Educating IT and end-users has always been a core component of an effective security strategy and with today’s sophisticated and rapidly morphing cyberattacks. The need for end-users to Read More »

Refuse Paying Ransom

Refuse paying Ransom

Mecklenburg County in North Carolina experienced additional cyberattacks after it refused to pay $23,000 in ransomware. However, county officials indicated that the latest cyberattacks were unsuccessful. Hackers launched the second set of cyberattacks against Mecklenburg County on Thursday, December 7, according to a prepared statement. County Manager sent an email to warn county employees about the cyberattacks Read More »

9 things you can do for your SMB to avoid a data breach

Data Breach Attack

You can never really tell if your business is going to be hacked. Hacking a large enterprise needs  specialized skills. Guess, who will the average skilled hackers go after. They are looking for weaknesses and will pounce when found. If you are not doing any of these nine things, you’re definitely are at higher risk of Read More »

Q3 Threats Report from McAfee Labs

Q3Threats

Cyberthreats and security incidents continue to claim the top headlines, keeping cybersecurity the top topic in our minds. The McAfee® Labs Threats Report: September 2017 takes a look back at WannaCry, its impact, and how it exploited not only technical vulnerabilities, but business processes. Additionally, report looks at how threat hunting is performed in organizations Read More »

Cybersecurity attacks on Cloud

cloud defense

Cybersecurity attacks on Cloud-based user accounts spiked 300 percent in 2017 compared to the same period last year, according to latest edition of Microsoft’s Security Intelligence Report. Heading the list of vulnerabilities are all the usual suspects: Weak, guessable passwords, and poor password management, followed by targeted phishing attacks and breaches of third-party services. Here Read More »

MSSP: Creative solution to cybersecurity concern

Ascent Infosec Blogs

Most IT security professionals believe an industry-wide skills gap is forcing organizations to explore creative solutions to address cybersecurity concerns, according to a survey conducted by Tripwire and Dimensional Research. The survey of 315 IT security professionals revealed: 93 percent of respondents said that they are concerned about an industry-wide skills gap. 81 percent stated that Read More »

Threat Intelligence: Research team finds emerging threats

Advanced Threat Defense in Chicago

The Advanced Threat Research (ATR) team investigates emerging threats and work with global law enforcement to stop cyber criminals. Threat Landscape Dashboard Better threat awareness means better protection for your business. Access our threat dashboard to get an overview of key threats being tracked by McAfee researchers. Go to the Threat Landscape Dashboard. Emerging Threats and Read More »