On March 15th, the HHS’s network security system detected a sharp increase in activity. Over several hours, hackers tried to overload the department’s servers with millions of requests. The hackers we…
Posts tagged "Security"
Monitoring And Preparing For Emerging Coronavirus-Related Cyber Security Threats
The coronavirus is not just a global health crisis – increasingly, it is becoming a cyber security threat as well as more organizations move employees to remote work. The federal government issued an…
Cybersecurity experts join forces to combat coronavirus security threats
The coronavirus outbreak has led to a rise in hacking attempts and cyberattacks which is why an international group of close to 400 volunteers with expertise in cybersecurity have banded together to form a new group to combat these threats.
The group, called the Covid-19 CTI League (for cyber threat intelligence), has members in more than 40 countries and includes professionals who sold senior positions at major companies including Microsoft and Amazon.
VP of cybersecurity strategy at Okta, Marc Rogers is one of the four initial managers of the effort and he said the group's top priority would be preventing cyberattacks against medical facilities and frontline responders. In fact, the Covid-19 CTI League has already begun working on dealing with hacks of health organizations.
- Hackers are spreading malware through coronavirus maps
- Hackers target WHO as coronavirus spreads
- Malware strains using coronavirus to avoid detection
Covid-19 CTI League
The newly formed group is currently using its contacts at internet infrastructure providers to help stop phishing attacks and other financial cybercrime which preys on people's fears of the coronavirus to trick them into installing malware on their computers.
Rogers explained to Reuters how the coronavirus has led to a huge surge in phishing attacks, saying:
“I’ve never seen this volume of phishing. I am literally seeing phishing messages in every language known to man.”
According to Rogers, the Covid-19 CTI League has already managed to dismantle one campaign that used a software vulnerability to spread malicious software. However, he did not share any more details as the group is choosing to keep its operations close to the chest to avoid any retaliation from the cybercriminals it's trying to stop.
Rogers also revealed that law enforcement has been surprisingly welcoming of the group's collaboration.
- Also check out our complete list of the best antivirus software
Via Reuters
Security Standards For 5G
Gartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5…
The Role Of Cyber Security In Compliance
As a myriad of industry regulations and legislation have increased complexity in C-suite decision making, CISOs must educate executives on new and evolving risks and why investments in cyber security…
Design Flaws In Cyber Security Reports And Related CISO Sleep Patterns
Producing highly accurate reports without individual customization is a consistent design flaw of many cyber security solutions. CISOs might sleep better at night knowing not only what’s specifically…
Cyber Security Is A Team Sport
A Cyber Security Hub webinar with Code42 explored how cyber security can become an integral part of enterprise behavior and culture. The talk covered topics from the barriers to getting department coo…
Is The Enterprise Security Operations Center Effective?
The SOC is critical to today’s digitized economy and business requirements for operations both online and in the cloud. However, the current methods for security operations are not satisfying cyber pr…
Preparing Cyber Security Leaders For Regulation And Compliance
Not all industries have faced regulatory compliance and reporting requirements as a course of conducting business operations. Under-regulated sectors can take steps from a cyber security perspective t…
Enabling Cyber Security Defenders To Design Effective Solution Strategies
Enterprise cyber security defenders are required to be omniscient while attackers only need to know “one thing” very well. However, attacker strategies are changing. RSAC2020 was the backdrop for conv…