article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

North Korean Lazarus APT group targets blockchain tech companies

Malwarebytes

Victims are lured into downloading the malware with a variety of social engineering tactics, including spearphishing. Educate users on social engineering attacks like spearphishing. These days, financial cybercrimes often involve Bitcoin and other cryptocurrencies. Spearphishing campaigns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s official, today you can say goodbye to Internet Explorer. Or can you?

Malwarebytes

While Edge started out based on Microsoft’s EdgeHTML browser engine, it later switched to a Chromium-based model. It’s also worth reading for system administrators that want to prepare for the second phase of the retirement process. After all this, Microsoft felt it was time to phase out Internet Explorer. Not so much.

article thumbnail

Announcing Duo’s Vision to Streamline Authentication & Enhance User Experience

Duo's Security Blog

During the workday, on the other hand, I spend a lot of time talking to systems administrators, security operations analysts, and IT professionals who do love MFA. All of this is continually evaluated by Duo’s trust engine and analytics. They will often ask some version of “How can I Duo less often?”

article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.

article thumbnail

The Implications of the Uber Breach

Security Boulevard

How to protect your organization from a social engineering attack. This tactic is called social engineering and is one of the key methods used in attacks that result in data breaches. No amount of investment in the latest technology can provide 100% protection because technology alone is not enough.

article thumbnail

Yandex sysadmin caught selling access to email accounts

Malwarebytes

Yandex, a European multinational technology firm best known for being the most-used search engine in Russia, has revealed it had a security breach, leading to the compromise of almost 5,000 Yandex email accounts. The company says it spotted the breach after a routine check by its security team.