article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 52
article thumbnail

North Korean Lazarus APT group targets blockchain tech companies

Malwarebytes

Victims are lured into downloading the malware with a variety of social engineering tactics, including spearphishing. Educate users on social engineering attacks like spearphishing. These days, financial cybercrimes often involve Bitcoin and other cryptocurrencies. Spearphishing campaigns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Implications of the Uber Breach

Security Boulevard

How to protect your organization from a social engineering attack. This tactic is called social engineering and is one of the key methods used in attacks that result in data breaches. No amount of investment in the latest technology can provide 100% protection because technology alone is not enough.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. A red team’s activity can extend beyond cybersecurity attacks and vulnerability scanning to include phishing , social engineering , and physical compromise campaigns lasting weeks or more.

article thumbnail

Yandex sysadmin caught selling access to email accounts

Malwarebytes

Yandex, a European multinational technology firm best known for being the most-used search engine in Russia, has revealed it had a security breach, leading to the compromise of almost 5,000 Yandex email accounts. The company says it spotted the breach after a routine check by its security team.

article thumbnail

API Security for the Modern Enterprise

IT Security Guru

As modern organizations become more dependent on APIs to achieve their goals, their API security strategy must be up-to-date and in line with recent developments in technology. They’re used extensively to foster more rapid application development, and without proper security measures, sensitive data can easily get into the wrong hands.

DDOS 114
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Last Watchdog recently sat down with Satya Gupta, founder and CTO of Virsec , a San Jose-based supplier of advanced data protection systems. Virsec is a leading innovator of memory protection technologies. One tried-and-true incursion method pivots off social engineering. This is where PowerShell comes back into play.

Hacking 212