Posts
The role of intrusion detection is typically fulfilled by real-time intrusion detection systems and anti-virus software in conjunction with a continuous monitoring strategy. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of successful compromise.
Read More »Last week’s ransomware attack on the San Francisco (Muni) transit system’s ticketing machines demonstrated that hackers are casting a wide net on their potential targets. Cybersecurity is a growing concern for public transit managers as their services become increasingly dependent on networked information technology. These systems are vulnerable to cyberattack which could disrupt operations or cause financial damage, as the Muni attack demonstrated.
Read More »We are excited to share Infocyte HUNT has been recognized as a Trust Award finalist in the Best Computer Forensic Solution category for the 2017 SC Awards. The finalists and winners for the Trust Awards are chosen by a distinguished group of leading cybersecurity professionals from the SC Media readership and selected by the SC editorial team.
Read More »ATM machines have long been targeted by thieves before, and are unarguably a security weak point of financial institutions. A recently publicized breach has resulted in Indian banks becoming the latest victims of unknown malware running on ATM machines. The breach affected ATMs that were managed by Hitachi Payment Services for 19 Indian banks and is estimated to have compromised at least 3.2 million debit cards over a 4-6 week period prior to its discovery.
Read More »IT and security professionals, beware! Here are four cyber scares to avoid this Halloween and protect your organization from year-round. The good news is you don’t have to run from cyber scares. Like any good vampire slayer or werewolf hunter, you just need a strategy and some special tools built to get the job done.
Read More »In April 2015, France’s TV5 Monde launched a new station, bringing its media offering to 12 channels, when it suffered a crippling malware attack that took all 12 channels off the air. Prevention was possible. Read on to learn why.
Read More »October is National Cyber Security Awareness Month (NCSAM) and this week’s theme is “Recognizing and Combating Cybercrime”. We’ve pulled together some resources on threat hunting and the important role it plays in identifying and combating malware and persistent threats that have made it onto your systems. From beginners to security pros, there’s something for everyone to remain #CyberAware.
Read More »
Cyber hunting has increasingly become a hot topic in the security industry. Some great articles have recently been published to introduce security and IT pros to the concept and highlight why it’s essential for cyber security best practices. However, industry commentators and experts alike all seem to agree that the only way to do this is using highly skilled and trained forensic threat hunting teams. We examine why you don’t need to be an expert to cyber hunt.
Read More »Asked yourself: “Am I breached?” “Is someone monitoring my systems right now, logging my keystrokes, stealing my credit card information or intellectual property?” How would you answer these questions in your organization? Aha, I saw what you just tried to do there. You just reached for your old, dusty antivirus scan button. Wrong. I’m sorry,…
Read More »On September 20th, SWIFT, the global provider of financial messaging, announced the creation of a new security tool to ‘strengthen customer fraud controls’. This tool allows SWIFT customers (banks) to detect unusual payment flows and improve the possibility of cancelling fraudulent transfers.
Read More »