Remove 09
Remove 2017 Remove Data Remove Information Security Remove Security
article thumbnail

CISA urges to fix actively exploited Firefox zero-days by March 21

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) added recently disclosed Firefox zero-days to its Known Exploited Vulnerabilities Catalog. The post CISA urges to fix actively exploited Firefox zero-days by March 21 appeared first on Security Affairs. Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.

article thumbnail

North Korea-linked Konni APT targets Russian diplomatic bodies

Security Affairs

Security researchers at Cluster25 uncovered a recent campaign carried out by the North Korea-linked Konni APT group aimed at Russian diplomatic entities that used new versions of malware implants. The KONNI RAT was first spotted by Cisco Talos researchers in 2017, it has been undetected since 2014 and was employed in highly targeted attacks.

Phishing 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital security transformation: shifting to a cyber-aware culture

CGI

Digital security transformation: shifting to a cyber-aware culture. Tue, 10/03/2017 - 09:00. Given that October is National Cyber Security Awareness Month, now is a great time to drive home the fact that security must be part of all aspects of digital transformation, and cannot get lost in the discussion.

article thumbnail

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

Security Affairs

Security experts at Cisco Talos uncovered a series of highly targeted attacks, tracked as Frankenstein campaign, hackers used tools built by combining four different open-source techniques. Other anti-detection techniques such as only responding to GET requests that contained predefined fields, and using encryption to protect data in transit.

article thumbnail

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

Security Affairs

Security experts at Cisco Talos uncovered a series of highly targeted attacks, tracked as Frankenstein campaign, hackers used tools built by combining four different open-source techniques. Other anti-detection techniques such as only responding to GET requests that contained predefined fields, and using encryption to protect data in transit.

article thumbnail

Persistent privacy powers professional businesses

CGI

Tue, 09/25/2018 - 02:46. While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual (BAU), for others it represented a huge effort—and a bit of a panic for a minority. Companywide information security policies. Third-party security policies. harini.kottees…. The opportunity.

Privacy 40
article thumbnail

The impact of a cyber breach on public sector organisations

CGI

Wed, 05/31/2017 - 05:09. The problem with the former is that the argument is based in opinion rather than fact, with the latter that there is a paucity of data – there are only a small handful of companies that have publicly declared the financial impact that a cyber incident has had on their performance. harini.kottees….

Sales 40