Cyber Signals: Defending against cyber threats with the latest research, insights, and trends

Credit to Author: Emma Jones| Date: Thu, 03 Feb 2022 14:00:00 +0000

We’re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world’s most prolific threat actors.

The post Cyber Signals: Defending against cyber threats with the latest research, insights, and trends appeared first on Microsoft Security Blog.

Read more

[updated]Cyberattack on fuel supplier causes supply chain disruption

Credit to Author: Pieter Arntz| Date: Wed, 02 Feb 2022 16:52:28 +0000

A cyber attack interrupted the supply chain for thousand of gas stations in Germany. Alternatives had to be found when the automated loading systems for the supply trucks were disabled.

Categories: Vital infrastructure

Tags:

(Read more…)

The post [updated]Cyberattack on fuel supplier causes supply chain disruption appeared first on Malwarebytes Labs.

Read more

How to Use Zero Trust Security for the Hybrid Cloud

Credit to Author: William Malik| Date: Wed, 02 Feb 2022 00:00:00 +0000

Securing the hybrid cloud can be complex. Explore how CISOs can use the zero trust security approach for more proactive protection.

Read more

Start-up emerges with an ‘enterprise browser'

Credit to Author: Lucas Mearian| Date: Wed, 02 Feb 2022 04:00:00 -0800

A start-up has emerged from stealth mode to announce what it describes as one of the world’s first enterprise-specific browsers, capable of governing how users interact with all SaaS and web applications.

The new Island web browser is based on the widely used Chromium open-source platform. Launched by a company with the same name, Island offers users a familiar online experience while governing what sites they can visit, the data they can view, and what files they can download or upload. Restrictions can be dialed up or down and can be specific to a user’s role in an organization.

For example, a user could be surfing the web with the standard Chrome, Edge, or Safari browsers, but if they try to access a site that’s off-limits based on the Island settings, they’d be blocked and told to use their secure browser. The Island browser can even stop an employee from taking screenshots of sensitive data, depending on the settings IT admins choose to implement.

To read this article in full, please click here

Read more

Why Apple’s improved 2FA protection matters to business

Credit to Author: Jonny Evans| Date: Tue, 01 Feb 2022 06:01:00 -0800

Apple has introduced a new layer of protection to its existing two-factor authentication (2FA) system, making it a little harder for phishing attacks to successfully steal valuable authentication credentials.

Given that Apple, PayPal, and Amazon were the top three brands used for successful phishing attacks last year, according to a recent Jamf report, this matters.

Phishing costs billions and is bad for business

Phishing is a huge problem. The scale of these attacks shot up during the pandemic. The FBI Internet Crime Report 2020 revealed that phishing attacks affected 241,342 victims in 2020, up from 114,702 in 2019, with adjusted losses of more than $54 billion. Verizon’s 2021 Data Breach Investigations Report confirmed that 36% of data breaches that year involved phishing.

To read this article in full, please click here

Read more

Jamf CEO weighs in on Apple deployments and enterprise security

Credit to Author: Jonny Evans| Date: Thu, 27 Jan 2022 08:34:00 -0800

“Apple will become the number one device ecosystem in the enterprise by the end of this decade,” Jamf CEO Dean Hager told me while introducing an in-depth enterprise security trends report that enterprises should look at.

Apple continues to see incredible growth

The nature of enterprise IT is rapidly becoming multiplatform. Jamf recently shared some details concerning the rapid growth in Apple device deployments it is seeing in business. For example, it now has 60,000 active customers, up from 36,000 two years before that – and believes new services such as Apple Business Essentials will help maintain this growth.

To read this article in full, please click here

Read more

Test your outrage over Google's new Topics advertising system

Credit to Author: JR Raphael| Date: Thu, 27 Jan 2022 04:00:00 -0800

Google sure has taken an awful lot of heat over its advertising practices lately.

But why, exactly? Today, I’d like to explore that. I’ve concocted a four-question quiz that’ll gauge your rage and help determine whether it’s aimed at the right source or perhaps misplaced. But first, we need to catch up on what exactly is happening right now and how we reached this point.

The whole recent Google advertising debacle started with the crumbling state of the digital cookie, y’see — the pressure for Google to move away from its age-old practice of using tiny (and rather tasty-sounding) tidbits of data provided by websites to see what sort of stuff you’re interested in and then show you ads that match those subjects.

To read this article in full, please click here

Read more