TA505, a sophisticated advanced persistent threat group, is now using legitimately signed certificates to disguise malware that can penetrate banking networks, security researchers warn in a new report.
Indian IT outsourcing giant Wipro says it's working with several partners to expedite the investigation into abnormal activities on some of its employee accounts as a result of an advanced phishing campaign, in addition to its work with a forensics firm. But it denies it's migrating to a new email platform.
The director of Britain's GCHQ intelligence agency said at this week's CyberUK conference that declassifying and putting "time-critical, secret information" for stopping online threats into the public's hands "in a matter of seconds" is an imperative.
Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape. As they look to gain more insight from their security devices, while gaining improved speed to detect and respond, managed detection and response is becoming a go-to solution.
The rapidly changing cybercrime landscape has required organizations to seek new methods, such as machine learning, that enable systems to learn, adapt, and uncover emerging fraud patterns quickly. However, there are many debates about the merits of machine learning models for fraud detection and which one works...
Research results from over 1,000 global key decision makers with visibility over access management confirm that security professionals are aware that a breach is only a matter of time, with 50% of respondents having already suffered a serious breach or expecting to experience one over the next six months (up from 42%...
Because traditional tools are not helping in detecting threats or reducing noise, the need of the hour is a unified threat dashboard, says Vishak Raman, director of security business for India and SAARC at Cisco.
A nation-state sponsored espionage campaign dubbed "Sea Turtle" has been manipulating the domain name system to target more than 40 organizations, including intelligence agencies - especially in North Africa and the Middle East, Cisco Talos warns. Experts say defenses against DNS hijacking lag.
Four unprotected application program interfaces for JustDial, a local search engine in India, are leaking the personally identifiable information of its more than 100 million customers in real time, says an independent security researcher who discovered the vulnerability.
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
To comply with Security and Exchange Board of India's recent cybersecurity guidelines for stock brokers and depository participants, the Bombay Stock Exchange has implemented a community security operations center, which will provide services to more than 1,000 member brokers.
When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.
The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.
Machine learning is one of the tools that you should be using as part of a multifaceted fraud strategy at financial institutions. To get value out of ML, you need to have multiple inputs. You have to have an intelligence network and the location to gather all that network intelligence.
Download this eBook on the...