SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Report stories - Page 34

Story image
Exclusive: DDoS attacks up, spike in attacks on govt agencies
Fri, 10th Aug 2018
#
ddos
#
netscout
#
report
NETSCOUT has released its Arbor Active Threat Level Analysis System (ATLAS) report for the first half of 2018, exclusive on SecurityBrief.
Story image
ANZ businesses are struggling to embrace digital transformation
Thu, 9th Aug 2018
#
digital transformation
#
report
#
anz bank
ANZ businesses are trailing behind their global counterparts when it comes to embracing disruptive technology.
Story image
DDoS attacks combining new and tried-and-true techniques
Thu, 2nd Aug 2018
#
ddos
#
kaspersky
#
botnet
DDoS botnets attacked online resources in 74 countries in Q2 2018, reveals Kaspersky Lab report. Hong Kong now ranks second among the most attacked countries.
Story image
Bug bounty marketplace in sore need of standardisation – report
Wed, 1st Aug 2018
#
report
#
bug bounty
#
crest
Bug bounty programmes lack standardisation, says a CREST report urging the establishment of best practices to protect researchers and organisations alike.
Story image
$4.7b opportunity in big data for healthcare industry worldwide
Tue, 31st Jul 2018
#
martech
#
data analytics
#
planning
SNS Telecom & IT's latest report shows that big data has huge potential in the healthcare and pharmaceutical space.
Story image
Businesses collecting more data than they can handle - Gemalto
Wed, 11th Jul 2018
#
data protection
#
breach prevention
#
data privacy
Only half of companies know where their sensitive data is stored, finds research by Gemalto, who surveyed 1,050 IT decision makers and 10,500 consumers.
Story image
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
security vulnerabilities
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Story image
Criminals “infect and collect” in cryptocurrency mining surge
Fri, 6th Jul 2018
#
cryptocurrency
#
blockchain
#
casb
Coin miner malware grew a stunning 629% in the first quarter of 2018, rocketing from around 400,000 total known samples in Q4 2017 to more than 2.9mil.
Story image
Automated Microsoft updates not enough to protect businesses - report
Fri, 6th Jul 2018
#
microsoft
#
flexera
#
secunia
Security professionals need to pay attention to desktop applications because most vulnerabilities found in these types of apps can be dangerous.
Story image
Australian companies getting better at preventing focused cyberattacks
Fri, 6th Jul 2018
#
accenture
#
report
#
cybersecurity strategy
A study by Accenture found that only one in eight focused cyberattacks are getting through versus one in three last year.
Story image
Online businesses under siege from botnet DDoS attacks and credential abuse – report
Wed, 4th Jul 2018
#
ddos
#
phishing
#
email security
Attack traffic origination against from China and Russia combined was three times the number of attacks from the US.
Story image
Despite more training, SMBs feel unprepared for cyberattacks - Webroot
Mon, 2nd Jul 2018
#
malware
#
ransomware
#
phishing
Despite rigorous training, most SMBs in the US, UK, and Australia feel unprepared for cyber threats, says Webroot, highlighting the evolving nature of attacks.
Story image
Cryptomining attacks to gain prevalence in H2 2018 – WatchGuard report
Mon, 2nd Jul 2018
#
firewalls
#
ddos
#
malware
Cryptomining malware is on the rise, with 98.8% of Linux/Downloader variants delivering cryptocurrency miners in Q1 2018, WatchGuard reveals.
Story image
Spending on AI cybersecurity solutions to increase – GlobalData
Mon, 2nd Jul 2018
#
it spending
#
report
#
globaldata
While cybersecurity has now become a critical business function, it remains a non-core competence for a significant number of boards.
Story image
Three providers of unified endpoint management software named IDC innovators
Mon, 2nd Jul 2018
#
edr
#
endpoint management
#
idc
Unified endpoint management (UEM) technologies provide management, configuration, and deployment capabilities to all end-user computing devices.
Story image
DNS amplification attacks rise twofold in Q1 - report
Thu, 14th Jun 2018
#
ddos
#
nexusguard
#
dns attacks
China and the US-dominated as the top two sources of DDoS attacks in Q1, contributing 15.2% and 14.2% of the botnets, respectively.
Story image
Phishing declines, but targets increase - report
Mon, 11th Jun 2018
#
phishing
#
email security
#
riskiq
For the second quarter in a row, Q1 saw a slight decrease of over 2% in overall phishing detections from Q4 of 2017.
Story image
IoT, chip processors emerging as new cyber battlegrounds – report
Tue, 5th Jun 2018
#
malware
#
ransomware
#
cybersecurity
The escalating cyber arms race shifts focus to IoT and chip processors, as ransomware variants surge by 101% in 2017, warns SonicWall's new report.
Story image
Why wearable device shipments slowed in Q1 2018
Tue, 5th Jun 2018
#
personal computing devices
#
idc
#
report
Wearable device shipments grew by only 1.2% in Q1 2018 as declines in basic wearables offset gains in smart wearables from brands like Apple and Fitbit.
Story image
New Zealand’s mid-market in urgent need of transformation - MYOB
Fri, 1st Jun 2018
#
financial systems
#
fintech
#
myob
Medium-sized businesses around New Zealand are facing barriers to growth and it could seriously impact the NZ economy, an MYOB report finds.