Highlights From The 2017 Data Breach Investigations Report (DBIR)

Verizon has released the tenth edition of its Data Breach Investigations Report (DBIR) for 2017. The 2017 DBIR report includes the latest data on real-world data breaches and security incidents investigated by Verizon or by one their data contributors (such as security vendors and law enforcement agencies). This year’s report also includes data specific to key industries and who targets such verticals and why.

Continue Reading Highlights From The 2017 Data Breach Investigations Report (DBIR)

5 Key Challenges Facing Cyber Threat Intelligence Sharing

As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don't have a chance without effective threat communication between the public and private sectors.

Continue Reading 5 Key Challenges Facing Cyber Threat Intelligence Sharing

Shoney’s data breach

The owner of restaurant chain Shoney's, Best American Hospitality Corp. (BAHC), confirmed a data breach of customer data at dozens of Shoney's restaurants. The company published a press release that listed the affected restaurant locations and said…

Continue Reading Shoney’s data breach

IoT Cyber Attack Methods And Ways To Defend Them

In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.

Continue Reading IoT Cyber Attack Methods And Ways To Defend Them

How a University Fought Off an IoT Attack and 12 Lessons Learned

The Verizon security team recently announced the first Data Breach Digest, a series of 18 cybercrime cases the team investigated. The Verizon team starts with a sneak peek of one of the case studies that describes how a university was attacked by an IoT botnet consisting of over 5,000 infected hosts. The study concludes with 12 good lessons learned from the attack.

Continue Reading How a University Fought Off an IoT Attack and 12 Lessons Learned