Cyber Security Salary Survey Report 2018

In March 2018, Exabeam created a survey for Cyber Security professionals to gain insights including job satisfaction in current positions within the cyber market. Below are some of the findings…     Please let us know your comments on the findings. If you are interested in reading the full article, please read the full Exabean

Lire plus

FireEye claims discovery of 10-year hack campaign by China

A decade-long cyber espionage operation focused on stealing sensitive information for the Chinese government is claimed to have been uncovered by security firm FireEye. The FireEye intelligence report (PDF), APT30 and the Mechanics of a Long-Running Cyber Espionage Operation, has revealed that the group, dubbed APT30, has been maintaining an advanced persistent threat operation, likely

Lire plus

NIST Seeks Feedback on the Big Data Framework Development

The National Institute of Standards and Technology (NIST) is seeking public comment on a draft publication of the NIST Big Data Interoperability Framework, as part of a major collaborative effort to develop a standard framework to make it easier for to use “Big Data” sets for analytics. “One of NIST’s Big Data goals was to

Lire plus

Four Essential Building Blocks of Cyber Security

Despite increased investments in preventive security measures, many organizations are losing the war against cyber criminals. The data breaches at Target, Home Depot, Staples, Michaels, Kmart, eBay, Anthem, and Sony Pictures Entertainment, were just the tip of the iceberg. New methodologies developed by the National Institute of Standards and Technology (NIST) and other industry standards

Lire plus

What The Top Cyber Security Companies Have In Common

IT Business Edge listed its top 25 cyber security companies to watch in 2015. Some are well-known security vendors, thanks in part to their roles in discovering high-profile vulnerabilities, while some are unknown names preparing for a break out. While they are all focused on cyber security, each of these top cyber security companies has

Lire plus

Informatica Takes Data-Centric Approach to Information Security

Informatica, an independent provider of data integration software, has released a new tool aimed at taking a data-centric approach to information security by empowering organizations to identify and visualize sensitive data wherever it resides, inside or outside the corporate perimeter. “Organizations are trying to protect data and we know that malware is in your organization

Lire plus

Hackers hitting firms with malware five times a second

Hackers are hitting businesses with malware-based cyber attacks five times a second, and phishing remains the infection strategy of choice, according to Verizon. The company revealed the statistic in its Data Breach Investigations Report, which collated data from over 70 contributing partners’ internal and customer networks. Bob Rudis, Verizon managing principal and author of the

Lire plus

Uralte Sicherheitslücke in allen Windows-Versionen

IT-Sicherheitsexperten haben die Schwachstelle Redirect to SMB wiederentdeckt, die sämtliche Windows-Versionen betrifft. Sie lässt sich auch über zahlreiche Anwendungen ausnutzen. Unter Umständen geben Nutzer ihre Zugangsdaten zum Windows-Netzwerk preis. Die bereits seit mehr als 18 Jahren bekannte Schwachstelle Redirect to SMB betrifft weiterhin sämtliche Windows-Versionen. Sie kann nach Angaben von IT-Sicherheitsexperten mit moderner Hardware ausgenutzt

Lire plus

RTF and DOC Files Used in Majority of Targeted Attacks

Analysis of attack trends in 2014 reveals that tainted .RTF and .DOC files were employed in the majority of email-based targeted attacks, for a combined 46% of malicious doc types, according to a new study. 2014 also saw further refinements in targeted attack methodologies as more organizations have upgraded to newer versions of Windows, spawning

Lire plus

In-Memory ShellCode Detection Using a Patterns-Based Methodology

During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their goals. As we can imagine, these sets of common instructions could be used first to locate and later to analyze and/or to identify general threats: embedded or injected code. In this article, we’ll

Lire plus