Treyler Ray began his career in law enforcement with the Mississippi Bureau of Narcotics as an undercover narcotics agent. He soon moved into the special operations division where he conducted surveillance and Title III wiretaps on major drug traffickers. F
Working in healthcare was never on my radar,” says Luke Manuel, Security Director for Rockcastle Regional Hospital and Respiratory Care Center in Mount Vernon, Ky. He spent 8 ½ years in the U.S. Marine Corps, before earning his bachelor’s degree in Assets Protection and Security with a focus on critical infrastructure.
After serving our country for 10 years in the Marine Corps, Joey Hunter was ready to be a prison guard. The career path appealed to him and the job interview was set.
While the first thing that may come to mind is attacks on voter booths and polling data, hackers were expected to hit more vulnerable targets first, such as community-based organizations and systems supporting political campaigns.
These networks are rarely designed to withstand the ransomware threats much larger, established political bodies face, and hackers know it.
Here, we talk to Doug Matthews, Vice President of Product Management for Veritas, about the conditions impacting data protection during the election period.
Estimated at 40% of all internet traffic, bots perform a variety of both critical and criminal operations. The sophistication of emerging bots is creating problems for traditional detection tools.
Cybercriminals quickly weaved the pandemic into their email scams earlier this year, and more recently impersonated the IRS by pretending to share updates about COVID tax relief in an attempt to steal sensitive tax information. In mid-April, Google’s Threat Analysis Group reported that they detected 18 million COVID-19 themed malware and phishing emails per day. And that’s without including all the email impersonation, invoice fraud, and phishing attacks that have nothing to do with COVID, but are dangerous nonetheless.
In this article, I will provide some tips to help individuals and organizations communicate more securely over email.
With the fall season underway and winter looming, states across the U.S. are opening up their grants for applications. There are a number of different programs and types of security grants that organizations can qualify for.
Operators used four different DLL side-loading scenarios to install and execute new malware after removing a resident PlugX Backdoor
November 4, 2020
Sophos uncovered attackers using DLL side-loading to execute malicious code and install backdoors in the networks of targeted organizations. A report published, “A New APT uses DLL Side-loads to Killl Someone,” outlines the discovery of four different DLL side-loading scenarios, which all share the same program database path and some of which carry a file named “KilllSomeOne.”
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T), in partnership with the Cybersecurity and Infrastructure Security Agency (CISA), has awarded $2 million to the Critical Infrastructure Resilience Institute (CIRI), a DHS Center of Excellence (COE) led by the University of Illinois at Urbana-Champaign (UIUC), to develop a plan that CISA can execute to build a national network of cybersecurity technical institutes.
A Russian national was sentenced to eight years in prison for his role in operating a sophisticated scheme to steal and traffic sensitive personal and financial information in the online criminal underground that resulted in an estimated loss of over $100 million.