Giant Ingredion Ingredients Attack Malware

Westchester, Ingredion Incorporated, an Illinois-based ingredient corporation, announced this week that criminal activity has recently been found on certain data center servers. Just a few specifics about the incident have been given, but a piece of malware seems to have compromised some systems of the business. Ingredion says there is no evidence of any compromise

[ Read More ]

Hackers Now Use Their Own Admin Tools Against Company Networks

As if the threatscape couldn’t hold any more danger, IT teams must now add their favorite network administration tools as possible backdoor entry points for hackers. Hackers have found a way to abuse LDAP, Kerberos, and NTLM, take over WMI and DCE/RPC, two popular network admin tools, to get admin privileges. After an initial infection

[ Read More ]

What’s The Number One Stock In The World Of Cybersecurity?

The cybersecurity industry saw impressive growth last year as corporations scrambled to get their houses in order following a series of serious breaches throughout the year. For example, the economic damage of ransomware attacks (which lock computer screens and demand a ransom) grew to an estimated $5 billion in 2017 from just $325 million in

[ Read More ]

Why Cyber Attacks Are Now The Biggest Risk To The World

In the recent World Economic Forum 2018, The Global Risk Report has identified the highest risk on a global level. Experts have determined the possible impact on the geopolitical and economic status of cyber-attacks. It is believed that major attacks may occur in the next five years. Its effect was associated similar to natural disasters

[ Read More ]

Bridging the Gap in Cybersecurity Jobs

Cybersecurity education and the current need in the industry has its big gap. There is a need of integrating targeted and specific education with the risk management plan. It is believed that the field in cybersecurity is understaffed and that there is a need of 1 million jobs globally to be filled. New cybersecurity programs

[ Read More ]

Warning All Corporate Executives, Cybersecurity Is Your Problem!

It’s official—2017 was a record year for massive data breaches. First and foremost, there was the Equifax disaster, which exposed the hyper-private data of millions of customers to cybercriminals. And then there was the Republic National Committee breach, which leaked the personal information of over 200 million American voters. And don’t forget the Uber scandal, which

[ Read More ]

The Importance Of Cybersecurity Teams In Government Agencies

If a government agency’s purpose is to help the government move towards a more modern approach to service delivery, focused on citizens and innovation centered on using the latest and best technology there is—how important is it to have its own cybersecurity team in-house? The Digital Transformation Agency of Australia drives the digital information of

[ Read More ]

Reeling From Cyberattacks, EU Revamps Their Future Plans

Two massive cyber attacks in May and April 2017, the Wannacry virus and the NoPetya attack on Ukraine, tested Europe’s cyber defenses and showed the EU sorely needs to upgrade its threat response. Both viruses exposed various loopholes in security protocols and the lack of countermeasures against the malicious applications. The WannaCry ransomware virus infected

[ Read More ]

Battling a Ransomware on Your System the Right Way

Ransomware don’t discriminate between good guys and bad guys. Two Ontario-based non profit organization are the latest victims of a ransomware. In order to fight these kind of threats,we must first know the details regarding this ransomware. For the record, there were more than 7600 ransomware attacks reported to the Internet Crime Complaint Center (IC3)

[ Read More ]

Hackers Love The EternalBlue Exploit Because You Hate It

There is one thing small-time hackers and heavy-hitting black hats have in common—they both love the exploit known as EternalBlue. Evolved from the famous computer worms Conficker and Welchia, EternalBlue employs diverse exploits with new, brilliant-devised, and easy to deploy applications. As a hacker favorite, it leaves digital devastation in its wake while taking advantage of any unpatched

[ Read More ]