-
Check Point Software Warns Your Personal Data Could Be for Sale on the Dark Net
Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, is warning of a sharp increase in cyber-criminals stealing personal data and information on documents such as driving licenses and passports, to sell on the dark net. A recent report found that while the number of publicly-disclosed breaches of sensitive data from organisations fell…
-
Comments: Codecov Bashed Uploader Security Compromise – Check Point
Comments by: Jon Ng, Head, Cloud Security Engineering, APJ, at Check Point Software Technologies Following the SolarWinds Sunburst attack, this is another supply chain hack that further highlights the security challenges resulting from the rapid-release cycles that are typical of modern application development and deployment, also known as the DevOps movement. Organisations need to be…
-
Three cyber-security lessons for businesses in 2021
Contributed by: Daniel Chu, Director of Systems Engineering, Asia Pacific, ExtraHop It’s probably safe to say we’re all happy to see the end to a disastrous 2020. While a mass vaccination programme that may herald the return of life as we knew it, BC – Before Covid – is under way in many countries, the…
-
ViewQwest launches Southeast Asia’s first consumer broadband which automatically blocks cybersecurity threats
Singapore-based telecommunications and Internet Service Provider (ISP) ViewQwest has announced the launch of SecureNet for homes and small and medium enterprises (SMEs) in Singapore. SecureNet is Southeast Asia’s first consumer broadband with built-in security powered by Palo Alto Networks, the global cybersecurity leader. Last year, hacked footages from home security cameras in Singapore were uploaded to pornographic sites1.…
-
Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2021
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a leading provider of cybersecurity solutions globally, has published its new Brand Phishing Report for Q1 2021. The report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during January,…
-
How threat actors abuse ICS-specific file types
By Nadav Erez, Director of Innovation at Claroty The information technology (IT) security community is well educated on the risks of cyber threats, with precautions such as anti-virus systems, dedicated security teams and intrusion detection systems (IDS) set up to fight against malicious attacks. However, while anti-malware systems have been developed to fight adversaries, these systems…
-
Comments: Zoom, amongst other giant companies hacked at Pwn2Own 2021 – Synopsys
Comments by: Tim Mackey, Principal Security Strategist, at Synopsys Software Integrity Group If you’ve ever wondered what happens when there is a new security vulnerability in software, we can learn a lot from the Zoom zero-day discovery at this years’ Pwn2Own hacking contest. First and foremost, hackers aren’t all criminals. Most work for cybersecurity firms…
-
Synopsys Study Shows Uptick in Vulnerable, Outdated, and Abandoned Open Source Components in Commercial Software
Synopsys, Inc. has released the 2021 Open Source Security and Risk Analysis (OSSRA) report. The report, produced by the Synopsys Cybersecurity Research Center (CyRC), examines the results of more than 1,500 audits of commercial codebases, performed by the Black Duck® Audit Services team. The report highlights trends in open source usage within commercial applications and provides insights to help…
-
March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, has published its latest Global Threat Index for March 2021. Researchers report that the IcedID banking trojan has entered the Index for the first time, taking second place, while the established Dridex trojan…