Imminent threats

 

Video: good guy Chris Vickery hunts exposed data

By Byron Acohido Two more stunning disclosures from self-styled internet watchdog Chris Vickery underscore how organizations continue to routinely expose sensitive data in the cloud, risking dire consequences. “My findings clearly demonstrate that data breaches happen more often than the general public realizes, and companies are quick to deny and cover up these issues,” Vickery […]

Why dormant SSH keys represent a nightmarish exposure

By Byron Acohido A nightmarish new exposure affecting virtually all major networks is just beginning to get the attention of the security community. It involves a fundamental networking protocol—Secure Shell, or SSH. Invented in 1995 by a Finnish programmer named Tatu Ylönen, SSH is an encrypting routine that enables one software application to securely connect […]

How open source flaws pose a rising threat to all businesses

By Byron Acohido Arguably the biggest security blind spot in just about every business network is something too few security executives are aware of, much less focusing on: open source software vulnerabilities. This truism first rose to the fore in 2014 with the flurry of malicious activity following the discovery of gaping defects in three […]

Ransomware rampage takes aim at business targets

sh_ransomware_7502

By Byron Acohido Consumers are no longer the prime target of ransomware campaigns. After years of petty thievery on a global scale – locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus clean-up services  –  they’ve turned their attention to much bigger fish. The opening quarter of this […]

Why ‘Shadow IT’ must be addressed

shutterstock_274479842

By Byron Acohido By-passing the IT department in to order begin utilizing the hottest new technologies is something tech-savvy employees have been doing since the inception of corporate networks. Most often, these workers aren’t maliciously motivated. They are simply intolerant of plodding decision-making and so take it into their own hands to acquire and begin […]

Why network perimeters need to be redefined in the age of cloud computing

By Byron Acohido The rising business use of cloud services and mobile devices has opened a Pandora’s box of security exposures. Software as a Service (SaaS) tools like Salesforce.com, Gmail, Office 365 and Dropbox, as well as social media sites like Facebook, LinkedIn and Twitter, are all being heavily leveraged by companies large and small […]

Anatomy of an attack: Using Twitter to launch denial-of-service attacks against banks

By Byron Acohido (Editor’s note: This actual snapshot of a cutting-edge Distributed Denial of Service attack was discovered by analysts at security vendor Digital Shadows, which provides cyber situational awareness to its SMB and enterprise customers. Digital Shadows’ CTO James Chappell shared this detailed intelligence with LastWatchdog. In the accompanying video, F5 cybersecurity evangelist David […]