Hackers can easily outsmart firewalls, as we’ve seen in multiple cyber-attacks of 2018. AI was the next phase, where companies thought that if only machines would learn the environment, they would respond to threats tremendously better than humans ever could.
While several startups are developing better AI technologies, there is one outsider company that is putting firewalls down and is coming out in the open to fight hackers.
A new Israeli startup is using VR (virtual reality) to protect against cyber threats.
Cybersecurity and Information Security podcasts haven’t exactly been a driving force in the surge of popularity in podcasts. For the amateur or the expert, cybersecurity podcasts can provide great value. It’s a special niche that’s being executed by international experts, in the know enthusiasts, real world executors and security providers.
Here’s our list in no particular order of the cybersecurity and InfoSec podcasts to watch in 2019
1. CyberHub Engage
Since 2010, ransomware has evolved as one of the biggest cyber risks. In fact, 2017 saw more ransomware attacks than ever before. May 12th 2017 saw the biggest ever cyber attack in Internet history (yes, bigger than the Dyn DDoS). A ransomware named WannaCry stormed through the web, with the damage epicenter being in Europe.
Read more about what is ransomware and how you can protect your workstation, PC or laptop against such attacks on Heimdal Security Blog.
There is nothing new about the risk of cyber-attacks on IT and Industrial Control Systems (ICS). About a decade ago, people believed that cyber-attacks can only be launched through the internet and adopted the principle of air-gap-isolated systems. The famous Stuxnet attack (2010) was the first strong indication that cyber-attack on IT and ICS (known as Operation Technology- OT) organizations can be also launched internally after the adversary entered your facility.
Researchers at the cybersecurity firm Recorded Future recently released a report about one of its more interesting findings.
While scouring the hacker forums on the dark web, the firm’s analysts discovered someone selling MQ-9 Reaper drone documents — maintenance books, training guides, and a list of airmen assigned to the military drone. The hacker was looking for $150-200 for the documentation.
This year's CyberHub Summit will feature a live Cyber Breach Simulation with the audience actively participating. The Live Cyber Breach Simulation will feature different roles within a company, law enforcement and Cybersecurity companies all coming together to help executives overcome a real life incident.
The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.
We are of course, talking about the dark web.
As if advertising wasn't intrusive enough, 'Malvertising' the malicious form of online advertising, used to spread malware, is on the rise.
Malware, 'malicious-software' infiltrates victims computers or wireless devices to extract or attack the data held within. Standard types of malware include: Viruses, Worms; Trojan Horses; Adware; Spyware and Ransomware among a stream of others. Malvertising, the fusion of "Malware" and "Advertising" are ads that try to do the same thing.
Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.