Cyber Threats

Based on the news, one would think the greatest threat to our nation is North Korea’s looming capability to strike the continental United States with nuclear tipped intercontinental ballistic missiles (ICBMs). While the Hermit Kingdom’s ability to launch missiles with miniaturized nuclear payloads that can reach the U.S. is alarming, another threat to our national […]

by

Credit union leaders understand that the better they know members and their behavior, the better the credit union can provide products and services that meet members’ needs. If CUs understand members well enough, they can even anticipate future needs. Within the realm of cybersecurity, this same wisdom holds. The better we understand the tactics, techniques […]

by

The latest federal advisory group to examine the problem of cybersecurity has reached an all-too-familiar conclusion: the government and U.S. companies have plenty of capabilities to defend the nation from cyber attacks, but they’re scattered throughout various organizations in ways that dramatically blunt their effectiveness. But the latest study’s authors say they’re taking an approach […]

by

Earlier today researchers uncovered a new type of cyber threat that enables cyber criminals to remotely change the content of emails anytime post-delivery. Dubbed ROPEMAKER, the hackers can use this attack to avoid the target organisation’s security controls to deliver malicious emails. For example, a hacker could swap a harmless, non-dangerous URL with a malicious one in an email already […]

by

The latest federal advisory group to examine the problem of cybersecurity has reached an all-too-familiar conclusion: the government and U.S. companies have plenty of capabilities to defend the nation from cyber attacks, but they’re scattered throughout various organizations in ways that dramatically blunt their effectiveness. But the latest study’s authors say they’re taking an approach […]

by

Delaware Governor John Carney last week signed into law House Substitute 1 for House Bill 180, legislation that provides the first updates in Delaware law to address advances in cyber threats in more than a decade. The legislation requires additional protections for Delawareans whose personal information may be compromised in a computer breach, including additional […]

by

In a constantly evolving digital threat landscape where firewalls and antivirus programs are considered tools of antiquity, companies are looking to utilize more technologically advanced means of protecting crucial data. Austin, TX (PRWEB) August 22, 2017 In 2016, 357 million malware threats were detected, leaving businesses scrambling to find effective ways to protect their sensitive […]

by

Rep. Norma J. Torres (D-CA) recently convened a seminar to help local government leaders prepare for potential cybersecurity threats in Ontario, California. Federal officials from the Department of Homeland Security, the National Institute of Standards and Technology as well as private-sector professionals briefed leaders from local municipal governments and representatives from local law enforcement… read […]

by