Top news of the week: 19.06.2020.

#cybersecurity #infosec #cybersecuritynews #security #ITsecurity #CISO #infosecurity #FinancialServices #CiscoLive #SecureX

Threats And Attacks

On Jun 18, 2020
@attcyber shared
238% increase in cyberattacks in the #FinancialServices industry since COVID-19 - see details on more trends including an increase in island hopping attacks https://t.co/GX5Vsz22se @SCMagazine #cybersecurity #infosec https://t.co/RJgrYFZil7
Open

Cyberattackers raising stakes in financial sector, security experts tell House subcommittee

Cyberattackers raising stakes in financial sector, security experts tell House subcommittee

Cyberattacks on the U.S. financial sector amid COVID-19 rose 238 percent over the first five months of 2020, VMware/Carbon Black told Congress during a

On Jun 18, 2020
@vmw_carbonblack shared
RT @helpnetsecurity: Cybercriminals banking on finance: Mitigating escalation - https://t.co/dg3KYKBZyb - @TAKellermann #cybersecuritynews @vmw_carbonblack #CISO #ITsecurity #cybersecurity #infosec #security #infosecurity https://t.co/JHGlfpwuo0
Open

Cybercriminals banking on finance: Mitigating escalation

Cybercriminals banking on finance: Mitigating escalation

Cybercriminals are becoming more sophisticated, leveraging highly targeted social engineering attacks and advanced procedures for hiding malicious activity.

On Jun 19, 2020
@ForbesTech shared
As businesses reopen, a new storm of cybercrime activity looms https://t.co/F3K4UKRSTs by @esayegh
Open

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

A rapid rise of opportunistic cybercriminals are taking advantage of the chaos created by COVID-19. Rethinking IT and security strategies will ensure that businesses avoid long-term damage.

On Jun 18, 2020
@threatpost shared
Fighting Cyber Attacks with Game Theory https://t.co/arv5d3lPor
Open

Fighting Cyber Attacks with Game Theory

Fighting Cyber Attacks with Game Theory

Game theory is used in cybersecurity to observe the nature of a cyber incident— where network defenders, attackers, and users, interact and produce outcomes.

On Jun 16, 2020
@CiscoUmbrella shared
RT @ChuckRobbins: We’re bringing simplicity and automation to security with #SecureX. Amazing to see this in action during #CiscoLive! Thanks @geerittenhouse for sharing this with our customers and partners today! https://t.co/qdDWjoXeg1 https://t.co/SWBzHnVZJA
Open

Cisco Radically Simplifies Security for Today’s Accelerated IT Agenda

Cisco Radically Simplifies Security for Today’s Accelerated IT Agenda

With remote work on the rise, CISOs can leverage SecureX to achieve unified visibility across Cisco security products, automate workflows, and quickly remediate threats. SAN JOSE, …

On Jun 18, 2020
@Treadstone71LLC shared
China's Cyberatacks on Indian Govt Websites (ISRO, NIC, and PMO) https://t.co/ziKm88hYW7 #cybersecurity
Open

China’s Cyber Warfare Threats Against India

China’s Cyber Warfare Threats Against India

After the US accusing China of using spying on them using various technologies, now Indian shares the same. A post made by Brigadier Saurabh Tewari in the United Service Institution of ...

On Jun 15, 2020
@DarkReading shared
Ryuk Continues to Dominate Ransomware Response Cases https://t.co/8wx5PPiBeJ by @kellymsheridan #Ryuk #ransomware #cybercrime #incidentresponse
Open

Ryuk Continues to Dominate Ransomware Response Cases

Ryuk Continues to Dominate Ransomware Response Cases

Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.

On Jun 17, 2020
@SCMagazine shared
The "Awareness, Decisions & Devices: The Human Layer of Security" session track at InfoSec World 2020 will show it's possible to boost awareness and spark the kind of cultural change needed to bolster human-based security. #InfoSecWorld @InfoSec_World https://t.co/v7uTXMzTVP
Open

Microsoft’s Kelley: Six principles that influence people to say yes can be leveraged to thwart social engineering

Microsoft’s Kelley: Six principles that influence people to say yes can be leveraged to thwart social engineering

Behind nearly every cybersecurity incident there’s a person who was either unwittingly duped or with malicious intent breached an organization from the