Cyberattacks

logsign

What is CSIRT? What are CSIRT Roles and Responsibilities?

What is CSIRT? CSIRT (pronounced see-sirt) refers to the computer security incident response team. The main responsibility of the CSIRT is to expose and avert cyber attacks targeting an organization. As the number of cyber threats grow each and every day, the importance of having a security team that is solely focused on incident response (IR) is fundamental.

alienvault

Category 1 cyber threat for UK businesses

Britain should be prepared for a Category 1 cyber security emergency, according to the National Cyber Security Centre (NCSC). This means that national security, the economy, and even the nation’s lives will be at risk. However, despite this harsh warning, UK businesses still aren’t taking proactive and potentially preventative action to stop these attacks from happening. So just where are UK businesses going wrong and can they turn things around before it’s too late?

nnt

DDoS Attack Knocks Parts of Wikipedia Offline

Wikipedia was knocked offline in several countries after being hit by a coordinated Distributed Denial of Service (DDoS) attack over the weekend. The Wikimedia Foundation made a statement claiming that the company's server suffered a "massive" DDoS attack and that its Site Reliability Engineering team is working to stop the attack and restore services.

upguard

What Is a Man-in-the-Middle Attack and How Can It Be Prevented

A man-in-the-middle attack (MITM attack) is a cyber attack where an attacker relays and possibly alters communication between two parties who believe they are communicating directly. This allows the attacker to relay communication, listen in, and even modify what each party is saying. Man-in-the-middle attacks enable eavesdropping between people, clients and servers. This can include HTTPS connections to websites, other SSL/TLS connections, Wi-Fi networks connections and more.

sqreen

Developer security best practices: protecting against timing attacks

One of the great things about security is that there is always more to learn. When you’re protecting your applications and users, understanding the kinds of attacks bad actors may attempt can help you get a better sense of how you should protect your applications and the kind of business logic threats you may be exposed to. In this article, we’re going to take a look at timing attacks.

upguard

What is a Cyber Threat?

A cyber threat (or cyber security threat) is the possibility of a successful cyber attack that aims to gain unauthorized access, damage, disrupt, or steal an information technology asset, computer network, intellectual property or any other form of sensitive data. Cyber threats can come from within an organization by trusted users or from remote locations by unknown parties.

nnt

NATO - Cyber Attack on One Will Trigger Full NATO Response

NATO Secretary-General Jens Stoltenberg claimed this week that a serious cyberattack on one member country would trigger a response from all member countries. Stoltenberg claims such an event would trigger a 'collective defense commitment', known commonly as Article 5, an attack on one member of NATO is an attack on all of its members. Article 5 has been involved once in its history - in response to the terrorist attacks on the United States on September 11, 2001.

tripwire

Disruption: The True Cost of an Industrial Cyber Security Incident

Industrial control systems are essential to the smooth operation of various national critical infrastructure. While once segmented from the web, these systems are now becoming increasingly more networked and remotely accessible as organizations transform to meet the digital age. This development potentially exposes industrial control systems to digital threats.

upguard

What is a Cyber Attack?

A cyber attack (or cyberattack) is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to a computer system, infrastructure, network, or any other smart device. In some cases, cyber attacks can be part of a nation-states cyber warfare or cyber terrorism efforts, while other cybercrimes can be employed by individuals, activist groups, societies or organizations. Strong organizational wide cyber security controls are now more important than ever.

bulletproof

What is The Cyber Kill Chain?

The cyber kill chain illustrates the structure of a successful cyber attack. It is effectively the hacker’s process from beginning to end, from scoping a target (reconnaissance) all the way to achieving their objective, whether that’s data theft or dropping and executing malware. When approaching your cyber security strategy, you should align your defences to the cyber kill chain. Like Batman becoming fear, to defeat the hacker, you must become a hacker.