Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

Come April, Nothing Is Certain Except Phishing and Taxes

In the past years, threat actors have made it a point to prey on U.S. taxpayers using phishing emails supposedly from the Internal Revenue Service (IRS). The goal is often to trick victims into giving their login credentials to various platforms. This year is no different.

90-Day Digital Certificate Life Cycles: Get Ahead of the Curve Now

In August 2020, we wrote an article on preparing for the reduction of certificate life cycles from two years to one. Discussions continue, and given the push for shorter certificate terms by the CA/B Forum - in particular the browsers - we predict the move to lower certificate life cycles will continue, and that terms will be reduced to 90 days within the next 24 months.

Expanding the List of Artifacts for the Recent JPMorgan Chase Squatting Campaign

On 13 March, IBM X-Force Exchange published nine artifacts -- three domain names and six IP addresses -- related to a squatting campaign targeting JPMorgan Chase and its stakeholders. We dug deeper into the list in hopes of publicizing additional artifacts that users may need to be wary of.

LexisNexis Announces Alliance With Appdetex to Bring Online Brand Protection to Europe, Middle East

Today, LexisNexis announced its alliance with Appdetex to bring online brand protection to Europe and the Middle East. This expansion with LexisNexis will enable a broader reach for us to help protect the reputation, relationships, and revenue online of global customers.

The i2Coalition Invites the Public to Help Shape the Future of VPNs

Virtual Private Networks help ensure data flows between endpoints are private and secure. This means VPN users can enhance their online anonymity, bypass geographic restrictions, secure data transfers, and more. And yet, there are still legitimate concerns that a small number of VPNs - either accidentally or intentionally - expose users to greater risk than if they hadn't used a VPN at all.

An In-Depth Look at the Risks Kozow.com Subdomains May Pose to Internet Users

Kozow[.]com hosts the website of free dynamic Domain Name System (DNS) service provider Dynu Systems. It has been cited for ties to several malicious activities over the past few months. To see if it would be a good idea for organizations to consider blocking the domain from their networks, we collated a list of kozow[.]com subdomains and subjected them to deeper scrutiny.

How Do You Choose the Best Threat Intelligence Platform for Your Company?

Experts often say every cyber threat intelligence team needs a threat intelligence platform, but what is it really and how do you choose the best one for your company? Andreas Sfakianakis, in his recent SANS Institute CTI Summit 2021 talk titled "Excelling at Threat Intelligence Platform Requirements," inspired us to take a deeper look.

Keeping Track of Ramnit through Artifact Expansion

Ramnit stands out as a malware as it continues to evolve and requires cybersecurity experts and law enforcement agents to stay alert. Variants have been recently detected, so that security companies such as Prevailion advise organizations to keep Ramnit on their radar.

A List of Potential Attack Artifacts for the Top 3 Phished Brands in 2020

In a recent study INKY subjected around 657 million emails in 2020 and found almost 5 million phishing campaigns, more than 590,000 of which were brand impersonations. It then came up with a list of the top 25 most phished brands in a 2021 report.

Why Protecting Your Brand from Online Fraud is More Important Than Ever

In a recent CSC webinar, we welcomed information security expert Robin Schouten of ABN AMRO Bank N.V. to share his thoughts and experiences of online fraud during the onset of the coronavirus pandemic.