Wednesday, September 30, 2020

Ransomware attacks, demands surged in Q2; Plus, U.S. election security woes

 
Security Digest
Information security news and advice from TechTarget's network |September 30, 2020
TechTarget
FEATURED STORY
IBM: Ransomware attacks surged in Q2, ransom demands rising

by Arielle Waldman, News Writer

IBM Security examined several concerning ransomware attacks from this year, as well as an exponential increase in ransom demands and massive spike in attacks during the spring.

Advertisement
NEWS
 
FBI: Disinformation attacks on election results 'likely'
Foreign threat actors and cybercriminals are 'likely' to spread disinformation around 2020 election results through social media and also alter election-related websites.
 
ConnectWise launches bug bounty program to boost security
ConnectWise, which provides remote management software to MSPs, partnered with HackerOne in its first bug bounty program, which is part of a larger strategy to improve security.
 
Shopify discloses data breach caused by insider threats
Canadian e-commerce company Shopify disclosed a data breach involving two insider threats, but questions remain about the breach and how it was discovered.
 
Microsoft detects Netlogon vulnerability exploitation in the wild
While Microsoft released a patch last month for the Netlogon flaw, the company said it detected threat actors using exploits for the critical vulnerability.
EXPERT ADVICE
 
Cybersecurity team structure stronger with 3 new roles

Having the right cybersecurity team in place can help reduce how long it takes to control threats. Consider adding cloud security, third-party risk and digital ethics specialists.

 
7 SOC automation use cases to augment security operations
Implementing SOC automation can have far-reaching benefits for an organization's infosec program and security culture. Learn how by exploring these seven use cases of AI in SOCs.
 
5 key enterprise SOC roles and responsibilities in 2020

Review the key players in the 2020 SOC and their specific responsibilities, as well as best practices to ensure effective teamwork for a secure organization.

 
Cybersecurity testing essentials for mergers and acquisitions
Before moving forward with an M&A, conduct some cybersecurity testing to ensure your company knows how the acquired company protects data, employees and customers.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: