Cyber Mayhem in the 2016 Election?  You Betcha!

Posted by Greg Mancusi-Ungaro

Wed, Nov 02, 2016

Download the FREE BrandProtect eBOOK

CYBER SECURITY IMPLICATIONS OF ELECTION 2016

A Practical Guide for Business Leaders (or Politicians) to Protect
Themselves from Cyberattacks and Misinformation

The 2016 campaign has not only dramatically shifted perceptions
of politics and society, but also revealed the immediate and future challenges that face cybersecurity and digital governance professionals.  

In this eBOOK from BrandProtect, Greg Mancusi-Ungaro and Dylan Sachs chronicle some the spectacular cyber exploits that highlighted the elections, and how they serve as a object lessons for CISOs and Digital Governance professionals everywhere.  

Read More

Topics: 2016 Elections

November Threat Brief: Risk Ahead!

Posted by Greg Mancusi-Ungaro

Tue, Nov 01, 2016

 

From Elections Exploits to Bogus Black Friday Promotions, November is a holiday season for Cyber Criminals!

This month's BrandProtect Executive Threat Brief focuses in on the many traps that cyber criminials will set for you during this crazy time. Some will spring from the upcoming elections, others will be retail-shopping related, but all will be dangerous! 

Download this month's threat brief and learn more!

Read More

Topics: black friday, cyber monday, 2016 Elections, ThreatBrief

The IoT Attack is Fascinating. It Puts Even More Emphasis on External Threats.

Posted by Greg Mancusi-Ungaro

Tue, Oct 25, 2016

Last Friday, cyber security experts were on the edge off their seats, mouths agape, as they monitored the progress (and effectiveness!) of the DDoS attack on Internet infrastructure provider DYN.  Last week’s attack differed from past attacks because the attacks were launched not from traditional devices, but from 10s of millions of discrete devices. Here’s what DYN said about the attack in their official statement of 10/21/2016:

At this point we know this was a sophisticated, highly distributed attack involving 10s of millions of IP addresses. We are conducting a thorough root cause and forensic analysis, and will report what we know in a responsible fashion. The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.

Today, 48+hours removed from the original attack, we know a lot more... 

Read More

Topics: Social Media Monitoring, cyber threats, External Threat, IoT

Reacting to Yahoo: How to play defense against Yahoo-inspired attacks

Posted by Greg Mancusi-Ungaro

Mon, Oct 03, 2016

Whether or not the Yahoo hack affected you directly, you can be sure that cyber criminals are using the news to propel a new wave of cyber attacks that probably will. 

The October BrandProtect Executive Threat Brief anticipates those attacks, and gives you and your family a quick primer on what you can do to stay safe during this new "phishing season". 

Read More

Topics: data breach, Phishing, cybercrime, ThreatBrief

Thanks to Yahoo!, there are 500,000,000 new reasons CISOs should think more about external threats

Posted by Greg Mancusi-Ungaro

Fri, Sep 23, 2016

 

Sad to say, but yesterday's Yahoo! news could not have been that surprising. Yahoo joins LinkedIn, Gmail, Twitter and Facebook in the pantheon of leading social networks that have suffered (very public) large-scale data breaches. Healthcare providers like Anthem, Blue Cross and many others are also members of this exclusive club. 500 million records is a lot of records, but truly, it's getting to the point where the world is awash in stolen records....

It is also not surprising that many the stories appearing today highlight the steps a company should take AFTER it has been hacked, like this one on MSNBC.  But do stories like these really solve anything?

Pundits are fond of saying "it's not IF you'll get hacked, but WHEN you'll get hacked," but that doesn't mean that enterprise security teams should roll over and await their fate. There are lots of things that enterprises can do BEFORE they get hacked that should reduce their risks from a large number of external threats...

Read More

Topics: data breach, Phishing, Spear Phishing, CISO, External Threat, Executive Threat, Masquerades

Say it Ain't So! Serena & Venus Williams, Simone Biles, Compromised in Cyber Hack of WADA

Posted by Greg Mancusi-Ungaro

Wed, Sep 14, 2016

 

Vendetta?  Absolutely.

Read More

Topics: data breach, Spear Phishing, BEC Attacks, Social Engineering, External Threat

Make Online Safety a Family Priority

Posted by Greg Mancusi-Ungaro

Thu, Sep 01, 2016


Summer is over, school is back in session, and social activity is amping up everywhere. The increase of online activity, driven by school and family activity, raises the odds that you and your family will be exposed to cyber criminals.

Read More

Topics: Phishing, online identity, cyber threats, mobile malware, online risk, ThreatBrief, Masquerades

Dinner with Donald Trump?  Or Maybe Not??

Posted by Greg Mancusi-Ungaro

Tue, Aug 30, 2016

Ian Hawes wants you to have dinner with Donald Trump.  He is a 25-year old, self-proclaimed entrepreneur, and “registered genius."  Ian’s story broke Monday morning on Politico and it is a cautionary tale for anyone who values their online reputation. 

Read More

Topics: Domain Management, cybersquatting, 2016 Elections, Brand Threats, fraud, Masquerades

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all