Cyber Security has become a requirement

Not only to protect commerce financially, but also legally...

you are a target

everyone is a victim

demand is growing

it can not be met

figures show

astonishing trends

Right now businesses are being pressured more and more to invest in additional security services in the attempt to keep up with evolving dangers. The consequences of not being prepared are/will be catastrophic for companies and their customers. In the process of deciding how to establish and operate a business, many business owners of varying power and influence hardly take into consideration the guaranteed attack on their information technology investments. If leadership does not lead by example, department managers will be uneasy about delegating to subordinates the required implementation of common sense computing safeguards.

this is JUST THE BEGINNING

the world and almost all technology is connected

With so many people on the planet having access to technology. With so many governments and markets being co-dependent on each other; the negative consequences of computer systems having control over civilization is endangering not only personal identities or payment transactions, but also national infrastructure safety and environmental integrity.

A Human Rights concern

cyber criminals and spies preying on the innocent

Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Recent Posts

October 12

30 Million FB User Accounts Totally Exposed

The new details come two weeks after Facebook first announced that attackers had access to 50 million users' accounts info. This time the area where they live, their relationship status, their religion, and part of their search history. Read More...

October 11

Hetzner South Africa Hacked Yet Again

The company said the attacker managed to gain access to customer details such as names, email addresses, phone numbers, addresses, identity numbers, VAT numbers, and bank account numbers. Read More...

October 10

E.U. Expects First GDPR Fines by Year-End

European data protection regulators will soon start issuing the first fines and temporary bans against companies found to have breached the General Data Protection Regulations (GDPR), with the first round of sanctions expected by the end of the year. Read More...

October 9

Garmin Shipping Nav. Unit Suffers Breach

Navionics, an Italian company that manufactures electronic navigational charts for boating, was the victim of customer data breach that exposed hundreds of thousands of customer records. Read More...

October 8

Google+ Shutting Down After Account Leaks

An API bug that leaked the personal information of up to 500,000 accounts was covered up. An internal committee at Google decided not to disclose the bug even though they were not 100% sure that it was not abused. Read More...

Spotlight

CTA: The Illicit Cryptocurrency Mining Threat


The Cyber Threat Alliance (CTA) is the industry's first formally organized group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries..

The threat of illicit cryptocurrency mining represents  an increasingly common cybersecurity risk for  enterprises and individuals, with mining detections increasing 459 percent between 2017 to 2018. As  the values of various cryptocurrencies increase and  they are used more often, malicious cyber actors  are using computers, web browsers, internet-of-things (IoT) devices, mobile devices, and network infrastructure to steal their processing power to mine cryptocurrencies. Combined threat intelligence from CTA members show that this rapid growth shows no signs of slowing down, even with recent decreases in cryptocurrency value.

By: CTA Contributing Authors - David Liebenberg, Charles McFarland, Michelle Martinez, Jerome Cruz, Fred Guiterrez, Anthony Giandomenico, Terrance DeJesus, Andrew Brandt, Josh Grunzweig, Neil Jenkins, Scott Scher