Newly uncovered malware uses DNS requests to siphon credit card data
Normally, point-of-sale malware uses HTTP requests to exfiltrate data. Using DNS requests allows attackers to avoid detection.
Previously unknown cyber-espionage group has successfully hacked in South America since 2015
"The tools they use are sophisticated," an analyst at Symantec says.
Recent NSA leaks show challenge of a software 'solution' for insider threats
The rudimentary nature of these incidents makes it extremely difficult to create programs that keep material secure without negatively impacting workforce morale.
Creating a insider threat program that won't scare your employees
Richard Ford, Chief Scientist for Forcepoint, talks with Greg Otto about the human side of cybersecurity and how departments beyond the security team are vital to crafting a smart insider threat program.
Forcepoint, emphasizing 'human-centered' security, buys RedOwl
"If the cybersecurity industry fails to put people at the center, it is certain to fall short in helping customers protect their most vital assets,” said Forcepoint CEO Matthew Moynahan.