The U.K.'s Dixons Carphone is investigating a data breach that resulted in the suspected exposure of 5.9 million payment cards and nonfinancial information for 1.2 million customers. The incident could become the first U.K. breach to fall under the EU's General Data Protection Regulation.
PageUp, an HR software developer in Australia with clients worldwide, is warning that malware-wielding attackers may have accessed a raft of personal data stored in its systems. The breach may be the largest to have hit Australia since its mandatory data breach notification law went into effect in February.
Many enterprises provide third-party remote application access in the same ways they did 20 years ago. From occasional access for a third-party contractor to the complete outsourcing of services, enterprises are opening their networks through VPNs, proxies, and remote desktops technologies.
However, two key...
While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses.
But this infrastructure doesn't have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can...
Although every action on the Internet relies on the Domain Name
System (DNS), many organizations fail to install corresponding
safeguards.
Download this whitepaper and learn why:
Malicious actors have evolved their methods to leverage the
vulnerabilities of recursive DNS
Attacks that...
How are you proactively protecting your network from targeted threats? Many businesses are turning to a zero trust security strategy to "verify, but never trust" all users and devices. This is an
especially relevant approach as we examine the inherent risk that users and devices pose through outbound DNS requests....
Malicious actors are increasingly utilizing the recursive DNS
infrastructure to launch damaging phishing attacks, malware and
ransomware campaigns, and data exfiltration against companies.
Proactively protecting your company against such threats at the
DNS control-point, as opposed to retroactive...
Traditional hub-and-spoke networking architectures, and the
castle-and-moat they utilize, aren't amenable for today's
burgeoning cloud-and-mobile world.
A zero trust and access model is the solution: Every machine,
user, and server should be untrusted until proven otherwise. But
how do you achieve...
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated.
This white paper describes a security...
Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and...
South Korean cryptocurrency exchange Coinrail says hackers stole 30 percent of all of the cryptocurrency tokens it was storing, but many have been successfully frozen or recalled. Security experts say cryptocurrency exchanges remain poorly secured, so they're popular targets for hackers.
Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.
Identity management is becoming increasingly important in this era where massive data breaches and credential harvesting are a regular occurrence. To make matters worse, mobility and cloud have increased the attack surface. Businesses that have unreasonable expectations from users on access hygiene and rely on...
Experian is transforming from a credit reporting agency to a customer-driven data services company, and at the heart of all its services lies the need for secure, user-friendly authentication at every stage of the employee and customer experience. That's no small task, and they had to start with an established...
Australian HR service provider PageUp, which serves a variety organizations worldwide, says malicious software on its systems may have compromised client data as well as usernames and passwords. PageUp believes systems that store documents, resumes and employment contracts are not affected.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.