New "BlackRock" Android malware can steal passwords...
"A new Android malware strain has emerged in the criminal underworld that comes equipped with a wide range of data theft capabilities allowing it to target a whopping 337 Android applications."
BLUELEAK
Read original article at KrebsOnSecurity ==>
https://krebsonsecurity.com/2020/06/blueleaks-exposes-files-from-hundreds-of-pol
- Read more about BLUELEAK
- Log in to post comments
Business Continuity
Enterprise defenders, out of necessity, plan and prepare for the continued operation of the enterprise in the face of cyber or digital threats. Until now, threats commonly referred to as computer “viruses” posed the greatest threat. A paradigm shift is underway.
Due Vigilance
Maintain constant, quiet, watch-FULL, view of your enterprise. Continuously monitor key technical and human resources. Monitor vendors, partners, affiliates, and potential merger/acquisition targets. Examine, investigate, and visualize your enterprise in EXACTLY the same way that a potential threat actor would do.
Merriam-Webster defines “vigilance” as
“the quality or state of being vigilant.”
Compliance
Payment Card Industry Data Security Standard (PCI DSS) is the defining criteria by which any organization that accept credit cards achieve compliance. PCI DSS establishes baseline standards by which Personally Identifiable Information (PII) is handled.
vCIO and vCISO
Our vCIO service is designed to provide decision-makers and business-builders with practical solutions to the information technology challenges they face. Our vCIO solution is more than an arms length consulting service. Our approach is results-driven. Your success is our success.
Security Analytics
Security Analytics sounds complicated. It’s not. It is simply the process involving the continuous, near real-time, collection, analysis, and visualization of all-source logs in order to identify suspicious or anomalous activity.
The speed at which logs are created, by even small enterprises, together with the shear volume (e.g. millions of lines of entries) make it IMPOSSIBLE for a human analyst to visually inspect and detect malicious behavior.