Cygilant Blog

How to Bolster Your IT Security Program

Posted by Security Steve on Feb 23, 2016

With today’s elevated security threat level and related economic impact, it makes sense to do everything you can to secure your organization’s servers, desktops, and devices. How do you keep the bad guys out while securing and enabling day-to-day business? Many companies use SIEM tools for threat detection, compliance, and asset protection. I’d like to suggest a couple of additional layers of security.


An effective security program is a balance of people, process, and technology. When evaluating an IT security monitoring solution, it is important to consider each of these areas in the decision-making process. Your organization also needs to determine which areas should be handled internally and which should be co-managed with a trusted partner. Let’s take a look at each:


BitDefender Customer Data Breached

Posted by Vijay Basani on Aug 12, 2015

BitDefender, a cybersecurity and anti-virus firm, was hacked in late July by a hacker who went by the name DetoxRansome. The hacker revealed on Twitter that he was behind the cyber attack, and then demanded $15,000. DetoxRansome threatened to leak the stolen data online if BitDefender did not comply with his demands. The hacker published the email addresses and passwords for two BitDefender customer accounts to prove that the company’s customer data had been compromised. The hacker also leaked the login credentials to a BitDefender company account. The Romanian cybersecurity firm is working with authorities to find the hacker.

Keyboard Vulnerabilities Found in Samsung Devices

Posted by Vijay Basani on Jul 15, 2015

A bug found in the way Samsung mobile devices update their default SwiftKey keyboards has left over 600 million devices vulnerable to a security breach. The bug leaves devices vulnerable to man in the middle attacks because the SwiftKey keyboard looks for language pack updates over unencrypted lines. The bug lets hackers execute code as privileged users, and send malicious security updates to devices through spoof proxy servers. Hackers can siphon text messages, contact data, and financial log-ins from banking apps. The bug also lets hackers turn on the device’s camera, microphone, and GPS, and allows them to eavesdrop on phone calls.

Infections Increase with Click Fraud Malware

Posted by Vijay Basani on Jul 8, 2015

Cyber security company Damballa released their 2015 “State of Infections Report,” which found that computers that have click fraud malware installed are more likely to be infected by other types of malware in the future. Click fraud malware runs in the background and clicks on ads in order to get money out of pay-per-click advertisers. The malware has cost businesses $6 billion per year in wasted money, the Association of National Advertisers said. Because the malware has directly resulted in financial losses for advertisers, this malware sounds harmless to consumers and enterprises. However, click fraud malware opens the gateway for other malware to get through.

LastPass Become Victims of Data Breach

Posted by Vijay Basani on Jul 1, 2015

Online password organizer LastPass announced in a blog post that their services were breached a few weeks ago. Attackers were able to compromise email addresses, password hints, server per user salts, and authentication hashes, but they were not able to compromise master passwords, or individual passwords.

Cyber Breach at CareFirst Affects Millions

Posted by Vijay Basani on Jun 10, 2015

Health insurance company CareFirst BlueCross BlueShield revealed that their customer data had been breached through a cyber attack. As many as 1.1 million customers and former customers were affected by the breach, which occurred last year in June. The company only discovered the breach in May when they decided to increase their cyber security after the breaches at Anthem Health Insurance and Premera Blue Cross. According to security experts, CareFirst’s databases were targeted by skilled cyber criminals who have targeted other health insurance companies in the past.

EiQ Networks Launches AWS SOCVue Portal for Real-Time CyberThreat Visibility

Posted by Vijay Basani on May 20, 2015

Cybercriminals have small businesses worrying that their networks will be the next targets. With large corporations like JP Morgan and Home Depot admitting that they’ve been victims of a cyber breach, small businesses worry that their networks aren’t secure enough to prevent or withstand a cyberattack. Small businesses need continuous security monitoring, but they don’t have the financial resources of large enterprises.

Security as a Service

Posted by Security Steve on May 15, 2015

One of the most anticipated information security industry reports has got to be Verizon’s annual Data Breach Investigations Report (DBIR). Released this month, it dissected thousands of confirmed data breaches and security incidents from around the globe into emergent and shifting trends.  (If you haven’t downloaded the complete report, we definitely encourage you to do so.)

Sophisticated Phishing Scams Still Tricking Employees

Posted by Vijay Basani on Apr 29, 2015

According to Verizon’s annual Data Breach Investigations Report, there were over 2,000 confirmed security incidents and data breaches in 2014. These data breaches have cost companies around the world around $400 million. The study found that most of the time, hackers were able to compromise victims within days. Unfortunately, the hacked companies did not immediately discover that their networks had been compromised. In Verizon’s analysis of the data, they found that half of the affected organizations discovered malware events during 35 or fewer days. Seventy to 90% of malware samples were unique to a single organization.

GitHub Suffers DDoS Attack from China

Posted by Vijay Basani on Apr 8, 2015

GitHub, the world’s largest host for collaborative coding projects, disclosed that they are facing the largest DDoS attack in the company’s history. The attack began on Thursday and continued into Monday. The DDoS attack took traffic from China’s largest search engine, Baidu, and directed it to GitHub. The onslaught of large amounts of traffic stopped GitHub’s website from functioning properly. The DDoS attack is caused by “some nefarious JavaScript that is being injected by a certain device at the border of China’s inner network and the Internet when people use Baidu,” according to Ars Technica.

Most Recent Posts

Subscribe to Email Updates