Monthly Archives: March 2019

Operation eligible receiver – the birthplace of cyber security: vulnerabilities

by Josh Paape More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of […]

Posted in Cyber Security News | Comments Off on Operation eligible receiver – the birthplace of cyber security: vulnerabilities

Top 10 tips for word-press website security

By Julia Sowells, Security Expert, Hacker Combat               WordPress, which is a very commonly used CMS, powers a third of the world’s websites. An […]

Posted in Cyber Security News | Comments Off on Top 10 tips for word-press website security

Local backups may not keep your business safe from ransomware

by Karl Zimmerman In the last few years, a series of devastating ransomware attacks have cost businesses billions of dollars. Ransomware doesn’t discriminate: businesses of all sizes have been hit […]

Posted in Cyber Security News | Comments Off on Local backups may not keep your business safe from ransomware

Want to protect your online customers? Keep your website safe

By Pedro Fortuna, Co-founder and CTO Jscrambler How would you know if your users were being compromised on the client-side whilst logging on to their bank account online? How confident […]

Posted in Cyber Security News | Comments Off on Want to protect your online customers? Keep your website safe

How to protect your business from cyber-attacks?

By Ravindra Savaram, Vmonlinetraining and Tekslate Introduction Cyber threats have become a scary reality with a high percentage particularly targeting individuals and businesses. No matter what the company’s government stature […]

Posted in Cyber Security News | Comments Off on How to protect your business from cyber-attacks?

Best practices for ddos mitigation in the terabit attack era

By Tom Bienkowski, Director, DDoS Product Marketing, NETSCOUT Arbor IoT botnets changed the DDoS attack landscape, but not necessarily in the way, many people thought they would. The Mirai IoT […]

Posted in Cyber Security News | Comments Off on Best practices for ddos mitigation in the terabit attack era

A new AZORult C++ variant can establish RDP connections

Experts from Kaspersky observed a new C++ version of the AZORult data stealer that implements the ability to establish RDP connections. The AZORult Trojan is one of the most popular […]

Posted in Cyber Security News | Comments Off on A new AZORult C++ variant can establish RDP connections

The impact of soar on incident response steps

How automation and orchestration affect nest’s framework for incident response By Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security As cybersecurity incidents such as phishing scams, ransomware attacks, and user […]

Posted in Cyber Security News | Comments Off on The impact of soar on incident response steps

2018 is late but still the right time to bid goodbye to malware prone SMBv1

Upgrade to an encrypted SMB version 3 By Tal Widerman, Marketing Manager, Visuality Systems 2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1 Much […]

Posted in Cyber Security News | Comments Off on 2018 is late but still the right time to bid goodbye to malware prone SMBv1

Let passwords go extinct

OR, IT’S TIME FOR PASSWORDS TO EVOLVE by Chris Mindel, Marketing Manager, Dexter Edward LLC Passwords are Dinosaurs Let’s face it: passwords have become part of the cybersecurity problem. That […]

Posted in Cyber Security News | Comments Off on Let passwords go extinct

Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

Norwegian aluminum giant Norsk Hydro estimates more than $40 million losses in the first week following the ransomware attack that disrupted its operations. Last week Norwegian Norsk Hydro, one of the […]

Posted in Cyber Security News | Comments Off on Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

Hackers raised fake tornado alarms in two Texas towns

Hackers took control of the emergency tornado alarms in Texas causing the panic, it has happened on March 12th, at around 2:30 a.m., On March 12th, at around 2:30 a.m. […]

Posted in Cyber Security News | Comments Off on Hackers raised fake tornado alarms in two Texas towns

Cyber security tips for business travelers

by Luke Adshead, Cyber Security Tips for Business Travelers, Northdoor It doesn’t matter whether you are traveling the world to ‘find yourself’ or you are on a business trip from NY […]

Posted in Cyber Security News | Comments Off on Cyber security tips for business travelers

The new way to impact opinions and politics

Psychological operations are upgrading to the 21st cyber century and impacts politics, economies and societies. by Julien Chesaux, Cyber Security Consultant, Kudelski Security Cyber but not New Fake news, disinformation, […]

Posted in Cyber Security News | Comments Off on The new way to impact opinions and politics

Transforming cyber security

By Dr. Simon Wiseman, CTO, Deep-Secure Deep-Secure CTO Dr. Simon Wiseman explains how content threat removal is a game-changer in the battle to ensure business content is threat-free by using […]

Posted in Cyber Security News | Comments Off on Transforming cyber security

Where do I “Sign”?

A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The fundamentals of data security is defined as applying techniques, procedures and other means to protect the confidentiality, availability, […]

Posted in Cyber Security News | Comments Off on Where do I “Sign”?

Spear-phishing Is The Next Threat After A Data Breach

Employees’ awareness must be a mandatory routine. by Pedro Tavares,  CSIRT.UBI and seguranca-informatica.pt Founder During the last years, we have observed a tremendous number of data breaches that have made […]

Posted in Cyber Security News | Comments Off on Spear-phishing Is The Next Threat After A Data Breach

Role of Identity and Access Management (IAM) in Cyber Security

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc In today’s digitally enabled world, Identity and Access Management (IAM) plays a critical role in any enterprise security plan, as it […]

Posted in Cyber Security News | Comments Off on Role of Identity and Access Management (IAM) in Cyber Security

Simplifying Cybersecurity Deployments with Automation

Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your infrastructure without affecting it. Following this analogy, it’s vital to have a system […]

Posted in Cyber Security News | Comments Off on Simplifying Cybersecurity Deployments with Automation

Operation ShadowHammer – Supply-Chain attack hit ASUS users

Operation ShadowHammer – ASUS is the last victim of a clamorous supply chain attack that delivered a backdoor to more than one million users, Kaspersky Lab reported. Over 1 million […]

Posted in Cyber Security News | Tagged , , , | Comments Off on Operation ShadowHammer – Supply-Chain attack hit ASUS users

Malware Basics

And a brief on new Self-updating, Anti-viral Malicious Software

Posted in Cyber Security News | Comments Off on Malware Basics

Five GDPR Mistakes that Will Put Your Company in Hot Water

by Steve Dickson, CEO, Netwrix Only 29 percent of small businesses and 41 percent of midsize businesses in Europe have taken steps to prepare for the GDPR, according to IDC, and […]

Posted in Cyber Security News | Comments Off on Five GDPR Mistakes that Will Put Your Company in Hot Water

How Do We Get Privacy?

Revisiting the Basics and Importance of Cryptography By Joe Guerra, Cybersecurity Instructor, Hallmark University Since the onset of technology in society, it has broken the levees of data and has […]

Posted in Cyber Security News | Comments Off on How Do We Get Privacy?

Packet Capture Technology is Critical for InfoSec and Regulatory Compliance

This is the first of two articles on packet capture and its vital role in network cyber security.   We’ll cover important aspects of the role of effective packet capture in […]

Posted in Cyber Security News | Comments Off on Packet Capture Technology is Critical for InfoSec and Regulatory Compliance

Rampart de Troika: A Three-Step Process to Overcome Cyber security’s Top Threat

by Daniel Jetton, Vice President of Cyber Services, OBXtek The weakest link in most network security is human; however, recent research has determined an effective, three-part process to mitigate the […]

Posted in Cyber Security News | Comments Off on Rampart de Troika: A Three-Step Process to Overcome Cyber security’s Top Threat

Cyber criminals are searching for the chink in your armor

Learn to find it before they do Source:  Regent University Cybercrime is nothing if not dynamic. As soon as bad actors are identified by local site personnel—whether they are adversarial […]

Posted in Cyber Security News | Comments Off on Cyber criminals are searching for the chink in your armor

Why Smartphone Security Should Grow Beyond Biometrics

After passwords and traditional biometrics, behavioral biometrics is transforming the security of smartphones by Alex Miller An average user either uses a PIN, pattern or a password to secure his phone. […]

Posted in Cyber Security News | Comments Off on Why Smartphone Security Should Grow Beyond Biometrics

Cyber Forensics: An Academic Partnership with Pittsburgh Technical College

by Professor Phil Grabowski One of the most important aspects to get a Cyber Security or Security Forensics job is to show evidence of work experience, internships, certifications, participating in […]

Posted in Cyber Security News | Comments Off on Cyber Forensics: An Academic Partnership with Pittsburgh Technical College

From Theory To Practice: 5 Applications Of Threat Intelligence

by Jonathan Zhang, Founder, and CEO, Threat Intelligence Platform Threat intelligence (TI) has caught the eye of CSOs and cybersecurity teams seeking to fight cybercrime strategically while allocating IT security […]

Posted in Cyber Security News | Comments Off on From Theory To Practice: 5 Applications Of Threat Intelligence

5 Common Incident Response Problems that Automation and Orchestration Can Help Solve

by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security Most companies that are struggling with their incident response program fall into two categories: They don’t realize what their problems are, […]

Posted in Cyber Security News | Comments Off on 5 Common Incident Response Problems that Automation and Orchestration Can Help Solve

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X