Monthly Archives: June 2019

Why Deception Technology Will Change the Game in Our Favor Against Cyber crime and Breaches

By Gary S. Miliefsky As I said in my recent presentation on Time-based Security, which was first discovered and written about by Winn Schwartau in his book of the same […]

Posted in Cyber Security News | Comments Off on Why Deception Technology Will Change the Game in Our Favor Against Cyber crime and Breaches

Reviewing Last Month’s Ransomware

By David Balaban There were hardly any massive ransomware outbreaks last month, however, outbreaks continued. The criminals must have been busy prepping for the holidays. The online extortion activity didn’t […]

Posted in Cyber Security News | Comments Off on Reviewing Last Month’s Ransomware

The 3 “Must Haves” for Improving Any Company’s Security Posture

Continuous Monitoring, Little To No Burden on The Network And Easy To Understand, Prioritized Reporting Top List For CISOS And CIOS By Jeff Elliott Cyber-attacks are growing more sophisticated, frequent, […]

Posted in Cyber Security News | Comments Off on The 3 “Must Haves” for Improving Any Company’s Security Posture

5 Things to Consider while using Unsecured Open Wi-Fi

BY MOHIT SHARMA, CONTENT WRITER, MALWAREFOX Open Wi-Fi networks are a dream for all of us. They allow us to use the web from pretty much anywhere and no matter […]

Posted in Cyber Security News | Comments Off on 5 Things to Consider while using Unsecured Open Wi-Fi

Insider Threat Mitigation Training this Summer

While most CISO’s, IT Executives and Staff are planning out a relaxing summer with their families – vacations, barbecues and cookouts, camping and fishing, a disgruntled employee may be planning […]

Posted in Cyber Security News | Comments Off on Insider Threat Mitigation Training this Summer

Rootkit Redux

REVISITING A PRIOR ISSUE by DRP; Cybersecurity Lab Engineer In season 1 of Mr. Robot, the much-exalted series, one of the female lead actors asks innocently during one of the […]

Posted in Cyber Security News | Comments Off on Rootkit Redux

KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg

By Tae Jin “TJ” Kang By lining homes, offices and industrial sites with wireless sensors and devices, we continue to set the stage for profound changes in productivity, security, and […]

Posted in Cyber Security News | Comments Off on KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg

A New Security Approach in the Age of Cyber Warfare

By Chris Day, CISSP – Chief Cybersecurity Officer, Cyxtera Adversaries are waging cyber warfare daily to create confusion and cause disruption for strategic or military purposes. You need only look […]

Posted in Cyber Security News | Comments Off on A New Security Approach in the Age of Cyber Warfare

How To Implement an Effective Vulnerability Management Program

By Stephen Newman, Secureauth/Core Security The September Equifax data breach that put more than 140 million people at risk of identity theft and financial fraud could have been prevented. A […]

Posted in Cyber Security News | Comments Off on How To Implement an Effective Vulnerability Management Program

The Riviera Beach City pays $600,000 in ransom

The Riviera Beach City, Florida, agreed to pay $600,000 in ransom to decrypt its data after a ransomware-based attack hit its computer system. The Riviera Beach City Council voted unanimously […]

Posted in Cyber Security News | Comments Off on The Riviera Beach City pays $600,000 in ransom

Cyber-security in 2018 – The Kosciuszko Institute publishes experts’ forecasts

As in previous years, we have asked the experts who are members of the European Cybersecurity Forum – CYBERSEC community and who represent the public sector, the academia and the […]

Posted in Cyber Security News | Comments Off on Cyber-security in 2018 – The Kosciuszko Institute publishes experts’ forecasts

The State of PKI Management

Where We Are, and Where We Need to Be By Danielle Adams, Freelance Writer, Venafi Public Key Infrastructure (PKI) is the foundation of secure communications on the internet. That said, […]

Posted in Cyber Security News | Comments Off on The State of PKI Management

Modular Plurox backdoor can spread over local network

Kaspersky experts recently discovered a backdoor dubbed Plurox that can spread itself over a local network and can allow installing additional malware.  Kaspersky experts discovered the Plurox backdoor in February, […]

Posted in Cyber Security News | Comments Off on Modular Plurox backdoor can spread over local network

Insider vs. External Threats: The Greatest Threat Lurks Within

by Tim Brown, vice president of security, SolarWinds The cybersecurity landscape is more sophisticated now than ever before; from spear-phishing to malware and ransomware, cybercriminals continue finding new ways to […]

Posted in Cyber Security News | Comments Off on Insider vs. External Threats: The Greatest Threat Lurks Within

Report: Thousands of Pharmaceutical Records Leaked in Possible HIPAA Violation

vpnMentor‘s research team has discovered a leak in a database regarding the prescription medication Vascepa. The research team, led by Noam Rotem and Ran Locar found several sets of unsecured and […]

Posted in Cyber Security News | Comments Off on Report: Thousands of Pharmaceutical Records Leaked in Possible HIPAA Violation

Why AI Is Exactly What the Cyber security Industry Needs

By Giridhara Raam, Product Analyst, ManageEngine More than half a year after WannaCry, the trend of evolving cyber attacks doesn’t seem to have slowed down. Large organizations like the National […]

Posted in Cyber Security News | Comments Off on Why AI Is Exactly What the Cyber security Industry Needs

Bio-metrics: Validation and Authentication with a Selfie

By DRP; Cybersecurity Lab Engineer For well over a decade there has been talking of the demise of the password. There have been multiple people in the industry who have […]

Posted in Cyber Security News | Comments Off on Bio-metrics: Validation and Authentication with a Selfie

The server less computing: The pluses and minuses of this very new concept

By Milica D. Djekic The cloud’s computing is a quite recent paradigm that would offer you a chance to store your content on the web. Many experts would discuss how […]

Posted in Cyber Security News | Comments Off on The server less computing: The pluses and minuses of this very new concept

A free Decryptor tool for GandCrab Ransomware released

Good news for the victims of the latest variants of the GandCrab ransomware, NoMoreRansomware released a free decryption tool. Victims of the latest variants of the GandCrab ransomware can now […]

Posted in Cyber Security News | Comments Off on A free Decryptor tool for GandCrab Ransomware released

Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence

By Travis Farral, director of security strategy at Anomali Threat intelligence continues to become a more ubiquitous feature of information security programs as its value in detecting and preventing attacks […]

Posted in Cyber Security News | Tagged | Comments Off on Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence

Top IoT app ideas and IoT security enhancement with Blockchain

By James Warner The IoT is evolving and 2018 brings something fascinating for developers and IoT industry. Both the businesses and consumers are seeking for next big innovation. Everyone across […]

Posted in Cyber Security News | Comments Off on Top IoT app ideas and IoT security enhancement with Blockchain

Cyber-attacks thrive the market for Managed Security Services

Growing volumes of data on account of increased IOT Adoption and increased mobile device usage among corporate employees have mainly fueled the demand for managed security services across the world. […]

Posted in Cyber Security News | Comments Off on Cyber-attacks thrive the market for Managed Security Services

The Ghost in the Machine

Investigating the cost of digital fraud and what publishers can do to combat it. By Jay Horton, SVP, DEV/CON Detect Ad Tech Security® Publishers and advertisers have become dependent on […]

Posted in Cyber Security News | Comments Off on The Ghost in the Machine

Vehicle Vulnerabilities

Insecure communication strikes again By DRP; Cybersecurity Lab Engineer Consumers have spoken and the OEMs have listened. The consumers want increased connectivity not simply for productivity’s sake but also for […]

Posted in Cyber Security News | Comments Off on Vehicle Vulnerabilities

Ensure the safety of your customers’ data throughout the holidays

Holiday safety tips for customer data safety By Evan Morris, Network Security Manager at Mwrinfosecurity.com Online shopping and mobile payments are quite popular today. In fact, around the holidays this […]

Posted in Cyber Security News | Comments Off on Ensure the safety of your customers’ data throughout the holidays

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

According to The New York Times, the United States planted destructive malware in Russia’s electric power grid. The New York Times, citing current and former government officials, revealed that the […]

Posted in Cyber Security News | Comments Off on NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

French authorities released the PyLocky decryptor for versions 1 and 2

Good news for the victims of the pyLocky Ransomware versions 1 and 2, French authorities have released the pyLocky decryptor to decrypt the files for free. French authorities have released […]

Posted in Cyber Security News | Comments Off on French authorities released the PyLocky decryptor for versions 1 and 2

Two Strategies to Get More Value from Your Existing Threat Intelligence Sources

Using normalization and machine learning to get more from your threat data By Wayne Chiang, Chief Architect, and Co-Founder, ThreatQuotient While the year-end results haven’t been tallied, 2017 saw a […]

Posted in Cyber Security News | Comments Off on Two Strategies to Get More Value from Your Existing Threat Intelligence Sources

Resolve Security Issues Involving Bugs with Better QA Strategy

By Munish Garg The main objective of software testing of an application is to search the bugs in it and make efforts to make the software testing bug free. When […]

Posted in Cyber Security News | Comments Off on Resolve Security Issues Involving Bugs with Better QA Strategy

The Cyber Mafia

Rise of digital gangs and vigilantes By Marcin Kleczynski, CEO and Co-Founder, Malwarebytes If you’re reading this article, you’re likely already familiar with the frequency and variety of cyber attacks […]

Posted in Cyber Security News | Comments Off on The Cyber Mafia

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X