Monthly Archives: June 2019
Why Deception Technology Will Change the Game in Our Favor Against Cyber crime and Breaches
By Gary S. Miliefsky As I said in my recent presentation on Time-based Security, which was first discovered and written about by Winn Schwartau in his book of the same […]
Reviewing Last Month’s Ransomware
By David Balaban There were hardly any massive ransomware outbreaks last month, however, outbreaks continued. The criminals must have been busy prepping for the holidays. The online extortion activity didn’t […]
The 3 “Must Haves” for Improving Any Company’s Security Posture
Continuous Monitoring, Little To No Burden on The Network And Easy To Understand, Prioritized Reporting Top List For CISOS And CIOS By Jeff Elliott Cyber-attacks are growing more sophisticated, frequent, […]
5 Things to Consider while using Unsecured Open Wi-Fi
BY MOHIT SHARMA, CONTENT WRITER, MALWAREFOX Open Wi-Fi networks are a dream for all of us. They allow us to use the web from pretty much anywhere and no matter […]
Insider Threat Mitigation Training this Summer
While most CISO’s, IT Executives and Staff are planning out a relaxing summer with their families – vacations, barbecues and cookouts, camping and fishing, a disgruntled employee may be planning […]
Rootkit Redux
REVISITING A PRIOR ISSUE by DRP; Cybersecurity Lab Engineer In season 1 of Mr. Robot, the much-exalted series, one of the female lead actors asks innocently during one of the […]
KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg
By Tae Jin “TJ” Kang By lining homes, offices and industrial sites with wireless sensors and devices, we continue to set the stage for profound changes in productivity, security, and […]
A New Security Approach in the Age of Cyber Warfare
By Chris Day, CISSP – Chief Cybersecurity Officer, Cyxtera Adversaries are waging cyber warfare daily to create confusion and cause disruption for strategic or military purposes. You need only look […]
How To Implement an Effective Vulnerability Management Program
By Stephen Newman, Secureauth/Core Security The September Equifax data breach that put more than 140 million people at risk of identity theft and financial fraud could have been prevented. A […]
The Riviera Beach City pays $600,000 in ransom
The Riviera Beach City, Florida, agreed to pay $600,000 in ransom to decrypt its data after a ransomware-based attack hit its computer system. The Riviera Beach City Council voted unanimously […]
Cyber-security in 2018 – The Kosciuszko Institute publishes experts’ forecasts
As in previous years, we have asked the experts who are members of the European Cybersecurity Forum – CYBERSEC community and who represent the public sector, the academia and the […]
The State of PKI Management
Where We Are, and Where We Need to Be By Danielle Adams, Freelance Writer, Venafi Public Key Infrastructure (PKI) is the foundation of secure communications on the internet. That said, […]
Modular Plurox backdoor can spread over local network
Kaspersky experts recently discovered a backdoor dubbed Plurox that can spread itself over a local network and can allow installing additional malware. Kaspersky experts discovered the Plurox backdoor in February, […]
Insider vs. External Threats: The Greatest Threat Lurks Within
by Tim Brown, vice president of security, SolarWinds The cybersecurity landscape is more sophisticated now than ever before; from spear-phishing to malware and ransomware, cybercriminals continue finding new ways to […]
Report: Thousands of Pharmaceutical Records Leaked in Possible HIPAA Violation
vpnMentor‘s research team has discovered a leak in a database regarding the prescription medication Vascepa. The research team, led by Noam Rotem and Ran Locar found several sets of unsecured and […]
Why AI Is Exactly What the Cyber security Industry Needs
By Giridhara Raam, Product Analyst, ManageEngine More than half a year after WannaCry, the trend of evolving cyber attacks doesn’t seem to have slowed down. Large organizations like the National […]
Bio-metrics: Validation and Authentication with a Selfie
By DRP; Cybersecurity Lab Engineer For well over a decade there has been talking of the demise of the password. There have been multiple people in the industry who have […]
The server less computing: The pluses and minuses of this very new concept
By Milica D. Djekic The cloud’s computing is a quite recent paradigm that would offer you a chance to store your content on the web. Many experts would discuss how […]
A free Decryptor tool for GandCrab Ransomware released
Good news for the victims of the latest variants of the GandCrab ransomware, NoMoreRansomware released a free decryption tool. Victims of the latest variants of the GandCrab ransomware can now […]
Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence
By Travis Farral, director of security strategy at Anomali Threat intelligence continues to become a more ubiquitous feature of information security programs as its value in detecting and preventing attacks […]
Top IoT app ideas and IoT security enhancement with Blockchain
By James Warner The IoT is evolving and 2018 brings something fascinating for developers and IoT industry. Both the businesses and consumers are seeking for next big innovation. Everyone across […]
Cyber-attacks thrive the market for Managed Security Services
Growing volumes of data on account of increased IOT Adoption and increased mobile device usage among corporate employees have mainly fueled the demand for managed security services across the world. […]
The Ghost in the Machine
Investigating the cost of digital fraud and what publishers can do to combat it. By Jay Horton, SVP, DEV/CON Detect Ad Tech Security® Publishers and advertisers have become dependent on […]
Vehicle Vulnerabilities
Insecure communication strikes again By DRP; Cybersecurity Lab Engineer Consumers have spoken and the OEMs have listened. The consumers want increased connectivity not simply for productivity’s sake but also for […]
Ensure the safety of your customers’ data throughout the holidays
Holiday safety tips for customer data safety By Evan Morris, Network Security Manager at Mwrinfosecurity.com Online shopping and mobile payments are quite popular today. In fact, around the holidays this […]
NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid
According to The New York Times, the United States planted destructive malware in Russia’s electric power grid. The New York Times, citing current and former government officials, revealed that the […]
French authorities released the PyLocky decryptor for versions 1 and 2
Good news for the victims of the pyLocky Ransomware versions 1 and 2, French authorities have released the pyLocky decryptor to decrypt the files for free. French authorities have released […]
Two Strategies to Get More Value from Your Existing Threat Intelligence Sources
Using normalization and machine learning to get more from your threat data By Wayne Chiang, Chief Architect, and Co-Founder, ThreatQuotient While the year-end results haven’t been tallied, 2017 saw a […]
Resolve Security Issues Involving Bugs with Better QA Strategy
By Munish Garg The main objective of software testing of an application is to search the bugs in it and make efforts to make the software testing bug free. When […]
The Cyber Mafia
Rise of digital gangs and vigilantes By Marcin Kleczynski, CEO and Co-Founder, Malwarebytes If you’re reading this article, you’re likely already familiar with the frequency and variety of cyber attacks […]