Monthly Archives: February 2019

Cyber Defense Magazine – March Edition – 2019

Posted in Cyber Security News | Comments Off on Cyber Defense Magazine – March Edition – 2019

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Experts discovered a malspam campaign that is distributing a malicious RAR archive that could exploit the WinRAR flaw to install deliver malware on a computer. A few days ago, security […]

Posted in Cyber Security News | Comments Off on Malware spam campaign exploits WinRAR flaw to deliver Backdoor

ToRPEDO attack allows intercepting calls and track locations on 4G/5G

ToRPEDO attacks – A group of academics from Purdue University and the University of Iowa discovered multiple vulnerabilities in cellular networks that affect both 4G and 5G LTE protocols. A […]

Posted in Cyber Security News | Comments Off on ToRPEDO attack allows intercepting calls and track locations on 4G/5G

How Organizations are Tackling Cyber Challenges: Takeaways from the Cyber security Imperative

Joe Gittens, Director of Standards, Security Industry Association The physical security industry has joined other business sectors in fully embracing the age of digital transformation. As innovative ways of accessing, […]

Posted in Cyber Security News | Comments Off on How Organizations are Tackling Cyber Challenges: Takeaways from the Cyber security Imperative

New Data Affirms Cyber Threat for Industrial Control Systems

Recent CyberX report finds that plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk for cyber attacks by Phil Neray, VP of Industrial Cybersecurity, […]

Posted in Cyber Security News | Comments Off on New Data Affirms Cyber Threat for Industrial Control Systems

What is PII and Why Criminals Want Yours

As any cybersecurity expert will tell you: the ultimate goal of securing your online presence is protecting your PII data. PII, also known as Personally Identifiable Information, is simply any […]

Posted in Cyber Security News | Comments Off on What is PII and Why Criminals Want Yours

Big Data and Cyber Attacks: The Cyber Dragon Awakening

China is not content anymore to merely influence its region. It aims to play a greater role on the international stage. In both ambitions, cyberspace and big data are a […]

Posted in Cyber Security News | Comments Off on Big Data and Cyber Attacks: The Cyber Dragon Awakening

4 Reasons Why VPNs are More Than Just Security Apps

See how VPNs can help you in other ways aside from security. by John Mason, Chief Researcher, TheBestVPN Unless you’ve been living under a rock for the past few years, […]

Posted in Cyber Security News | Comments Off on 4 Reasons Why VPNs are More Than Just Security Apps

What’s Your Secret – Best Practices for Managing Digital Authentication Credentials

By Morey Haber, CTO, BeyondTrust Secrets management refers to the tools and methods for managing digital authentication credentials (secrets), including passwords, keys, APIs, and tokens for use in applications, services, […]

Posted in Cyber Security News | Comments Off on What’s Your Secret – Best Practices for Managing Digital Authentication Credentials

Welcome to the Biggest InfoSec Show on Earth: Must Not Miss Out! RSA Conference 2019

For more than a dozen years, I’ve been coming to the ‘biggest’ InfoSec show on earth – RSA Conference USA.  Every year, I’ve seen it grow beyond expectations – startups […]

Posted in Cyber Security News | Comments Off on Welcome to the Biggest InfoSec Show on Earth: Must Not Miss Out! RSA Conference 2019

On the Frontline – Open Source Software Risk Management Solution

New Actionable Intelligence and Management Capabilities in Insignary Clarity™ 2.0 Make it a Compelling Frontline OSS Risk Management Solution Cyber Defense Magazine expert Gary Miliefsky estimates that between 2018 and […]

Posted in Cyber Security News | Comments Off on On the Frontline – Open Source Software Risk Management Solution

Expert found a DoS flaw in Windows Servers running IIS

Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests. Microsoft revealed that Windows servers running Internet Information Services (IIS) are […]

Posted in Cyber Security News | Comments Off on Expert found a DoS flaw in Windows Servers running IIS

Taking Collaboration Beyond ISACs and IOCs

How security automation, orchestration and response platforms can open the door for improved collaboration Cody Cornell, CEO, Swimlane Definitions you should know: ISACs and IOCs Cyber threats are advancing every day, […]

Posted in Cyber Security News | Comments Off on Taking Collaboration Beyond ISACs and IOCs

North Korea’s Lazarus APT targets Russian Entities

North Korea’s Lazarus APT targets Russian Entities Security researchers at Check Point have uncovered a cyber espionage campaign conducted by Lazarus APT group aimed at Russian targets. Security experts at Check […]

Posted in Cyber Security News | Comments Off on North Korea’s Lazarus APT targets Russian Entities

Technology Takeover: How to Secure IoT Environments

By Julian Weinberger, NCP engineering Internet of Things (IoT) devices continues to transform office environments around the world. From intelligent air conditioning units and smart lighting to digital assistants and […]

Posted in Cyber Security News | Comments Off on Technology Takeover: How to Secure IoT Environments

Engineering-based industries are often not very good at cyber security

Olexander Hryb, the Event Producer at the Institution of Engineering and Technology, met Robert Hannigan, former Director of GCHQ and Executive Chairman of BlueVoyant cybersecurity, to talk about the main […]

Posted in Cyber Security News | Comments Off on Engineering-based industries are often not very good at cyber security

How to Be Smarter About Bio-metrics

Facial recognition—one of the most popular methods of biometric enrollment and customized marketing—will bring us to ultra-surveillance, targeted assassinations and Black Mirror-style oversight…..at least this is what critics of the […]

Posted in Cyber Security News | Comments Off on How to Be Smarter About Bio-metrics

The Challenge of Real-Time Cyber Protection

Appropriate Response Mechanisms When a Data Breach Occurs By John Attala, Director, North America, Endace There’s a huge imbalance between attackers and defenders when it comes to protecting the corporate […]

Posted in Cyber Security News | Comments Off on The Challenge of Real-Time Cyber Protection

Cyber security for Kids

Sitting on the couch: Talking about security with the kids. by Pedro Tavares,  Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Talking about cybersecurity is crucial these days. Children are […]

Posted in Cyber Security News | Comments Off on Cyber security for Kids

Strength through Simplification: Taming Cyber security Complexity in 2019

By Zach Malone, security engineer, FireMon Cybersecurity in 2018 can be best described in one word: complex. Yes, complexity has infiltrated every phase of the cybersecurity landscape this year, from […]

Posted in Cyber Security News | Comments Off on Strength through Simplification: Taming Cyber security Complexity in 2019

Schneier says: Technology—our biggest asset. And headache.

It’s happening all around us. Computers are taking roles we never thought they could. They’re our weathermen. Our cashiers. But is cutting people out of the equation really the recipe […]

Posted in Cyber Security News | Comments Off on Schneier says: Technology—our biggest asset. And headache.

What is Genetic Malware Analysis?

By Roy Halevi At Intezer, we view malware analysis as a key component in properly and effectively responding to security incidents. We have introduced a new innovative approach to automate […]

Posted in Cyber Security News | Comments Off on What is Genetic Malware Analysis?

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. Security experts at RIPS Technologies GmbH disclosed a critical […]

Posted in Cyber Security News | Tagged | Comments Off on Experts found a Remote Code Execution flaw in WordPress 5.0.0

Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year

By Zach Malone, security engineer, FireMon During this time of year, we see endless articles projecting predictions for the year ahead. And while predictions can help organizations prepare for potential […]

Posted in Cyber Security News | Comments Off on Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year

Application Isolation and Control – A Modern Defense for New Threats

By Fraser Kyne, EMEA CTO, Bromium  The detection method for preventing malware is fundamentally flawed, yet it is still the de facto standard in cybersecurity. Day after day, organizations scramble […]

Posted in Cyber Security News | Comments Off on Application Isolation and Control – A Modern Defense for New Threats

Can Endpoint Isolation Finally Thwart Cyber attackers?

Standard security strategies aren’t working so enterprises are turning to isolation-based prevention by Tal Zamir, Co-Founder & CEO, Hysolate Endpoints are a favorite target for cyber attackers. They’re also the […]

Posted in Cyber Security News | Comments Off on Can Endpoint Isolation Finally Thwart Cyber attackers?

New Trickbot module implements Remote App Credential-Grabbing features

The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for Remote App Credential-Grabbing. The infamous Trickbot banking trojan is back, […]

Posted in Cyber Security News | Comments Off on New Trickbot module implements Remote App Credential-Grabbing features

December Patch Tuesday

Updates for Windows, Office,Net Framework, Adobe, Firefox and More by Chris Goettl, Manager of Product Management, Security, Ivanti If you saw the Patch Tuesday forecast for December, the reality turned […]

Posted in Cyber Security News | Comments Off on December Patch Tuesday

A new batch of 127 million records appears in the dark web

A new batch of 127 million records appears in the dark web, this time the huge trove of data appears to be originated from eight companies. A hacker that goes […]

Posted in Cyber Security News | Comments Off on A new batch of 127 million records appears in the dark web

Could Censys serve as a threat intelligence collector?

By Milica D. Djekic The fact is so many visible web search engines could offer you a chance to explore the internet widely and the similar case is with the […]

Posted in Cyber Security News | Comments Off on Could Censys serve as a threat intelligence collector?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X