Monthly Archives: February 2019
Cyber Defense Magazine – March Edition – 2019
Malware spam campaign exploits WinRAR flaw to deliver Backdoor
Experts discovered a malspam campaign that is distributing a malicious RAR archive that could exploit the WinRAR flaw to install deliver malware on a computer. A few days ago, security […]
ToRPEDO attack allows intercepting calls and track locations on 4G/5G
ToRPEDO attacks – A group of academics from Purdue University and the University of Iowa discovered multiple vulnerabilities in cellular networks that affect both 4G and 5G LTE protocols. A […]
How Organizations are Tackling Cyber Challenges: Takeaways from the Cyber security Imperative
Joe Gittens, Director of Standards, Security Industry Association The physical security industry has joined other business sectors in fully embracing the age of digital transformation. As innovative ways of accessing, […]
New Data Affirms Cyber Threat for Industrial Control Systems
Recent CyberX report finds that plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk for cyber attacks by Phil Neray, VP of Industrial Cybersecurity, […]
What is PII and Why Criminals Want Yours
As any cybersecurity expert will tell you: the ultimate goal of securing your online presence is protecting your PII data. PII, also known as Personally Identifiable Information, is simply any […]
Big Data and Cyber Attacks: The Cyber Dragon Awakening
China is not content anymore to merely influence its region. It aims to play a greater role on the international stage. In both ambitions, cyberspace and big data are a […]
4 Reasons Why VPNs are More Than Just Security Apps
See how VPNs can help you in other ways aside from security. by John Mason, Chief Researcher, TheBestVPN Unless you’ve been living under a rock for the past few years, […]
What’s Your Secret – Best Practices for Managing Digital Authentication Credentials
By Morey Haber, CTO, BeyondTrust Secrets management refers to the tools and methods for managing digital authentication credentials (secrets), including passwords, keys, APIs, and tokens for use in applications, services, […]
Welcome to the Biggest InfoSec Show on Earth: Must Not Miss Out! RSA Conference 2019
For more than a dozen years, I’ve been coming to the ‘biggest’ InfoSec show on earth – RSA Conference USA. Every year, I’ve seen it grow beyond expectations – startups […]
On the Frontline – Open Source Software Risk Management Solution
New Actionable Intelligence and Management Capabilities in Insignary Clarity™ 2.0 Make it a Compelling Frontline OSS Risk Management Solution Cyber Defense Magazine expert Gary Miliefsky estimates that between 2018 and […]
Expert found a DoS flaw in Windows Servers running IIS
Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests. Microsoft revealed that Windows servers running Internet Information Services (IIS) are […]
Taking Collaboration Beyond ISACs and IOCs
How security automation, orchestration and response platforms can open the door for improved collaboration Cody Cornell, CEO, Swimlane Definitions you should know: ISACs and IOCs Cyber threats are advancing every day, […]
North Korea’s Lazarus APT targets Russian Entities
North Korea’s Lazarus APT targets Russian Entities Security researchers at Check Point have uncovered a cyber espionage campaign conducted by Lazarus APT group aimed at Russian targets. Security experts at Check […]
Technology Takeover: How to Secure IoT Environments
By Julian Weinberger, NCP engineering Internet of Things (IoT) devices continues to transform office environments around the world. From intelligent air conditioning units and smart lighting to digital assistants and […]
Engineering-based industries are often not very good at cyber security
Olexander Hryb, the Event Producer at the Institution of Engineering and Technology, met Robert Hannigan, former Director of GCHQ and Executive Chairman of BlueVoyant cybersecurity, to talk about the main […]
How to Be Smarter About Bio-metrics
Facial recognition—one of the most popular methods of biometric enrollment and customized marketing—will bring us to ultra-surveillance, targeted assassinations and Black Mirror-style oversight…..at least this is what critics of the […]
The Challenge of Real-Time Cyber Protection
Appropriate Response Mechanisms When a Data Breach Occurs By John Attala, Director, North America, Endace There’s a huge imbalance between attackers and defenders when it comes to protecting the corporate […]
Cyber security for Kids
Sitting on the couch: Talking about security with the kids. by Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Talking about cybersecurity is crucial these days. Children are […]
Strength through Simplification: Taming Cyber security Complexity in 2019
By Zach Malone, security engineer, FireMon Cybersecurity in 2018 can be best described in one word: complex. Yes, complexity has infiltrated every phase of the cybersecurity landscape this year, from […]
Schneier says: Technology—our biggest asset. And headache.
It’s happening all around us. Computers are taking roles we never thought they could. They’re our weathermen. Our cashiers. But is cutting people out of the equation really the recipe […]
What is Genetic Malware Analysis?
By Roy Halevi At Intezer, we view malware analysis as a key component in properly and effectively responding to security incidents. We have introduced a new innovative approach to automate […]
Experts found a Remote Code Execution flaw in WordPress 5.0.0
Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. Security experts at RIPS Technologies GmbH disclosed a critical […]
Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year
By Zach Malone, security engineer, FireMon During this time of year, we see endless articles projecting predictions for the year ahead. And while predictions can help organizations prepare for potential […]
Application Isolation and Control – A Modern Defense for New Threats
By Fraser Kyne, EMEA CTO, Bromium The detection method for preventing malware is fundamentally flawed, yet it is still the de facto standard in cybersecurity. Day after day, organizations scramble […]
Can Endpoint Isolation Finally Thwart Cyber attackers?
Standard security strategies aren’t working so enterprises are turning to isolation-based prevention by Tal Zamir, Co-Founder & CEO, Hysolate Endpoints are a favorite target for cyber attackers. They’re also the […]
New Trickbot module implements Remote App Credential-Grabbing features
The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for Remote App Credential-Grabbing. The infamous Trickbot banking trojan is back, […]
December Patch Tuesday
Updates for Windows, Office,Net Framework, Adobe, Firefox and More by Chris Goettl, Manager of Product Management, Security, Ivanti If you saw the Patch Tuesday forecast for December, the reality turned […]
A new batch of 127 million records appears in the dark web
A new batch of 127 million records appears in the dark web, this time the huge trove of data appears to be originated from eight companies. A hacker that goes […]
Could Censys serve as a threat intelligence collector?
By Milica D. Djekic The fact is so many visible web search engines could offer you a chance to explore the internet widely and the similar case is with the […]