Monthly Archives: July 2019

Malvertising – Advertising, But With A Hook That Hurts, And Hurts Again

By Chris Olson, CEO of The Media Trust Malvertising, a combination of malware and advertising, has more than doubled in the past three years and is increasingly found on premium […]

Posted in Cyber Security News | Comments Off on Malvertising – Advertising, But With A Hook That Hurts, And Hurts Again

What Is Old Is New Again

A new application for old attack                                                  […]

Posted in Cyber Security News | Comments Off on What Is Old Is New Again

Brazilian “Car Wash” Task Force: Cyber Security Lessons

By Rodrigo Ruiz & Rogério Winter The creators of House of Cards have publicly stated that their work is Discovery Kids. Brazil already stars in a reality show worthy of […]

Posted in Cyber Security News | Comments Off on Brazilian “Car Wash” Task Force: Cyber Security Lessons

Cyber Defense Perspectives For 2018

By Milica D. Djekic 2017 is at its end and we are easily approaching 2018. Many people would happily wait for a New Year, but is that the case with […]

Posted in Cyber Security News | Comments Off on Cyber Defense Perspectives For 2018

White House Release of Vulnerabilities Equities Process Validates Industry Concerns

By Willis McDonald, Threat Research Manager and Senior Threat Research, Core Security When the U.S. Government discovers an unpatched vulnerability, it has a choice: disclose the vulnerability to the vendor […]

Posted in Cyber Security News | Comments Off on White House Release of Vulnerabilities Equities Process Validates Industry Concerns

US Agency Security Doubts Hinder Move To Hybrid Cloud

By Felipe Fernandez For the past seven years, the U.S. Office of Management and Budget has been pushing Federal agencies to move much of their computing workloads to the cloud. […]

Posted in Cyber Security News | Comments Off on US Agency Security Doubts Hinder Move To Hybrid Cloud

Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time

Learn how to hack systems like black hat hackers and secure them like security experts. This eBook will help you: Understand ethical hacking and the different fields and types of […]

Posted in Cyber Security News, Featured | Comments Off on Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time

Nonprofits Cannot Ignore CyberSecurity

By Chloé Messdaghi, Digital Marketing Manager, Kenna Security Prior to joining Kenna Security, I worked with many nonprofits around the world. Each focused on providing shelter, education, health services, and […]

Posted in Cyber Security News | Comments Off on Nonprofits Cannot Ignore CyberSecurity

Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016

The malware samples shared by USCYBERCOM last week were first detected in December 2016 in attacks attributed to Iran-linked APT33. Last week the United States Cyber Command (USCYBERCOM) uploaded to […]

Posted in Cyber Security News | Tagged , , | Comments Off on Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016

How to secure your network traffic?

By Milica D. Djekic A computer network is a group of devices being connected to the internet and forming a big web entity out of them. It’s quite good to […]

Posted in Cyber Security News | Comments Off on How to secure your network traffic?

Ten Key Enterprise Endpoint Security Best Practices with Andy Malone

By Bill Bernat, Director and Technology Evangelist, Adaptiva I recently invited security expert Andy Malone to join me and co-host Ami Casto for an episode of the Enterprise Endpoint Experts […]

Posted in Cyber Security News | Comments Off on Ten Key Enterprise Endpoint Security Best Practices with Andy Malone

July 2019 – Patch Tuesday Wrapup

Microsoft Resolved a Total of 77 Unique CVEs, Including Two Zero-Days that Have Been Reported in Attacks in the Wild by Chris Goettl, Director of Product Management, Security, Ivanti Microsoft […]

Posted in Cyber Security News, Featured | Comments Off on July 2019 – Patch Tuesday Wrapup

Securing Software Development without Sacrificing Innovation: Crowdsourcing and the Gig Economy

By Michael P. Morris, CEO for Topcoder | Global Head of Crowdsourcing for Wipro Given the increase in suspicious cyber activity, modern IT teams have a tough challenge: to continuously […]

Posted in Cyber Security News | Comments Off on Securing Software Development without Sacrificing Innovation: Crowdsourcing and the Gig Economy

Why Cybersecurity Awareness Programs Fall Short?

By Shlomi Gian, CEO at CybeReady Phishing is still the most commonly used attack on organizations IDG’s 2018 US State of Cybercrime.  As of 2019, there is no proven solution […]

Posted in Cyber Security News | Comments Off on Why Cybersecurity Awareness Programs Fall Short?

Cyberattack shuts down La Porte County government systems

Government computer systems at La Porte County, Indiana, were shut down after a cyber attack hit them on July 6. Experts believe it was a ransomware attack. On July 6, […]

Posted in Cyber Security News | Tagged , | Comments Off on Cyberattack shuts down La Porte County government systems

Making Data a Corporate Asset

By Kelly Spivey, Managing Director, Sila Companies that invest heavily in data management and analytics all too often don’t realize the full potential of the solution they are putting in […]

Posted in Cyber Security News | Comments Off on Making Data a Corporate Asset

7 Steps Bad Guys Use to Take Total Control of Your Network

Summary The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to […]

Posted in Cyber Security News, Featured | Comments Off on 7 Steps Bad Guys Use to Take Total Control of Your Network

Risk-Based Roadmaps Set Foundation for Cybersecurity Success

By Raef Meeuwisse, CISM, CISA, ISACA expert speaker, and author of “Cybersecurity for Beginners” And Doug Grindstaff, Senior Vice President of Cyber Security Solutions, CMMI Institute Security professionals not only […]

Posted in Cyber Security News | Comments Off on Risk-Based Roadmaps Set Foundation for Cybersecurity Success

Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted

Yesterday, July 6, 2019, hackers breached the GitHub account of Canonical Ltd., the company behind the Ubuntu Linux distribution. On July 6, 2019, hackers have breached the GitHub account of […]

Posted in Cyber Security News | Comments Off on Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted

Sodin Ransomware includes exploit for Windows CVE-2018-8453 bug

Kaspersky experts discovered that Sodinokibi, aka Sodin, Ransomware currently also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows The Sodinokibi Ransomware (aka Sodin, REvil) appeared in the threat landscape […]

Posted in Cyber Security News | Comments Off on Sodin Ransomware includes exploit for Windows CVE-2018-8453 bug

US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw

US Cyber Command posted on Twitter an alert about cyber attacks exploiting the CVE-2017-11774 vulnerability in Outlook. Yesterday I was using Twitter when I noticed the following alert issued by […]

Posted in Cyber Security News | Tagged , , | Comments Off on US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw

Interview DOS and Don’ts from a Cybersecurity CEO

By Craig Hinkley, CEO, WhiteHat Security A job interview is your chance to show a potential employer how you can succeed in the role and at the company. A preliminary […]

Posted in Cyber Security News | Comments Off on Interview DOS and Don’ts from a Cybersecurity CEO

The Pros, Cons and True Impact of GDPR One Year Later

What Have We Learned in the Past Year? By Terence Jackson, CISO at Thycotic GDPR went into enforcement almost one year ago on May 25, 2018.  What have we learned […]

Posted in Cyber Security News | Comments Off on The Pros, Cons and True Impact of GDPR One Year Later

Every Company’s Cyber Security Requirements Aren’t the Same!

By James Warner, Big Data Developer, at www.nexsoftsys.com Cyber Security is the art of preventing cyberspace and cyber activities from the cyber-attacks. It is a collaboration of various tools, plans, […]

Posted in Cyber Security News | Comments Off on Every Company’s Cyber Security Requirements Aren’t the Same!

6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For

By Kayla Matthews, Freelance Writer, ProductivityBytes.com Due to the importance of email for people’s personal and work lives, you probably can’t imagine being without it for a day — or […]

Posted in Cyber Security News | Comments Off on 6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For

In Defense of Cyber Offense

By Mark Cassetta, Senior Vice President of Strategy, Titus In recent years, cyber defense technologies have evolved quickly to help businesses protect their networks, restrict access and prevent data loss. […]

Posted in Cyber Security News | Comments Off on In Defense of Cyber Offense

The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward

By George Avetisov, Cofounder and CEO, HYPR  Since the dawn of the Internet, there has been a constant struggle between those trying to secure their personal information and those trying […]

Posted in Cyber Security News | Comments Off on The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward

Network Traffic Analytics: Helping To Speed up Incident Investigation and Resolution

By Gavin Hill, Vice President, Datacenter and Network Security Products, Bitdefender The effectiveness of security incident investigation and resolution is key to the effectiveness of all defense efforts. But improving […]

Posted in Cyber Security News | Comments Off on Network Traffic Analytics: Helping To Speed up Incident Investigation and Resolution

Building a Career in Incident Response

The talent pool is changing dramatically and will continue to do so. By Karl Sharman, Vice-President, BeecherMadden When recruiting in cybersecurity, it’s not difficult to understand where the growth areas […]

Posted in Cyber Security News | Comments Off on Building a Career in Incident Response

Cyber security Analytics Purposes

By Milica D. Djekic There are a lot of questions about what cybersecurity analytics is and what its role in cyber defense could be. It’s not always that simple to […]

Posted in Cyber Security News | Comments Off on Cyber security Analytics Purposes

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X