Monthly Archives: July 2019
Malvertising – Advertising, But With A Hook That Hurts, And Hurts Again
By Chris Olson, CEO of The Media Trust Malvertising, a combination of malware and advertising, has more than doubled in the past three years and is increasingly found on premium […]
What Is Old Is New Again
A new application for old attack […]
Brazilian “Car Wash” Task Force: Cyber Security Lessons
By Rodrigo Ruiz & Rogério Winter The creators of House of Cards have publicly stated that their work is Discovery Kids. Brazil already stars in a reality show worthy of […]
Cyber Defense Perspectives For 2018
By Milica D. Djekic 2017 is at its end and we are easily approaching 2018. Many people would happily wait for a New Year, but is that the case with […]
White House Release of Vulnerabilities Equities Process Validates Industry Concerns
By Willis McDonald, Threat Research Manager and Senior Threat Research, Core Security When the U.S. Government discovers an unpatched vulnerability, it has a choice: disclose the vulnerability to the vendor […]
US Agency Security Doubts Hinder Move To Hybrid Cloud
By Felipe Fernandez For the past seven years, the U.S. Office of Management and Budget has been pushing Federal agencies to move much of their computing workloads to the cloud. […]
Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time
Learn how to hack systems like black hat hackers and secure them like security experts. This eBook will help you: Understand ethical hacking and the different fields and types of […]
Nonprofits Cannot Ignore CyberSecurity
By Chloé Messdaghi, Digital Marketing Manager, Kenna Security Prior to joining Kenna Security, I worked with many nonprofits around the world. Each focused on providing shelter, education, health services, and […]
Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016
The malware samples shared by USCYBERCOM last week were first detected in December 2016 in attacks attributed to Iran-linked APT33. Last week the United States Cyber Command (USCYBERCOM) uploaded to […]
How to secure your network traffic?
By Milica D. Djekic A computer network is a group of devices being connected to the internet and forming a big web entity out of them. It’s quite good to […]
Ten Key Enterprise Endpoint Security Best Practices with Andy Malone
By Bill Bernat, Director and Technology Evangelist, Adaptiva I recently invited security expert Andy Malone to join me and co-host Ami Casto for an episode of the Enterprise Endpoint Experts […]
July 2019 – Patch Tuesday Wrapup
Microsoft Resolved a Total of 77 Unique CVEs, Including Two Zero-Days that Have Been Reported in Attacks in the Wild by Chris Goettl, Director of Product Management, Security, Ivanti Microsoft […]
Securing Software Development without Sacrificing Innovation: Crowdsourcing and the Gig Economy
By Michael P. Morris, CEO for Topcoder | Global Head of Crowdsourcing for Wipro Given the increase in suspicious cyber activity, modern IT teams have a tough challenge: to continuously […]
Why Cybersecurity Awareness Programs Fall Short?
By Shlomi Gian, CEO at CybeReady Phishing is still the most commonly used attack on organizations IDG’s 2018 US State of Cybercrime. As of 2019, there is no proven solution […]
Cyberattack shuts down La Porte County government systems
Government computer systems at La Porte County, Indiana, were shut down after a cyber attack hit them on July 6. Experts believe it was a ransomware attack. On July 6, […]
Making Data a Corporate Asset
By Kelly Spivey, Managing Director, Sila Companies that invest heavily in data management and analytics all too often don’t realize the full potential of the solution they are putting in […]
7 Steps Bad Guys Use to Take Total Control of Your Network
Summary The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to […]
Risk-Based Roadmaps Set Foundation for Cybersecurity Success
By Raef Meeuwisse, CISM, CISA, ISACA expert speaker, and author of “Cybersecurity for Beginners” And Doug Grindstaff, Senior Vice President of Cyber Security Solutions, CMMI Institute Security professionals not only […]
Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted
Yesterday, July 6, 2019, hackers breached the GitHub account of Canonical Ltd., the company behind the Ubuntu Linux distribution. On July 6, 2019, hackers have breached the GitHub account of […]
Sodin Ransomware includes exploit for Windows CVE-2018-8453 bug
Kaspersky experts discovered that Sodinokibi, aka Sodin, Ransomware currently also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows The Sodinokibi Ransomware (aka Sodin, REvil) appeared in the threat landscape […]
US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw
US Cyber Command posted on Twitter an alert about cyber attacks exploiting the CVE-2017-11774 vulnerability in Outlook. Yesterday I was using Twitter when I noticed the following alert issued by […]
Interview DOS and Don’ts from a Cybersecurity CEO
By Craig Hinkley, CEO, WhiteHat Security A job interview is your chance to show a potential employer how you can succeed in the role and at the company. A preliminary […]
The Pros, Cons and True Impact of GDPR One Year Later
What Have We Learned in the Past Year? By Terence Jackson, CISO at Thycotic GDPR went into enforcement almost one year ago on May 25, 2018. What have we learned […]
Every Company’s Cyber Security Requirements Aren’t the Same!
By James Warner, Big Data Developer, at www.nexsoftsys.com Cyber Security is the art of preventing cyberspace and cyber activities from the cyber-attacks. It is a collaboration of various tools, plans, […]
6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For
By Kayla Matthews, Freelance Writer, ProductivityBytes.com Due to the importance of email for people’s personal and work lives, you probably can’t imagine being without it for a day — or […]
In Defense of Cyber Offense
By Mark Cassetta, Senior Vice President of Strategy, Titus In recent years, cyber defense technologies have evolved quickly to help businesses protect their networks, restrict access and prevent data loss. […]
The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward
By George Avetisov, Cofounder and CEO, HYPR Since the dawn of the Internet, there has been a constant struggle between those trying to secure their personal information and those trying […]
Network Traffic Analytics: Helping To Speed up Incident Investigation and Resolution
By Gavin Hill, Vice President, Datacenter and Network Security Products, Bitdefender The effectiveness of security incident investigation and resolution is key to the effectiveness of all defense efforts. But improving […]
Building a Career in Incident Response
The talent pool is changing dramatically and will continue to do so. By Karl Sharman, Vice-President, BeecherMadden When recruiting in cybersecurity, it’s not difficult to understand where the growth areas […]
Cyber security Analytics Purposes
By Milica D. Djekic There are a lot of questions about what cybersecurity analytics is and what its role in cyber defense could be. It’s not always that simple to […]