Monthly Archives: August 2019

Flaws in HTTP/2 implementations expose servers to DoS attacks

Experts at Netflix and Google discovered eight denial-of-service (DoS) vulnerabilities affecting various HTTP/2 implementations. Researchers from Netflix and Google discovered eight denial-of-service (DoS) flaws affecting various HTTP/2 implementations. Some of […]

Posted in Cyber Security News | Comments Off on Flaws in HTTP/2 implementations expose servers to DoS attacks

What’s the Matter with S3?

Public cloud breaches are becoming more frequent. Can anything be done? By Adam Conway Another week, another story about how data stored in the public cloud has been stolen or […]

Posted in Cyber Security News | Comments Off on What’s the Matter with S3?

How to Protect Yourself from Identity Theft Online?

Protection Against Online Identity Theft By Manish Bhickta, Product Marketer, Stellar Data Recovery Wish to acquaint yourself with Online Identity Theft, its types, its preventive measures to remain protected, and […]

Posted in Cyber Security News | Comments Off on How to Protect Yourself from Identity Theft Online?

A Potential Shift in Enforcement Priorities for the FTC

By Julie O’Neill, Partner, Privacy + Data Security Group, Morrison & Foerster During the course of a long-running data security action against a medical testing laboratory, the Federal Trade Commission […]

Posted in Cyber Security News | Comments Off on A Potential Shift in Enforcement Priorities for the FTC

Flaws in 4G Routers of various vendors put millions of users at risk

Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices. G Richter, a security researcher at Pen […]

Posted in Cyber Security News | Comments Off on Flaws in 4G Routers of various vendors put millions of users at risk

The Need For Centralized Critical Event Management

By Imad Mouline, Chief Technology Officer, Everbridge Global threats have increased in complexity and unpredictability. The critical events we face today are more frequent and unfortunately, costlier and potentially life-threatening, […]

Posted in Cyber Security News | Comments Off on The Need For Centralized Critical Event Management

From Vulnerable To Vigilant

An Overnight Transformation for an Insecure Organization By What is a successful security? Recently I’ve been pondering the question of how an organization determines whether they have a “successful security […]

Posted in Cyber Security News | Comments Off on From Vulnerable To Vigilant

Active Intrusion Detection

Protecting against data leaks from authorized network users by Fiach Reid, Director, Infinite Loop Development Ltd The weakest point of security on a network can often be its users. If […]

Posted in Cyber Security News | Comments Off on Active Intrusion Detection

Canon DSLR Camera Infected with Ransomware Over the Air

A researcher discovered 6 flaws in the image transfer protocol used in Canon EOS 80D DSLR cameras that allow him to infect the device with ransomware over the air. Security […]

Posted in Cyber Security News | Comments Off on Canon DSLR Camera Infected with Ransomware Over the Air

City of Naples, Florida, lost $700K after a cyberattack

Another city in the United States was hit by a cyber attack, according to officials in the city of Naples (Florida) they lost $700,000 in a recent attack. According to […]

Posted in Cyber Security News | Comments Off on City of Naples, Florida, lost $700K after a cyberattack

Crooks turn victims into money mules via confidence/romance scams

The FBI published a security advisory to warn of cyber actors using online dating sites to conduct confidence/romance scam and recruit money mules. The FBI published a security advisory to […]

Posted in Cyber Security News | Comments Off on Crooks turn victims into money mules via confidence/romance scams

New strain of Clipsa malware launches brute-force attacks on WordPress sites

Avast spotted a new strain of Clipsa malware that is used to mine and steal cryptocurrencies along with carrying out brute-force attacks on WordPress sites. Clipsa is a malware that […]

Posted in Cyber Security News | Comments Off on New strain of Clipsa malware launches brute-force attacks on WordPress sites

Nation State Threats

By Blake J. Darché Each nation-state cyber threat actor has its own goals and reasons for conducting cyber attacks. Some state-sponsored actors concentrate their efforts on espionage, while others focus […]

Posted in Cyber Security News | Comments Off on Nation State Threats

Patching the Iron Tail is Easier Said than Done

By Willy Leichter, Vice President of Marketing, Virsec. Challenges with Patching Industrial Control Systems Leave Significant Risk Everyone knows that you should patch your application servers as often as possible. […]

Posted in Cyber Security News | Comments Off on Patching the Iron Tail is Easier Said than Done

Battling the Misconceptions Around Network Security Requirements

By Subhalakshmi Ganapathy, Product Analyst, ManageEngine Keeping up with the growing security risks and understanding how to protect networks is an ever-constant challenge. As threats evolve, businesses are forced to […]

Posted in Cyber Security News | Comments Off on Battling the Misconceptions Around Network Security Requirements

Today’s Cyber Threats Demand Enhanced Strategies and Solutions

By Joseph E. Saracino, Jr., President & CEO, Cino Ltd. Family of Companies, which includes Cyber Security Solutions The term cybersecurity has become part of our everyday conversations. Headline-grabbing data […]

Posted in Cyber Security News | Comments Off on Today’s Cyber Threats Demand Enhanced Strategies and Solutions

Reducing the Insecure Deserialization Risk

By My Apostolos Giannakidis, Security Architect, Waratek Reducing the Insecure Deserialization Risk Serializing and deserializing data is a common operation in many web application, mainly due to the speed and […]

Posted in Cyber Security News | Comments Off on Reducing the Insecure Deserialization Risk

To Pay or Not To Pay, That Is the Question

By Chris Bates, VP of Security Strategy, SentinelOne Every city and government organization should assume they are a ransomware target. Attacks like the ones in Atlanta, Baltimore, and Rivera Beach are […]

Posted in Cyber Security News | Comments Off on To Pay or Not To Pay, That Is the Question

The Role of Certifications for a Cyber Security Professional

Creating a win-win strategy By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Currently, cybersecurity is a field with a lot of demand, from pure management to researching […]

Posted in Cyber Security News | Comments Off on The Role of Certifications for a Cyber Security Professional

Will Your WordPress Site Be Breached In 2019?

By Randy Reiter, CEO, Don’t Be Breached and Sql Power Tools How do Hackers gain access to WordPress confidential database data?  WordPress runs 34% of the Internet. The New York […]

Posted in Cyber Security News | Comments Off on Will Your WordPress Site Be Breached In 2019?

Reducing the Occurrence and Impact of Data Breaches through Strong Practices and Procedures

By Billee Elliott McAuliffe From the news on television or stories on the Internet, it may appear that only large companies in certain industries are the targets of hackers and […]

Posted in Cyber Security News | Comments Off on Reducing the Occurrence and Impact of Data Breaches through Strong Practices and Procedures

Privacy Regulations Are Popping Up Everywhere

How to Ensure That They Don’t Dampen Innovation By Isaac Kohen, Teramind The implementation of Europe’s expansive General Data Protection Regulation was a clear harbinger that the tech sector was […]

Posted in Cyber Security News | Comments Off on Privacy Regulations Are Popping Up Everywhere

Data Manipulation Attacks Difficult To Detect But Preventable

By Tim Bandos, VP of Cybersecurity, Digital Guardian Conventional wisdom says that once an attacker is in the system, moving laterally from network to network, the damage is already done. […]

Posted in Cyber Security News | Comments Off on Data Manipulation Attacks Difficult To Detect But Preventable

Facing the Reality of VPN Security Flaws, And How to Overcome Them

NEXT UP, SOFTWARE DEFINED PERIMETERS By Don Boxley, CEO and Co-Founder, DH2i Virtual private networks (VPNs) have served as a valued tool on most data and cybersecurity professionals’ tool belts.  […]

Posted in Cyber Security News | Comments Off on Facing the Reality of VPN Security Flaws, And How to Overcome Them

Let’s Come At The Cybersecurity Skills Gap From A New Angle

By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Chess players know the satisfaction of solving a skills gap. Succeed in advancing a pawn completely across the board and […]

Posted in Cyber Security News | Comments Off on Let’s Come At The Cybersecurity Skills Gap From A New Angle

Is Your Organization Driving the Getaway Car for Cybercriminals?

A Reality Check on Ethics and Technology to Thwart Data Breaches and Fraud By Simon Marchand, Chief Fraud Prevention Officer for Nuance Communications In the U.S., the Corporate Executive Accountability […]

Posted in Cyber Security News | Comments Off on Is Your Organization Driving the Getaway Car for Cybercriminals?

Overcoming Zero Trust Challenges in the Federal Government

By Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler As federal agencies deploy mobile-friendly, cloud-based infrastructures, cyber threats are also evolving to prey on vulnerabilities in these new environments. Agencies […]

Posted in Cyber Security News | Comments Off on Overcoming Zero Trust Challenges in the Federal Government

Going for Gold – Why Hackers Are Looking For Active Directory Golden Tickets

By Matt Lock, Director of Sales Engineers, Varonis Any business that has more than a handful of employees is likely to have a reasonable amount of physical property that needs […]

Posted in Cyber Security News | Comments Off on Going for Gold – Why Hackers Are Looking For Active Directory Golden Tickets

The Dangers of HTTPS: When Secure Is Not Safe

By Eric H. Perkins, Sr. Security Risk Analyst, Edelman Financial Engines The web, as we know it, is going through a major shift to encrypt all traffic to better secure […]

Posted in Cyber Security News | Comments Off on The Dangers of HTTPS: When Secure Is Not Safe

Stay One Step Ahead Of Hipaa Compliance

By Adnan Olia, Chief Operating Officer,  Intradyn HIPAA compliance is a challenge — ask anyone in the health care industry and they’ll likely tell you the same. Health-related organizations at […]

Posted in Cyber Security News | Comments Off on Stay One Step Ahead Of Hipaa Compliance

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X