Monthly Archives: August 2019
Flaws in HTTP/2 implementations expose servers to DoS attacks
Experts at Netflix and Google discovered eight denial-of-service (DoS) vulnerabilities affecting various HTTP/2 implementations. Researchers from Netflix and Google discovered eight denial-of-service (DoS) flaws affecting various HTTP/2 implementations. Some of […]
What’s the Matter with S3?
Public cloud breaches are becoming more frequent. Can anything be done? By Adam Conway Another week, another story about how data stored in the public cloud has been stolen or […]
How to Protect Yourself from Identity Theft Online?
Protection Against Online Identity Theft By Manish Bhickta, Product Marketer, Stellar Data Recovery Wish to acquaint yourself with Online Identity Theft, its types, its preventive measures to remain protected, and […]
A Potential Shift in Enforcement Priorities for the FTC
By Julie O’Neill, Partner, Privacy + Data Security Group, Morrison & Foerster During the course of a long-running data security action against a medical testing laboratory, the Federal Trade Commission […]
Flaws in 4G Routers of various vendors put millions of users at risk
Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices. G Richter, a security researcher at Pen […]
The Need For Centralized Critical Event Management
By Imad Mouline, Chief Technology Officer, Everbridge Global threats have increased in complexity and unpredictability. The critical events we face today are more frequent and unfortunately, costlier and potentially life-threatening, […]
From Vulnerable To Vigilant
An Overnight Transformation for an Insecure Organization By What is a successful security? Recently I’ve been pondering the question of how an organization determines whether they have a “successful security […]
Active Intrusion Detection
Protecting against data leaks from authorized network users by Fiach Reid, Director, Infinite Loop Development Ltd The weakest point of security on a network can often be its users. If […]
Canon DSLR Camera Infected with Ransomware Over the Air
A researcher discovered 6 flaws in the image transfer protocol used in Canon EOS 80D DSLR cameras that allow him to infect the device with ransomware over the air. Security […]
City of Naples, Florida, lost $700K after a cyberattack
Another city in the United States was hit by a cyber attack, according to officials in the city of Naples (Florida) they lost $700,000 in a recent attack. According to […]
Crooks turn victims into money mules via confidence/romance scams
The FBI published a security advisory to warn of cyber actors using online dating sites to conduct confidence/romance scam and recruit money mules. The FBI published a security advisory to […]
New strain of Clipsa malware launches brute-force attacks on WordPress sites
Avast spotted a new strain of Clipsa malware that is used to mine and steal cryptocurrencies along with carrying out brute-force attacks on WordPress sites. Clipsa is a malware that […]
Nation State Threats
By Blake J. Darché Each nation-state cyber threat actor has its own goals and reasons for conducting cyber attacks. Some state-sponsored actors concentrate their efforts on espionage, while others focus […]
Patching the Iron Tail is Easier Said than Done
By Willy Leichter, Vice President of Marketing, Virsec. Challenges with Patching Industrial Control Systems Leave Significant Risk Everyone knows that you should patch your application servers as often as possible. […]
Battling the Misconceptions Around Network Security Requirements
By Subhalakshmi Ganapathy, Product Analyst, ManageEngine Keeping up with the growing security risks and understanding how to protect networks is an ever-constant challenge. As threats evolve, businesses are forced to […]
Today’s Cyber Threats Demand Enhanced Strategies and Solutions
By Joseph E. Saracino, Jr., President & CEO, Cino Ltd. Family of Companies, which includes Cyber Security Solutions The term cybersecurity has become part of our everyday conversations. Headline-grabbing data […]
Reducing the Insecure Deserialization Risk
By My Apostolos Giannakidis, Security Architect, Waratek Reducing the Insecure Deserialization Risk Serializing and deserializing data is a common operation in many web application, mainly due to the speed and […]
To Pay or Not To Pay, That Is the Question
By Chris Bates, VP of Security Strategy, SentinelOne Every city and government organization should assume they are a ransomware target. Attacks like the ones in Atlanta, Baltimore, and Rivera Beach are […]
The Role of Certifications for a Cyber Security Professional
Creating a win-win strategy By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Currently, cybersecurity is a field with a lot of demand, from pure management to researching […]
Will Your WordPress Site Be Breached In 2019?
By Randy Reiter, CEO, Don’t Be Breached and Sql Power Tools How do Hackers gain access to WordPress confidential database data? WordPress runs 34% of the Internet. The New York […]
Reducing the Occurrence and Impact of Data Breaches through Strong Practices and Procedures
By Billee Elliott McAuliffe From the news on television or stories on the Internet, it may appear that only large companies in certain industries are the targets of hackers and […]
Privacy Regulations Are Popping Up Everywhere
How to Ensure That They Don’t Dampen Innovation By Isaac Kohen, Teramind The implementation of Europe’s expansive General Data Protection Regulation was a clear harbinger that the tech sector was […]
Data Manipulation Attacks Difficult To Detect But Preventable
By Tim Bandos, VP of Cybersecurity, Digital Guardian Conventional wisdom says that once an attacker is in the system, moving laterally from network to network, the damage is already done. […]
Facing the Reality of VPN Security Flaws, And How to Overcome Them
NEXT UP, SOFTWARE DEFINED PERIMETERS By Don Boxley, CEO and Co-Founder, DH2i Virtual private networks (VPNs) have served as a valued tool on most data and cybersecurity professionals’ tool belts. […]
Let’s Come At The Cybersecurity Skills Gap From A New Angle
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Chess players know the satisfaction of solving a skills gap. Succeed in advancing a pawn completely across the board and […]
Is Your Organization Driving the Getaway Car for Cybercriminals?
A Reality Check on Ethics and Technology to Thwart Data Breaches and Fraud By Simon Marchand, Chief Fraud Prevention Officer for Nuance Communications In the U.S., the Corporate Executive Accountability […]
Overcoming Zero Trust Challenges in the Federal Government
By Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler As federal agencies deploy mobile-friendly, cloud-based infrastructures, cyber threats are also evolving to prey on vulnerabilities in these new environments. Agencies […]
Going for Gold – Why Hackers Are Looking For Active Directory Golden Tickets
By Matt Lock, Director of Sales Engineers, Varonis Any business that has more than a handful of employees is likely to have a reasonable amount of physical property that needs […]
The Dangers of HTTPS: When Secure Is Not Safe
By Eric H. Perkins, Sr. Security Risk Analyst, Edelman Financial Engines The web, as we know it, is going through a major shift to encrypt all traffic to better secure […]
Stay One Step Ahead Of Hipaa Compliance
By Adnan Olia, Chief Operating Officer, Intradyn HIPAA compliance is a challenge — ask anyone in the health care industry and they’ll likely tell you the same. Health-related organizations at […]