Monthly Archives: November 2019
The Weakest Points in Your Network are Your People
The Weakest Points in Your Network are Your People By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let the bad guys in!” This is a persistent […]
Two unpatched RCE flaws in rConfig software expose servers to hack
The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely open-source, network configuration management utility […]
Chicago student charged with writing code to spread ISIS propaganda
US authorities arrested Thomas Osadzinski, a student at DePaul University, because he allegedly built a custom Gentoo Linux distro for ISIS. Thomas Osadzinski (20), a student at DePaul University, Chicago, […]
New NextCry Ransomware targets Nextcloud instances on Linux servers
NextCry is a new ransomware that was spotted by researchers while encrypting data on Linux servers in the wild. Security experts spotted new ransomware dubbed NextCry that targets the clients of the […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
DDoS-for-Hire Services operator sentenced to 13 months in prison
Sergiy P. , the administrator of DDoS-for-hire services was sentenced to 13 months in prison, and additional three years of supervised release. Sergiy P. Usatyuk, a man that was operating […]
Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild
Microsoft’s Patch Tuesday updates for November 2019 address over 70 flaws, including an Internet Explorer issue (CVE-2019-1429) that has been exploited in attacks in the wild. Microsoft’s Patch Tuesday updates […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
Applying Security Across Heterogeneous IT Systems
Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security, […]
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
How to Stop Cybersecurity Attacks before They Start
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL Cybersecurity breaches are part of the nasty reality of today’s IT infrastructure and even though they are not […]
Deceptively Simple Detection
by Carolyn Crandall, Chief Deception Officer and CMO, AttivoNetworks Emerging technologies come with a lot of promises and ROI expectations. Some move forward and thrive, while others just fade away. […]
Sprint Beta Testing 5G Smart City in Georgia
By Kayla Matthews, Freelance Writer, Productivity Bytes Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though the test doesn’t encompass the whole city, it […]
Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands […]
RSA Conference 2020 Introduces the RSAC Engagement Zone
New Dedicated Area for Peer-to-Peer Networking and Collaborative Learning Designed to Deepen Connections Among Cybersecurity Community at RSAC RSA Conference, the world’s leading information security conferences and expositions, today announced […]
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat […]
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology […]
ZoneAlarm forum site hack exposed data of thousands of users
This is really an embarrassing incident, ZoneAlarm forum site has suffered a data breach exposing data of its discussion forum users. ZonaAlarm, the popular security software firm owned by Check […]
Secure Data Is Gold: U.S. Immigration Options for Cybersecurity Experts
By Lin Rose Walker, Esq. and Scott R. Malyk, Esq. A decade ago, very few people outside of the Information Technology (IT) industry knew what cybersecurity was or even considered […]
Cybersecurity Essentials for Small and Medium Businesses
Protect your business from hackers by knowing some of the top cybersecurity essentials you should adapt within your organization. By Peter Porr, Marketing and Brand Manager, ImageWare Systems Both government agencies […]
Major ASP.NET hosting provider SmarterASP hit by ransomware attack
Another day, another victim of a ransomware attack, this time major ASP.NET hosting provider SmarterASP announced it was infected by ransomware. SmarterASP.NET is one of the most popular ASP.NET hosting […]
The Platinum APT group adds the Titanium backdoor to its arsenal
Kaspersky researchers have found a new advanced backdoor used by the Platinum advanced persistent threat (APT) group in attacks in the wild. Security experts at Kaspersky Lab have spotted a […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
How to Erase Data from Mobile Devices: Four Common Misconceptions
By Mark Dobson, ITAD Specialist, NextUse When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the company data stored on them to end […]
Here’s How You Can Secure Your App from Cyber Attacks
By Twinkle Do you know how many people own a smartphone? Well, you’ll be shocked to know that as per the researchers estimate the total number of mobile device users […]
Sovereign Cyber Effects Provided Voluntarily by Allies (SCEPVA)
The Devil is in the Kilobyte By Wiesław Goździewicz, Expert, Kościuszko Institute NATO has gone a long way in the development of its policy on cyber operations. The three most […]
How Organizations Can Best Avoid GDPR Fines through Continuous Compliance
By Fouad Khalil, VP of Compliance at SecurityScorecard Since it came into force in May 2018, the EU’s GDPR has made many businesses nervous. This is hardly surprising given the […]
10 Best Tips for Using Metasploit to Harden Your Network
By Tim Keary, Copywriter, Comparitech How do you know if your network is safe? Cybercrime is an everyday threat to companies. There is one hacking attack every 39 seconds. Some […]