Monthly Archives: May 2020
COVID-19: How to Take Advantage of Teleworking
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt With the COVID-19 outbreak, companies and governments are taking preventive measures that include teleworking. This can be a turning point in the way we look […]
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new […]
Cyber Crime is Paying
What the Evolution of Ransomware Means for the Security Industry by Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies If you were talk to a retired police officer or FBI […]
Docker Issued Fix for Windows Privilege Escalation Bug
By David Bisson Docker released a patch for a vulnerability that could have allowed attackers to escalate their privileges on Windows systems. How the Vulnerability Works Discovered by Pen Test […]
$100 Million Paid – One Billion in Sight for Hackers
By Marten Mickos, CEO at HackerOne One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred million dollars in bounties. […]
StrandHogg 2.0 Android flaw affects over 1 Billion devices
Researchers disclosed a new critical vulnerability (CVE-2020-0096, aka StrandHogg 2.0) affecting the Android operating system that could allow attackers to carry out a sophisticated version of Strandhogg attack. A group […]
A Cyber Approach to Coronavirus Containment
By Zohar Rozenberg What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize […]
Crooks hacked e-shops and threaten to sell SQL databases if ransom not paid
Threat actors are offering for sale more than two dozen SQL databases belonging to e-commerce websites for different countries. Hackers are offering for sale more than two dozen SQL databases […]
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just […]
Hackers ransomware operators leak credit card data from Costa Rica’s BCR bank
Maze ransomware operators published credit card details stolen from the Bank of Costa Rica (BCR) threatening to leak other lots every week. Maze ransomware operators have released credit card data […]
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills, […]
The Cost of Cybercrime Is Constantly Rising: How to Combat Ransomware Attacks on SMBs
By Rui Lopes, Sales Engineering and Technical Support Director, Panda Security Cybercrime is an undeniable constant in the business landscape these days. The cost of cybercrime is constantly rising—it is […]
Credential Stuffing: Why It’s on The Rise and How to Decrease Your Risk
By Kevin Landt, VP of Product Management at Cygilant Reports of high-profile data breaches like Equifax’s, LinkedIn’s, or Yahoo’s always caused an initial, widespread panic — and for good reason. But […]
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not […]
Meal delivery service Home Chef discloses data breach
Meal delivery service Home Chef has confirmed that it recently suffered a security breach that exposed its customer information. Meal delivery service Home Chef has disclosed a data breach that […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]
Researchers disclose five Microsoft Windows zero-days
Security experts have disclosed five unpatched vulnerabilities in Microsoft Windows, four of which rated as high-risk severity. Security experts from Trend Micro’s Zero Day Initiative (ZDI) have published information on […]
ANALYSIS: Deception for the next generation – Attivo BOTsink
I have been using the Attivo BOTsink by AttivoNetworks as my primary deception platform in the lab for quite some time. I have found it perfect for collecting attacks and […]
Moving Beyond Honeypots to Next-Generation Deception Technology
By Wade Lance, field CTO, Illusive Networks When security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of […]
Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways
Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways. Palo Alto Networks Unit 42 researchers observed both the […]
How Pizza Can Be the Recipe to Understand Cloud Security
By Yohanan Berros, Customer Operation Managers, XM Cyber It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises […]
Texas Department of Transportation (TxDOT) hit by a ransomware attack
A new ransomware attack hit the Texas government, the malware this time infected systems at the state’s Department of Transportation (TxDOT). The Texas government suffered two ransomware attacks in a […]
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series […]
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success […]
Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed
Britain’s Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees’ details. Interserve, a contractor for the Britain’s Ministry of Defence suffered […]
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility […]
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can […]
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: […]