Monthly Archives: May 2020
Cyber Defense Test Labs
Cybersecurity Products and Services reviews are by James Hess, Yan Ross, Gary Miliefsky and Dr. Peter Stephenson, and are more than traditional product reviews, exclusively at Cyber Defense Magazine. Cyber […]
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats. […]
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to […]
ODNI Launches New Approach to Securing US Elections
Today, the ODNI announced that the U.S. Intelligence Community (IC) will lead all intelligence-based threat briefings to candidates, campaigns, and political organizations under the U.S. Government’s notification framework. Bill Evanina, […]
China-linked hackers are attempting to steal COVID-19 Vaccine Research
US authorities warned healthcare and scientific researchers that China-linked hackers were attempting to steal COVID-19 vaccine research. US authorities warned healthcare and scientific researchers that China-linked hackers were attempting to […]
A Timely Report for a Changing World – The 2020 Verizon Mobile Security Index
As the world rapidly adapts to working remotely and virtual learning, the importance of communicating cybersecurity best practices while using mobile devices is more important than ever before. Given the […]
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher. […]
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to […]
Iran ‘s officials revealed that hackers compromised and damaged a small number of computers at the port of Shahid Rajaei in the city of Bandar Abbas.
Iranian officials announced on sunday that hackers damaged a small number of systems at the port of Shahid Rajaei in the city of Bandar Abbas. Bandar Abbas is the capital […]
STAMINA, a new approach to malware detection by Microsoft, Intel
Microsoft and Intel have devised a new approach to malware detection, dubbed STAMINA, that involves deep learning and the representation of malware as images. STAtic Malware-as-Image Network Analysis (STAMINA) is […]
Secure Remote Active Directory Logins
By François Amigorena, CEO and founder, IS Decisions Organizations across the world have seen their way of working changed from face to face to remote working. This big change is […]
Advice from Veterans on Transitioning Warriors from the Battlefield to the Technology World
by Craig Fulton, Chief Customer Officer, ConnectWise Military training is designed to prepare soldiers for any battle they might face. As veterans transition into the civilian world, they may find […]
Sodinokibi gang hacked law firm of the celebrities and threatens to release the docs
The Sodinokibi ransomware gang stolen gigabytes of legal documents from the law firm of the stars, Grubman Shire Meiselas & Sacks (GSMLaw). The Sodinokibi ransomware group claims to have stolen […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
Samsung fixes a zero-click issue affecting its phones
Samsung addressed this month a critical 0-click vulnerability that was discovered by security researchers from Google. Samsung released this week a security patch that addresses a critical vulnerability, tracked as […]
For A Fully Rounded Defence, Automate
By Karen Levy, Vice President, Product and Client Marketing, Recorded Future Cybercriminals are now running their operations in a way not dissimilar to modern legitimate businesses. Criminal groups have organizational […]
Facebook’s $550 Million Settlement: A Warning to Companies Collecting Biometric Data
Facebook’s significant settlement could incite future class action lawsuits, further emphasizing the need for companies to comply with biometric privacy laws. By Billee Elliott McAuliffe, Member, Lewis Rice Thanks to […]
Law enforcement agencies dismantled Infinity Black hacker group
Europol arrested five members of the Infinity Black hacker group that were selling stolen user credentials and hacking tools. Europol announced another success in the fight against cybercrime, today it […]
Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020
By Kelly Castriotta, North American Head of Product Development for Financial Lines at Allianz Global Corporate & Specialty For the first time ever, Cyber incidents (39% of responses) ranks as […]
Don’t Enable Hackers and Employees at The Same Time
By Dor Knafo, CEO, co-Founder, Axis Security When work from home went from a luxury to mandatory overnight, that put a lot of pressure on already stretched IT, teams. The […]
A Guide to Firewalls: Best Firewalls for VOIP And Unified Communications
By Christopher Gerg, CISO and VP of Cyber Risk Management, Tetra Defense The overwhelming popularity of VoIP Private Branch Exchange systems (PBX) in the modern workplace demonstrates that the benefits […]
Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the […]
Practical Vulnerability Remediation Strategies
By Syed Abdur, Brinqa Cyber vulnerabilities have a way of piling up. Vulnerability assessment and scanning tools report them in droves from every corner of the technology infrastructure – network, […]
Lifecycle Assurance for Platform Integrity and Security
By Tom Garrison, Vice President and General Manager of Client Security Strategy Today’s supply chains are global, complex, and often lack transparency. This creates a variety of challenges, from design […]
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans […]
Post-COVID-19 Cybersecurity Predictions
By Ilia Sotnikov, Vice President of Product Management, Netwrix Lots of pundits are speculating about what effects the COVID-19 pandemic will have on the economy, social behavior, politics and related […]
GoDaddy discloses a data breach, web hosting account credentials exposed
GoDaddy has been notifying its customers of a data breach, threat actors might have compromised their web hosting account credentials. GoDaddy has been notifying its customers of a data breach, […]
Nation-state actors are targeting UK universities to steal info on COVID-19 research
The UK’s National Cyber Security Centre (NCSC) warned of targeted attacks against UK universities and scientific facilities that are involved in the COVID-19 research. The NCSC reported that nation-state actors are […]
Modernizing Government Processes Requires Modern Cybersecurity Practices
By Anthony Bettini, CTO, WhiteHat Security According to IDG, 89% of companies have recently adopted a digital-first business strategy or plan to do so. As part of this pattern, the […]
KPMG Recommends Steps to Bolster Cybersecurity in the COVID-19 Era
By Ton Diemont, Head of Cybersecurity at KPMG in Saudi Arabia Hackers are jumping on the COVID-19 pandemic to exploit global uncertainty Riyadh, 07 April 2020: The outbreak of Covid-19 […]