Monthly Archives: July 2020
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Building A Telework Health Scorecard To Meet Surge Requirements And Long-Term Resiliency
By Stan Lowe, Global Chief Information Security Officer, Zscaler Over the past months, the U.S. Federal government has deployed solutions to keep employees productive and secure from any location, including […]
FBI warns US companies on the use of Chinese Tax Software
The FBI has issued an alert to warn US organizations of the risk associated with the use of Chinese tax software that could be infected with malware. The Federal Bureau […]
Post COVID-19 Cybersecurity and Future-of-Work Predictions
By Chris DeRamus, VP of Technology, Cloud Security Practice Remote work is here to stay: “Some organizations (including DivvyCloud) preferred coming into the office for work prior to the pandemic […]
The Future of Security – Predictions Post COVID-19
By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of […]
Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud
By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]
The Rise of COVID-19 Phishing Attacks: How Cyber Adversaries Are Adopting Phishing to Generate New Threat Vectors
By Brad Slavin, CEO of DuoCircle LLC While COVID-19 has locked all people in their homes, with office premises closed, cyber adversaries seem to have a field day using the […]
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global […]
US DoJ charged two Chinese hackers working with MSS
US DoJ charged two Chinese hackers working with China’s Ministry of State Security with hacking into computer systems of government organizations and companies worldwide. US DoJ charged two Chinese hackers […]
A Passwordless Future: Will Biometric Identification Replace Passwords?
By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]
How to Maintain Anonymity in Communications?
By Milica D. Djekic The kids would love to play the games. They would not be attracted to the computer’s games only, but rather with some being so creative, engaging, […]
Iphone Extraction Without A Jailbreak
Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]
Should We Be Worried About Vehicle Hacking?
And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and […]
COVID-19 And the Easyjet Hack – A Perfect Phishing Storm
By Shachar Daniel, Safe-T’s CEO As if the airline industry didn’t have enough to worry about at the moment, on May 19, EasyJet, the UK’s biggest budget airline announced it […]
How to Combat Cybersecurity Attacks & Cyber Warfare
By Adnan Olia, Chief Operating Officer and Co-owner of Intradyn It’s no secret that cybersecurity attacks and cyber warfares are real challenges and threats to the safety of individuals, businesses, […]
How To Fight A Virus: Lessons From Cybersecurity
By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as […]
Hackers are scanning the web for vulnerable Citrix systems
Threat actors are scanning the Internet for Citrix systems affected by the recently disclosed vulnerabilities. This week Citrix has addressed 11 vulnerabilities affecting the ADC, Gateway, and SD-WAN WANOP networking products. The […]
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]
Juniper Networks addressed many issues in its products
Juniper Networks addressed several vulnerabilities in its firewalls, most of them can be exploited by attackers for denial-of-service (DoS) attacks. Juniper Networks addressed several vulnerabilities in its products, most of […]
Joker malware apps bypassed Google’s Play Store security checks
Check Point research discovered that the Joker (aka Bread) Android malware once again has bypassed protections implemented by Google for its Play Store. Researchers from security firm Check Point discovered […]
Software-Defined Perimeters Offer Secure Connectivity to Smart Cities
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]
In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats
Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons By Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, Exabeam Security operations centers (SOCs) are […]
Benefits of A Security Operation Center (SOC)
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt The creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks. […]
DOJ indicts Fxmsp hacker for selling access to hacked businesses
The US Department of Justice has indicted a hacker named Fxmsp for hacking over three hundred organizations worldwide and selling access to their networks. The US Department of Justice has […]
Is Proactive Insider Risk Mitigation Possible?
Why Companies Need More Than Technical Indicators to Identify Their Biggest Threats Before They Do Harm By David A. Sanders, Director of Insider Threat Operations, Haystax Most corporate insider threat […]
The Blue Whale Challenge – Cyber-bullying Teens
What is it? The “Blue Whale Challenge”, is an online interactive phenomenon where an administrator or “curator” assigns 50 tasks to a participating and compliant individual. A task is issued […]
Don’t Be Breached When Using Commercial Software Products
By Randy Reiter CEO of Don’t Be Breached In May 2020 the software giant SAP made available eighteen security fixes for its Adaptive Server Enterprise (ASE) database system (formerly Sybase […]