Monthly Archives: July 2020

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Building A Telework Health Scorecard To Meet Surge Requirements And Long-Term Resiliency

By Stan Lowe, Global Chief Information Security Officer, Zscaler Over the past months, the U.S. Federal government has deployed solutions to keep employees productive and secure from any location, including […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Building A Telework Health Scorecard To Meet Surge Requirements And Long-Term Resiliency

FBI warns US companies on the use of Chinese Tax Software

The FBI has issued an alert to warn US organizations of the risk associated with the use of Chinese tax software that could be infected with malware. The Federal Bureau […]

Posted in Cyber Security News | Comments Off on FBI warns US companies on the use of Chinese Tax Software

The Future of Security – Predictions Post COVID-19

By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on The Future of Security – Predictions Post COVID-19

Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

The Rise of COVID-19 Phishing Attacks: How Cyber Adversaries Are Adopting Phishing to Generate New Threat Vectors

By Brad Slavin, CEO of DuoCircle LLC While COVID-19 has locked all people in their homes, with office premises closed, cyber adversaries seem to have a field day using the […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on The Rise of COVID-19 Phishing Attacks: How Cyber Adversaries Are Adopting Phishing to Generate New Threat Vectors

US DoJ charged two Chinese hackers working with MSS

US DoJ charged two Chinese hackers working with China’s Ministry of State Security with hacking into computer systems of government organizations and companies worldwide. US DoJ charged two Chinese hackers […]

Posted in Cyber Security News | Comments Off on US DoJ charged two Chinese hackers working with MSS

A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Everything You Want to Know About Single Sign-On

By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Everything You Want to Know About Single Sign-On

Iphone Extraction Without A Jailbreak

Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Iphone Extraction Without A Jailbreak

Should We Be Worried About Vehicle Hacking?

And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Should We Be Worried About Vehicle Hacking?

COVID-19 And the Easyjet Hack – A Perfect Phishing Storm

By Shachar Daniel, Safe-T’s CEO As if the airline industry didn’t have enough to worry about at the moment, on May 19, EasyJet, the UK’s biggest budget airline announced it […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on COVID-19 And the Easyjet Hack – A Perfect Phishing Storm

How To Fight A Virus: Lessons From Cybersecurity

By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How To Fight A Virus: Lessons From Cybersecurity

IOT Security Embedded in Memory Cards

AS DEVICES, MACHINERY AND MANUFACTURING PLANTS GET SMARTER, THEY ALSO BECOME MORE VULNERABLE. By Hubertus Grobbel, Vice President Security Solutions, Swissbit. When designing networked devices, machinery, and production facilities, developers […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on IOT Security Embedded in Memory Cards

Hackers are scanning the web for vulnerable Citrix systems

Threat actors are scanning the Internet for Citrix systems affected by the recently disclosed vulnerabilities. This week Citrix has addressed 11 vulnerabilities affecting the ADC, Gateway, and SD-WAN WANOP networking products. The […]

Posted in Cyber Security News | Comments Off on Hackers are scanning the web for vulnerable Citrix systems

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

Juniper Networks addressed many issues in its products

Juniper Networks addressed several vulnerabilities in its firewalls, most of them can be exploited by attackers for denial-of-service (DoS) attacks. Juniper Networks addressed several vulnerabilities in its products, most of […]

Posted in Cyber Security News | Comments Off on Juniper Networks addressed many issues in its products

Joker malware apps bypassed Google’s Play Store security checks

Check Point research discovered that the Joker (aka Bread) Android malware once again has bypassed protections implemented by Google for its Play Store. Researchers from security firm Check Point discovered […]

Posted in Cyber Security News | Comments Off on Joker malware apps bypassed Google’s Play Store security checks

Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons By Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, Exabeam Security operations centers (SOCs) are […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

DOJ indicts Fxmsp hacker for selling access to hacked businesses

The US Department of Justice has indicted a hacker named Fxmsp for hacking over three hundred organizations worldwide and selling access to their networks. The US Department of Justice has […]

Posted in Cyber Security News | Comments Off on DOJ indicts Fxmsp hacker for selling access to hacked businesses

The Blue Whale Challenge – Cyber-bullying Teens

What is it? The “Blue Whale Challenge”, is an online interactive phenomenon where an administrator or “curator” assigns 50 tasks to a participating and compliant individual. A task is issued […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on The Blue Whale Challenge – Cyber-bullying Teens

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X