Monthly Archives: November 2020

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Halting Hackers on the Holidays

Expert tips for keeping your information safe while you shop online Commentary As we approach major holidays, with Black Friday and Cyber Monday right around the corner and a massive increase in […]

Posted in Cyber Security News | Comments Off on Halting Hackers on the Holidays

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

New Grelos skimmer variant reveals murkiness in tracking Magecart operations

Security experts from RiskIQ discovered a new variant of the Grelos skimmer that presents overlap with Magecart group operations. Researchers from RiskIQ analyzed the increased overlap of a new variant of the […]

Posted in Cyber Security News | Comments Off on New Grelos skimmer variant reveals murkiness in tracking Magecart operations

Behind the Scenes of AppSec’s Misalignment

There’s something to be heard in the conversation. By John Worrall, CEO at ZeroNorth We live in a world defined by software, which is precisely why it must be secure. […]

Posted in Cyber Security News | Comments Off on Behind the Scenes of AppSec’s Misalignment

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

Three Educational Cyber Security Steps for The Protection of Your Personal Data

1. Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen and abused. […]

Posted in Cyber Security News, Featured | Comments Off on Three Educational Cyber Security Steps for The Protection of Your Personal Data

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

Perfecting Your Cybersecurity Sales Process

By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Perfecting Your Cybersecurity Sales Process

Microsoft Patch Tuesday fixes CVE-2020-17087 currently under active exploitation

Microsoft Patch Tuesday updates for November 2020 address 112 flaws, including a Windows bug that was chained with Chrome issues in attacks. Microsoft Patch Tuesday updates for November 2020 address […]

Posted in Cyber Security News | Comments Off on Microsoft Patch Tuesday fixes CVE-2020-17087 currently under active exploitation

FBI warns of attacks on unsecured SonarQube used by US govt agencies and businesses

The FBI warns that threat actors are abusing misconfigured SonarQube applications to steal source code from US government agencies and businesses. The Federal Bureau of Investigation has issued an alert […]

Posted in Cyber Security News | Comments Off on FBI warns of attacks on unsecured SonarQube used by US govt agencies and businesses

Is User Experience Standing in the Way of Success in CyberSecurity Companies?

Cyber security product development and user experience are sometimes at odds, but they shouldn’t be. In developing a security product, the focus is often concentrated on perfecting the code on […]

Posted in Cyber Security News, Featured | Comments Off on Is User Experience Standing in the Way of Success in CyberSecurity Companies?

RansomExx ransomware now targets also Linux systems

The RansomExx Ransomware gang is expanding its operations by creating a new version that is able to infect Linux machines. RansomExx ransomware operators are expanding their operations by developing a Linux […]

Posted in Cyber Security News | Comments Off on RansomExx ransomware now targets also Linux systems

Apple addresses three actively exploited iOS zero-days

Apple released iOS 14.2 that addressed three zero-day vulnerabilities in its mobile OS that have been abused in attacks in the wild. Apple has addressed three iOS zero-day vulnerabilities actively […]

Posted in Cyber Security News | Comments Off on Apple addresses three actively exploited iOS zero-days

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X