Monthly Archives: June 2021
How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar
Click Here Register Now A trusted brand reputation is the product of relentless hard work and passionate devotion. Its importance can not be overstated—it builds company loyalty, develops a strong […]
Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients
By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and management (RMM) platform to centrally manage their clients’ networks is a foregone […]
Key Business Lessons Learned from The SolarWinds Hack
By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced businesses to adapt fast to the shifting remote work realities. This new […]
Siloscape, first known malware that drops a backdoor into Kubernetes clusters
Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and spread in the Kubernetes cluster. Researchers from Palo Alto Networks […]
StayHackFree – Your Kid’s Sports Team
Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team. Really, I […]
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice […]
Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat […]
These 2 attacks allow to alter certified PDF Documents
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. Researchers from Ruhr-University Bochum have disclosed two new attack techniques, […]
New Epsilon Red Ransomware appears in the threat landscape
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a US company. Researchers from Sophos spotted a new piece of […]
Experts devised a new attack to bypass Microsoft PatchGuard
A security researcher discovered a bug in PatchGuard Windows security feature that can allow loading unsigned malicious code into the Windows kernel. Japanese researcher Kento Oki has discovered a bug […]
How To Make The Most of Increased Cybersecurity Spend
The average organization devotes 21% of its IT budget to cybersecurity. By Stu Sjouwerman, CEO, KnowBe4 With the threat of malware touching more and more organizations, boards are beginning to […]
Understanding The Surge in Cyber Extortion
By Jamie Wilson, Founder and Chairman, Cryptoloc Ransomware is on the rise, and it’s not slowing down. Cryptoloc founder and chairman Jamie Wilson explains the perfect storm of conditions that […]