Sunday, August 25, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Insider Threat Mitigation Training this Summer

While most CISO’s, IT Executives and Staff are planning out a relaxing summer with their families – vacations, barbecues and cookouts, camping and fishing, a disgruntled employee may be planning to steal a company's intellectual property, trade secrets, or...

Five Cyber Security Best Practices to Follow

It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on average every 14 seconds. The impact of cyber security...

Role of Identity and Access Management (IAM) in Cyber Security

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc In today’s digitally enabled world, Identity and Access Management (IAM) plays a critical role in any enterprise security plan, as it is inseparably linked to the security and productivity of companies....

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

NASA Office of Inspector General revealed that the Agency's network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions. According to a report published by the NASA Office of Inspector General, hackers...

Were Major US Businesses and ISPs Hit with An Iranian Cyber Army Attack Yesterday?

by Gary S. Miliefsky, CISSP, Publisher, Cyber Defense Magazine On Monday, June 24, 2019, the US Government announced ‘cyber attack’ sanctions against Iran for their alleged shooting down of an unmanned US Drone.  Throughout the day, yesterday, many US news...

How To Implement an Effective Vulnerability Management Program

By Stephen Newman, Secureauth/Core Security The September Equifax data breach that put more than 140 million people at risk of identity theft and financial fraud could have been prevented. A patch for the vulnerability that attackers exploited was available two...

May Patch Tuesday

Be Aware of Skype for Android Vulnerability and Windows Error Reporting Elevation of Privilege Vulnerability by Chris Goettl, Director of Product Management, Security, Ivanti Looks like a busy, but pretty typical lineup this month. Microsoft has released a total of...

Know Who to Call When Phishing Strikes

By Russ Cohen As a former "white hat hacker” helping businesses improve cybersecurity by illuminating areas of vulnerability, one of the more creative aspects of my job was crafting a convincing phishing attack. The objective was to construct an email...

Report: Thousands of Pharmaceutical Records Leaked in Possible HIPAA Violation

vpnMentor‘s research team has discovered a leak in a database regarding the prescription medication Vascepa. The research team, led by Noam Rotem and Ran Locar found several sets of unsecured and unencrypted data regarding Vascepa. Vascepa, a prescription supplement that helps lower triglycerides....

Modular Plurox backdoor can spread over local network

Kaspersky experts recently discovered a backdoor dubbed Plurox that can spread itself over a local network and can allow installing additional malware.  Kaspersky experts discovered the Plurox backdoor in February, it can spread itself over a local network and could...

STAY CONNECTED

36,264FansLike
55,564FollowersFollow
Show Buttons
Hide Buttons