Identity Matching: What You Need to Know About It
When asked how they can improve a bank’s security from financial crime, many bankers are at a loss for words. Granted, the question is a broad one and difficult to […]
What is the Main Goal of Penetration Testing?
By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the top priorities for today’s business world. The internet has enabled businesses to […]
Vice Society ransomware also exploits PrintNightmare flaws in its attack
Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice Society ransomware operators are actively exploiting Windows print spooler PrintNightmare […]
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has […]
Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks
The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. The Australian Cyber Security Centre (ACSC) warns of an escalation in LockBit 2.0 ransomware […]
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and […]
Is The Cloud Leaving You Exposed?
Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. On a traditional network, user accounts are the main identity type and, […]
Reshaping the future of transportation with the ITS World Congress
The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As more and more organizations look to digital tech to transform their operations, […]
Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have […]
How to Accelerate SecOps efficiency and extend capabilities with XDR
By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every […]
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions […]
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To […]
Cloud Security Automation: The Fastest Path to Zero Trust
By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and […]
The Silver Bullet for Ransomware’s Golden Goose
Ransomware is a hugely profitable business. The only way to end it is to stop criminals from making money off your data. By Elliot Lewis, Co-founder, and CEO of Keyavi Data Corp. […]
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez […]
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today […]
No More Ransom helped ransomware victims to save almost €1B
The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost €1 billion in payments. No More Ransom […]
XCSSET MacOS malware targets Telegram, Google Chrome data and more
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and Google Chrome. Security researchers from Trend Micro continues to monitor […]
Takeaways from The Oldsmar Water Attack & What Security Leaders Can Do About It
With Real Examples & Screenshots of Cyber Attacks on Water & Wastewater Facilities By Michael Yehoshua, VP of Global Marketing, SCADAfence Over the last few months, cybersecurity journalists and the […]
How Cobwebs Technologies’ Webint Platform Helps Enterprises To Face The Rising Tide Of Security Risks Emerging From The Dark Web
The ai-based dark web monitoring capability provides a visual representation of cyber events, revealing a larger, graphically displayed picture as inter-connected dots of information based on collected data By Udi […]
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle leaders faced last year. As we begin 2021, it’s important to remember […]
Regula Delivers Remote Identity Verification for Everyone
A modern world requires modern solutions. Fraudsters constantly improve their skills; do not let your services lag behind! By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Previously an opportunity, […]
A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of printers worldwide
Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker could exploit to gain admin rights on systems. Researchers from SentinelOne discovered […]
No, You Don’t Need EDR
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To […]
New enhanced Joker Malware samples appear in the threat landscape
The Joker mobile trojan is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android […]
Exploring the Synergies Between HIPAA Compliance and Cybersecurity
By Dr. Rachael Bailey, Healthcare IT Content Consultant at Atlantic.Net As the world finds itself in the clutch of a global pandemic, it is evident that cybercriminals are using the […]
COVID-19 Pushes the Introduction of Secure Digital Government Solutions
The Secure Digital Authentication of Official Documents Plays an Important Role in Times of Pandemic By Andreas Räschmeier, CEO at Veridos In the wake of the pandemic, governments and public authorities […]
Current Cybersecurity Weaknesses Will Result in Continued Data Breaches
By Randy Reiter CEO of Don’t Be Breached Problems in cybersecurity resulted in the successful hacking campaign that foreign state hacking groups used leveraging product updates from the IT software […]
The Importance Of Protecting Your App’s Source Code
By Rui Ribeiro, CEO and Co-founder, Jscrambler If your business operations involve any type of web or mobile app, it’s likely that the source code of these apps represents a […]
It’s Time to Issue Company Passwords Again
By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found that only 16% of employers issue passwords to employees. This is an […]