Analytics & Security Insight On 2021 And Beyond
Predictions for the Future of the Security Space By Billy Spears, Chief Information Security Officer, Alteryx 2020 has been a year unlike any other, with unforeseen challenges creating hurdles for […]
How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy
By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move […]
China-linked APT31 group was behind the attack on Finnish Parliament
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to […]
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert […]
Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation
By Pedro Fortuna, CTO, Jscrambler Magecart has certainly garnered mainstream media attention over the last couple of years. Perhaps it’s the high profile nature of many of their targets (British […]
Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack, […]
CMMC – Lessons Learned to Date
By Carter Schoenberg, Vice President of Cybersecurity at SoundWay Consulting. In the January issue of Cyber Defense Magazine, my first article provided an introduction to the Cybersecurity Maturity Model Certification […]
3 SaaS Backup Rules to Keep Your Data Safer in 2021
By Dmitry Dontov, CEO and Chief Architect of Spin Technology In the wake of the global pandemic, organizations of all types and sizes have pivoted to cloud resources to accommodate […]
REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims
The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business partners to force victims to pay the ransom. The REvil/Sodinokibi ransomware operators announced that […]
Working from Home? You’re Not Alone
The rise of cyber hacks in an age of remote working – and how to prevent them By Steve Hanna, Embedded Systems Work Group Co-Chair at Trusted Computing Group (TCG) […]
Making the Most of Virtual Cybersecurity Events for your Company and the Community
By Trevor Daughney, VP, product marketing, Exabeam With the pandemic and shutdown orders still in full effect in many regions worldwide, moving in-person events to virtual experiences is the reality […]
T-Mobile customers were hit with SIM swapping attacks
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after […]
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal […]
Does Sunburst Have Your Confidential Emails and Database Data?
By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware […]
The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds […]
Ransomware is Evolving – Agencies Must Prioritize Data Backup
By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage The threat of ransomware is not new – but we are seeing a renewed focus since the onset of […]
Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence
By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence […]
Brave New World: Safari Content Blocking
By Andrey Meshkov, CEO and CTO at AdGuard Content blocking is not a priority for Apple and WebKit. Content blocking in Safari is possible despite all its issues and limitations. […]
Vulnerability Patching: Why Does It Fall Short So Often?
Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, Director of Security Product Management, Ivanti It isn’t glamorous. It won’t guarantee […]
Data Risk, Intelligence and Insider Threats
When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated […]
Cyber Resiliency Will Become the New Normal In 2021 Combating the Rise of Ransomware
By Drew Daniels, CIO and CISO, Druva This past year, cyber resiliency proved to be a vital asset to ensure business continuity, and it’s one that will continue to take […]
Credit Cards, Cash and Compliance, Oh My! Eliminating Audit Fatigue in The Financial Services Sector
By Steve Horvath, Vice President, Strategy & Cloud, Telos Corporation When we think of our finances, we think of them as a responsibility – a commitment to ensure payments are […]
2021 Predictions: Addressing the Challenge of Cloud-Native App Security
By Ankur Singla, Founder and CEO of Volterra Organizations of all sizes are adopting cloud-native application design and deployment practices as they continue to digitally transform business processes. This includes […]
Experts discovered a new Trickbot module used for lateral movement
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot […]
Emotet Botnet dismantled in a joint international operation
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law enforcement, lead by Europol, has dismantled the infrastructure of the […]
The European Medicines Agency (EMA) revealed Friday that COVID-19 vaccine documents stolen from its servers have been manipulated before the leak.
The European Medicines Agency (EMA) declared that COVID-19 vaccine documents stolen from its servers in a recent cyber attack have been manipulated. In December, a cyber attack hit the European […]
How To Keep Your Children Safe In Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault As parents, we have conflicting feelings on remote learning. One on hand, we want our children to stay healthy, especially in […]
Cybersecurity Maturity Model Certification (CMMC)
It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication, […]
Communication Streaming Challenges
By Milica D. Djekic As it’s well-known, there are a lot of ways of tracking someone’s e-mail, chat, or social media accounts. The defense professionals are quite familiar with such […]