This article has been indexed from Cyber Defense Magazine Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks […] The post How to Protect All Five Stages of the IoT Security…
Category: Cyber Defense Magazine
Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)
This article has been indexed from Cyber Defense Magazine How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in […] The post Microsoft Successfully Defended The Azure Cloud From A Massive DDOS…
Why Hackers Attack Mobile Devices and How to Prevent It
This article has been indexed from Cyber Defense Magazine By Nicole Allen, Marketing Executive at Salt Communications According to a Gallup poll, the frequency of remote work […] The post Why Hackers Attack Mobile Devices and How to Prevent It…
What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?
This article has been indexed from Cyber Defense Magazine Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan […] The post What Are DeFi Flash Loans & How To Prevent Flash…
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
This article has been indexed from Cyber Defense Magazine With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at […] The post How to Avoid Spam Texts and Protect Personal Information in…
FIN7 group continues to target US companies with BadUSB devices
This article has been indexed from Cyber Defense Magazine The Federal Bureau of Investigation (FBI) warns US companies that the FIN7 cybercriminals group is targeting the US […] The post FIN7 group continues to target US companies with BadUSB devices…
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
This article has been indexed from Cyber Defense Magazine Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By […] The post Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency appeared…
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
This article has been indexed from Cyber Defense Magazine Lessons from The Cheshire Cat in Concealment & Misdirection Cyber deception has come a long way from deploying […] The post It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s…
Getting Started with Active Directory Security
This article has been indexed from Cyber Defense Magazine Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the […] The post Getting Started with Active Directory Security appeared first on Cyber…
Phishing: How To Improve Cybersecurity Awareness
This article has been indexed from Cyber Defense Magazine By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced […] The post Phishing: How To Improve Cybersecurity Awareness appeared first on Cyber…
“Owning Your Identity” Through Biometric and Passwordless Innovations
This article has been indexed from Cyber Defense Magazine By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between […] The post “Owning Your Identity” Through Biometric and Passwordless Innovations appeared first…
Surviving The New Era of Terabit-Class DDoS Attacks
This article has been indexed from Cyber Defense Magazine By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted […] The post Surviving The New Era of Terabit-Class DDoS Attacks appeared first…
How To Thwart Fraud with Phone Numbers
This article has been indexed from Cyber Defense Magazine By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online […] The post How To Thwart Fraud with Phone Numbers appeared first on…
12 Tips for Improving Access Control in Your Organization
This article has been indexed from Cyber Defense Magazine By Bryon Miller ASCENT In today’s world, we have more access to essentially all that’s available in our […] The post 12 Tips for Improving Access Control in Your Organization appeared…
Conti ransomware gang exploits Log4Shell bug in its operations
This article has been indexed from Cyber Defense Magazine The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware […] The post Conti ransomware gang exploits Log4Shell bug in its operations appeared…
StayHackFree – Don’t Be Barry
This article has been indexed from Cyber Defense Magazine The Holiday call from a buddy you do not want to get – much less make. By James […] The post StayHackFree – Don’t Be Barry appeared first on Cyber Defense…
It’s About Time: The Unappreciated Fundamental Metric for Security
This article has been indexed from Cyber Defense Magazine By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the […] The post It’s About Time: The Unappreciated Fundamental Metric for Security appeared…
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
This article has been indexed from Cyber Defense Magazine The U.S. CISA added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including Apache Log4Shell Log4j and Fortinet […] The post CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities…
December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…
This article has been indexed from Cyber Defense Magazine Authored by: Gary Miliefsky of Cyber Defense Magazine Deep fake, dropped USB sticks, free offers, vishing, smishing and […] The post December 2021: Cyber Deception Month Continues…Halting Holiday Hackers… appeared first…
December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction
This article has been indexed from Cyber Defense Magazine Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks When it comes to predicting the future, the science […] The post December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are…
Crooks injects e-skimmers in random WordPress plugins of e-stores
This article has been indexed from Cyber Defense Magazine Threat actors are injecting credit card swipers into random plugins of e-commerce WordPress sites, Sucuri researchers warn. Sucuri […] The post Crooks injects e-skimmers in random WordPress plugins of e-stores appeared…
December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…
This article has been indexed from Cyber Defense Magazine Authored by: Gary Miliefsky of Cyber Defense Magazine Deep fake, dropped USB sticks, free offers, vishing, smishing and […] The post December 2021: Cyber Deception Month Continues…Halting Holiday Hackers… appeared first…
Nobelium APT targets French orgs, French ANSSI agency warns
This article has been indexed from Cyber Defense Magazine The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since […] The post Nobelium APT targets French orgs, French ANSSI agency warns appeared…
Cuba ransomware gang hacked 49 US critical infrastructure organizations
This article has been indexed from Cyber Defense Magazine The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical […] The post Cuba ransomware gang hacked 49 US critical infrastructure organizations appeared…
How To Effectively Secure Connected Devices
This article has been indexed from Cyber Defense Magazine By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet […] The post How To Effectively Secure Connected Devices appeared first on Cyber…
December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction
This article has been indexed from Cyber Defense Magazine Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks When it comes to predicting the future, the science […] The post December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are…
December 2021: Cyber Deception Month
This article has been indexed from Cyber Defense Magazine How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… […] The post December 2021: Cyber Deception Month appeared first on Cyber Defense…
Analyzing The Security Challenge of Hybrid and Remote Working Models
This article has been indexed from Cyber Defense Magazine By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least […] The post Analyzing The Security Challenge of Hybrid and Remote Working Models…
SOAR Into More Integrated Cybersecurity
This article has been indexed from Cyber Defense Magazine By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being […] The post SOAR Into More Integrated Cybersecurity appeared first on Cyber Defense…
Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server
This article has been indexed from Cyber Defense Magazine Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and […] The post Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP…
Android.Cynos.7.origin trojan infected +9 million Android devices
This article has been indexed from Cyber Defense Magazine Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 […] The post Android.Cynos.7.origin trojan infected +9 million Android devices appeared first on…
Why Email Archiving Builds Cyber Resilience
This article has been indexed from Cyber Defense Magazine Plus 3 Email Archiving Solutions By Adnan A. Olia, Chief Operating Officer, Intradyn As innovations in technology continue […] The post Why Email Archiving Builds Cyber Resilience appeared first on Cyber…
Overcoming the Limitations of VPN, NAC, and Firewalls with Zero Trust Access
This article has been indexed from Cyber Defense Magazine During 2020 and 2021, we’ve seen ransomware-as-a-service wreak havoc in the IT supply chain and critical infrastructure. Below […] The post Overcoming the Limitations of VPN, NAC, and Firewalls with Zero…
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
This article has been indexed from Cyber Defense Magazine By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting […] The post The 5 Most Common Cyber-Attacks on Mobile Devices In 2021…
Utah Imaging Associates data breach impacts 583,643 patients
This article has been indexed from Cyber Defense Magazine Utah-based radiology medical center Utah Imaging Associates discloses a data breach that impacted 583,643 former and current patients. […] The post Utah Imaging Associates data breach impacts 583,643 patients appeared first…
Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business
This article has been indexed from Cyber Defense Magazine The Flip Side of Using Cloud Telephony Services By Sujan Thapaliya, CEO and Co-Founder, KrispCall It is evident […] The post Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business…
Securing Today’s Hybrid Remote Workforce
This article has been indexed from Cyber Defense Magazine By CISO T.J. Minichillo Work may never be the same again as the world continues to grapple with […] The post Securing Today’s Hybrid Remote Workforce appeared first on Cyber Defense…
Iran-linked APT groups continue to evolve
This article has been indexed from Cyber Defense Magazine The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian […] The post Iran-linked APT groups continue to evolve appeared first on Cyber…
New evolving Abcbot DDoS botnet targets Linux systems
This article has been indexed from Cyber Defense Magazine Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. […] The post New evolving Abcbot DDoS botnet targets Linux systems appeared first…
What To Know to Fight Against Cyber Attacks
This article has been indexed from Cyber Defense Magazine By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our […] The post What To Know to Fight Against Cyber Attacks appeared first…
Digital Transformation Security: Guidelines for Success
This article has been indexed from Cyber Defense Magazine By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in […] The post Digital Transformation Security: Guidelines for Success appeared first on Cyber…
Why The Integration of Netops And Secops Is Here To Stay
This article has been indexed from Cyber Defense Magazine By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance […] The post Why The Integration of Netops And Secops Is Here To…
Electric Vehicle Charging: The Next Cyberattack Frontier
This article has been indexed from Cyber Defense Magazine By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates […] The post Electric Vehicle Charging: The Next Cyberattack Frontier appeared first on…
New Magecart group uses an e-Skimmer that avoids VMs and sandboxes
This article has been indexed from Cyber Defense Magazine A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes […] The post New Magecart group uses an e-Skimmer that avoids VMs and…
Attivo Networks – One Year Later
This article has been indexed from Cyber Defense Magazine Dr. Peter Stephenson It’s been a bit over a year since I published my review of Attivo BOTSink […] The post Attivo Networks – One Year Later appeared first on Cyber…
Ransomware attack disrupted store operations in the Netherlands and Germany
This article has been indexed from Cyber Defense Magazine Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. […] The post Ransomware attack disrupted store operations in the Netherlands and Germany…
Guntrader Data Breach: Victims Concerned Over Impact
This article has been indexed from Cyber Defense Magazine By Aman Johal, Lawyer and Director, Your Lawyers In July 2021, the details of over 111,000 Guntrader users […] The post Guntrader Data Breach: Victims Concerned Over Impact appeared first on…
You’ve Been Attacked by Ransomware. How Will You Respond?
This article has been indexed from Cyber Defense Magazine By Steve Schwartz, director of security, ECI Earlier this year, a ransomware attack on the Colonial Pipeline led […] The post You’ve Been Attacked by Ransomware. How Will You Respond? appeared…
5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.
This article has been indexed from Cyber Defense Magazine MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest […] The post 5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s)…
Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen
This article has been indexed from Cyber Defense Magazine Cybersecurity researchers uncovered a huge botnet, tracked as Pink, that already infected over 1.6 million devices most of […] The post Pink Botnet infected over 1.6 Million Devices, it is one…
Trojan Source attack method allows hiding flaws in source code
This article has been indexed from Cyber Defense Magazine Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of […] The post Trojan Source attack method allows hiding flaws in source code…
The Top 3 Cyber Security Mistakes and How to Avoid Them
This article has been indexed from Cyber Defense Magazine As hacks become more common, organizations have no room for cybersecurity mistakes. By Ivan Paynter, National Cybersecurity Specialist […] The post The Top 3 Cyber Security Mistakes and How to Avoid…
50% of internet-facing GitLab installations are still affected by a RCE flaw
This article has been indexed from Cyber Defense Magazine Researchers warn of a now-fixed critical remote code execution (RCE) vulnerability in GitLab ‘s web interface actively exploited […] The post 50% of internet-facing GitLab installations are still affected by a…
Russia-linked Nobelium APT targets orgs in the global IT supply chain
This article has been indexed from Cyber Defense Magazine Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May […] The post Russia-linked Nobelium APT targets orgs in the global IT supply…
Mitigating Ransomware: A New Paradigm Shift
This article has been indexed from Cyber Defense Magazine By CISO T.J. Minichillo Ransomware is a global epidemic from which no organization — small, medium or large […] The post Mitigating Ransomware: A New Paradigm Shift appeared first on Cyber…
NATO releases its first strategy for Artificial Intelligence
This article has been indexed from Cyber Defense Magazine This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of […] The post NATO releases its first strategy for Artificial Intelligence appeared first…
Protecting SMBs from Current Cybersecurity Threats
This article has been indexed from Cyber Defense Magazine A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If […] The post Protecting SMBs from Current Cybersecurity Threats appeared first on Cyber…
Forensic Collections From a Mac: Challenges & Solutions
This article has been indexed from Cyber Defense Magazine INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches […] The post Forensic Collections From a Mac: Challenges & Solutions appeared first…
Trustwave released a free decryptor for the BlackByte ransomware
This article has been indexed from Cyber Defense Magazine Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover […] The post Trustwave released a free decryptor for the BlackByte ransomware appeared…
Making Sure the Lights Don’t Go Out
This article has been indexed from Cyber Defense Magazine By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel […] The post Making Sure the Lights Don’t Go Out appeared first on…
Why NDR? See the Entire Elephant in the Room
This article has been indexed from Cyber Defense Magazine By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, […] The post Why NDR? See the Entire Elephant in the Room appeared…
Application Modernization and Other Best Practices of Securing Legacy Infrastructures
This article has been indexed from Cyber Defense Magazine By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of […] The post Application Modernization and Other Best Practices of Securing Legacy Infrastructures…
Is the Edge Really Secure?
This article has been indexed from Cyber Defense Magazine By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught […] The post Is the Edge Really Secure? appeared first on Cyber Defense…
The Brutal Reality of Brute Force Attacks And How To Defend Against Them
This article has been indexed from Cyber Defense Magazine By John Nowotny, Customer Success Engineer, Exabeam Russian cyberattacks have seemingly become the new normal with the recent […] The post The Brutal Reality of Brute Force Attacks And How To…
Olympus US was forced to take down computer systems due to cyberattack
This article has been indexed from Cyber Defense Magazine Olympus US was forced to take down IT systems in the American region (U.S., Canada, and Latin America) […] The post Olympus US was forced to take down computer systems due…
58% of all nation-state attacks in the last year were launched by Russian nation-state actors
This article has been indexed from Cyber Defense Magazine Microsoft revealed that Russia-linked cyberespionage groups are behind the majority of the nation-state cyber attacks on US government […] The post 58% of all nation-state attacks in the last year were…
Source Code Protection Market
This article has been indexed from Cyber Defense Magazine Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, […] The post Source Code Protection Market appeared first on Cyber Defense Magazine.…
How to Close the Security Gap Between Identity and Access Management (IAM) and Shared Accounts
This article has been indexed from Cyber Defense Magazine By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s […] The post How to Close the Security Gap Between Identity and Access…
UK newspaper The Telegraph exposed a 10TB database with subscriber data
This article has been indexed from Cyber Defense Magazine The UK media outlet The Telegraph has leaked 10 TB of subscriber data after failing to properly secure […] The post UK newspaper The Telegraph exposed a 10TB database with subscriber…
The Top 6 Cyber Attacks Of 2021 So Far
This article has been indexed from Cyber Defense Magazine By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend […] The post The Top 6 Cyber Attacks Of 2021 So Far appeared…
SQL Cyber Attacks Are a Danger to Your Company
This article has been indexed from Cyber Defense Magazine By Ryan Ayers, Consultant Cyber attacks cost the global economy more than $1 trillion last year, making it […] The post SQL Cyber Attacks Are a Danger to Your Company appeared…
Rethinking Ransomware Resiliency
This article has been indexed from Cyber Defense Magazine Did you know an organization is hit with a ransomware attack every 11 seconds? As the global attack […] The post Rethinking Ransomware Resiliency appeared first on Cyber Defense Magazine. Read…
Russia-linked Nobelium APT group uses custom backdoor to target Windows domains
This article has been indexed from Cyber Defense Magazine Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows […] The post Russia-linked Nobelium APT group uses custom backdoor to target Windows…
Port of Houston was hit by an alleged state-sponsored attack
This article has been indexed from Cyber Defense Magazine Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack […] The post Port of Houston was hit by an alleged state-sponsored attack…
5 Steps to Protect Your Organization from the Next Ransomware Attack
This article has been indexed from Cyber Defense Magazine By Paul Kohler, CTO, S3 We have witnessed the largest ransomware attacks in history in the first half […] The post 5 Steps to Protect Your Organization from the Next Ransomware…
Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!
This article has been indexed from Cyber Defense Magazine Register for our Free eBook: The Secrets of Hardening Active Directory eBook Your Active Directory servers have now […] The post Active Directory is Now The Number One Target of Hackers…
Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!
This article has been indexed from Cyber Defense Magazine Register for our Free eBook: The Secrets of Hardening Active Directory eBook Your Active Directory servers have now […] The post Active Directory is Now The Number One Target of Hackers…
Europol arrested 106 fraudsters, members of a major crime ring
This article has been indexed from Cyber Defense Magazine Europol, along with Italian and Spanish police, dismantled a major crime organization linked to the Italian Mafia that […] The post Europol arrested 106 fraudsters, members of a major crime ring…
The Biden administration plans to target exchange supporting ransomware operations with sanctions
This article has been indexed from Cyber Defense Magazine US Government is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware operations to […] The post The Biden administration plans to target exchange supporting ransomware operations…
Defeat Ransomware with Immutable Backup Data and Encryption
This article has been indexed from Cyber Defense Magazine Move beyond traditional security strategies to protect against the two most common types of ransomware threats By Jon […] The post Defeat Ransomware with Immutable Backup Data and Encryption appeared first…
Cybersecurity experts’ advice: how to become cyber-resilient [Live Webinar] Sept 23, 2021
This article has been indexed from Cyber Defense Magazine Cyber Defense Magazine predicts: by 2025, cybercrime will cost the world $12 trillion annually. Today, cyber threats are […] The post Cybersecurity experts’ advice: how to become cyber-resilient [Live Webinar] Sept…
Misconfigurations are the biggest threat to cloud security, period
This article has been indexed from Cyber Defense Magazine By eSentire There is no doubt that cloud adoption is accelerating at an exponential rate. Whether it’s for […] The post Misconfigurations are the biggest threat to cloud security, period appeared…
Cyber EO and Meeting Cloud Modernization Effort
This article has been indexed from Cyber Defense Magazine By Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, Zscaler In wake of recent […] The post Cyber EO and Meeting Cloud Modernization Effort appeared first on…
Apple fixes actively exploited FORCEDENTRY zero-day flaws
This article has been indexed from Cyber Defense Magazine Apple released security patches to fix two zero-day vulnerabilities in iOS and macOS that are actively exploited in […] The post Apple fixes actively exploited FORCEDENTRY zero-day flaws appeared first on…
HTML Smuggling: A Resurgent Cause for Concern
This article has been indexed from Cyber Defense Magazine By Vinay Pidathala, Director of Security Research, Menlo Security Cybersecurity is never straightforward. While defense techniques, technologies, policies […] The post HTML Smuggling: A Resurgent Cause for Concern appeared first on…
New CIOs: 5 Key Steps in Your First 100 Days
This article has been indexed from Cyber Defense Magazine Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, […] The post New CIOs: 5 Key Steps in Your First 100 Days…
Cyber Defense Media Group Launches our 10th Anniversary Contest
This article has been indexed from Cyber Defense Magazine CDMG – 10th Anniversary – Trip to Walt Disney World Contest – up to $10,000.00 USD in Value […] The post Cyber Defense Media Group Launches our 10th Anniversary Contest appeared…
Offense Activities Sharing in Criminal Justice Case
This article has been indexed from Cyber Defense Magazine By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need […] The post Offense Activities Sharing in Criminal Justice Case appeared first on…
New SOVA Android Banking trojan is rapidly growing
This article has been indexed from Cyber Defense Magazine SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the […] The post New SOVA Android Banking trojan is rapidly growing appeared first…
Revil ransomware operators are targeting new victims
This article has been indexed from Cyber Defense Magazine Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can […] The post Revil ransomware operators are targeting new victims appeared first on…
Why Your Hospital Network Needs an IoT Security Policy
This article has been indexed from Cyber Defense Magazine By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security […] The post Why Your Hospital Network Needs an IoT Security Policy appeared…
FBI IC3 warns of a spike in sextortion attacks
This article has been indexed from Cyber Defense Magazine The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of […] The post FBI IC3 warns of a spike in sextortion attacks appeared…
Considering Collateral Intrusion in Digital Forensics
This article has been indexed from Cyber Defense Magazine Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of […] The post Considering Collateral Intrusion in Digital Forensics appeared first on Cyber…
Combatting Industry Burnout by Building Resilient Security Teams
This article has been indexed from Cyber Defense Magazine By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. […] The post Combatting Industry Burnout by Building Resilient Security Teams appeared first…
Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach
This article has been indexed from Cyber Defense Magazine By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a […] The post Cyber Security Incident Response Plan: How to Proactively Prepare for…
New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats
This article has been indexed from Cyber Defense Magazine By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies The threat landscape is an erratic and ever-evolving beast. While […] The post New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats…
How Trustworthy is Your Cyber Defense?
This article has been indexed from Cyber Defense Magazine Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST […] The post How Trustworthy is Your Cyber Defense? appeared first on Cyber…
CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw
This article has been indexed from Cyber Defense Magazine The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed […] The post CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw…
ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft Azure Customers
This article has been indexed from Cyber Defense Magazine Microsoft has fixed a critical flaw in Cosmos DB that allowed any Azure user to remotely take over […] The post ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft…
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
This article has been indexed from Cyber Defense Magazine By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives […] The post Looking Back at Executive Order on Cybersecurity and What it Means…