Category: Cyber Defense Magazine

How to Protect All Five Stages of the IoT Security Lifecycle

This article has been indexed from Cyber Defense Magazine Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks […] The post How to Protect All Five Stages of the IoT Security…

Getting Started with Active Directory Security

This article has been indexed from Cyber Defense Magazine Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the […] The post Getting Started with Active Directory Security appeared first on Cyber…

Phishing: How To Improve Cybersecurity Awareness

This article has been indexed from Cyber Defense Magazine By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced […] The post Phishing: How To Improve Cybersecurity Awareness appeared first on Cyber…

Surviving The New Era of Terabit-Class DDoS Attacks

This article has been indexed from Cyber Defense Magazine By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted […] The post Surviving The New Era of Terabit-Class DDoS Attacks appeared first…

How To Thwart Fraud with Phone Numbers

This article has been indexed from Cyber Defense Magazine By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online […] The post How To Thwart Fraud with Phone Numbers appeared first on…

Conti ransomware gang exploits Log4Shell bug in its operations

This article has been indexed from Cyber Defense Magazine The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware […] The post Conti ransomware gang exploits Log4Shell bug in its operations appeared…

StayHackFree – Don’t Be Barry

This article has been indexed from Cyber Defense Magazine The Holiday call from a buddy you do not want to get – much less make. By James […] The post StayHackFree – Don’t Be Barry appeared first on Cyber Defense…

Nobelium APT targets French orgs, French ANSSI agency warns

This article has been indexed from Cyber Defense Magazine The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since […] The post Nobelium APT targets French orgs, French ANSSI agency warns appeared…

How To Effectively Secure Connected Devices

This article has been indexed from Cyber Defense Magazine By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet […] The post How To Effectively Secure Connected Devices appeared first on Cyber…

December 2021: Cyber Deception Month

This article has been indexed from Cyber Defense Magazine How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… […] The post December 2021: Cyber Deception Month appeared first on Cyber Defense…

SOAR Into More Integrated Cybersecurity

This article has been indexed from Cyber Defense Magazine By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being […] The post SOAR Into More Integrated Cybersecurity appeared first on Cyber Defense…

Android.Cynos.7.origin trojan infected +9 million Android devices

This article has been indexed from Cyber Defense Magazine Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 […] The post Android.Cynos.7.origin trojan infected +9 million Android devices appeared first on…

Why Email Archiving Builds Cyber Resilience

This article has been indexed from Cyber Defense Magazine Plus 3 Email Archiving Solutions By Adnan A. Olia, Chief Operating Officer, Intradyn As innovations in technology continue […] The post Why Email Archiving Builds Cyber Resilience appeared first on Cyber…

The 5 Most Common Cyber-Attacks on Mobile Devices In 2021

This article has been indexed from Cyber Defense Magazine By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting […] The post The 5 Most Common Cyber-Attacks on Mobile Devices In 2021…

Utah Imaging Associates data breach impacts 583,643 patients

This article has been indexed from Cyber Defense Magazine Utah-based radiology medical center Utah Imaging Associates discloses a data breach that impacted 583,643 former and current patients. […] The post Utah Imaging Associates data breach impacts 583,643 patients appeared first…

Securing Today’s Hybrid Remote Workforce

This article has been indexed from Cyber Defense Magazine By CISO T.J. Minichillo Work may never be the same again as the world continues to grapple with […] The post Securing Today’s Hybrid Remote Workforce appeared first on Cyber Defense…

Iran-linked APT groups continue to evolve

This article has been indexed from Cyber Defense Magazine The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian […] The post Iran-linked APT groups continue to evolve appeared first on Cyber…

New evolving Abcbot DDoS botnet targets Linux systems

This article has been indexed from Cyber Defense Magazine Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. […] The post New evolving Abcbot DDoS botnet targets Linux systems appeared first…

What To Know to Fight Against Cyber Attacks

This article has been indexed from Cyber Defense Magazine By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our […] The post What To Know to Fight Against Cyber Attacks appeared first…

Digital Transformation Security: Guidelines for Success

This article has been indexed from Cyber Defense Magazine By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in […] The post Digital Transformation Security: Guidelines for Success appeared first on Cyber…

Why The Integration of Netops And Secops Is Here To Stay

This article has been indexed from Cyber Defense Magazine By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance […] The post Why The Integration of Netops And Secops Is Here To…

Electric Vehicle Charging: The Next Cyberattack Frontier

This article has been indexed from Cyber Defense Magazine By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates […] The post Electric Vehicle Charging: The Next Cyberattack Frontier appeared first on…

Attivo Networks – One Year Later

This article has been indexed from Cyber Defense Magazine Dr. Peter Stephenson It’s been a bit over a year since I published my review of Attivo BOTSink […] The post Attivo Networks – One Year Later appeared first on Cyber…

Guntrader Data Breach: Victims Concerned Over Impact

This article has been indexed from Cyber Defense Magazine By Aman Johal, Lawyer and Director, Your Lawyers In July 2021, the details of over 111,000 Guntrader users […] The post Guntrader Data Breach: Victims Concerned Over Impact appeared first on…

The Top 3 Cyber Security Mistakes and How to Avoid Them

This article has been indexed from Cyber Defense Magazine As hacks become more common, organizations have no room for cybersecurity mistakes. By Ivan Paynter, National Cybersecurity Specialist […] The post The Top 3 Cyber Security Mistakes and How to Avoid…

Mitigating Ransomware: A New Paradigm Shift

This article has been indexed from Cyber Defense Magazine By CISO T.J. Minichillo Ransomware is a global epidemic from which no organization — small, medium or large […] The post Mitigating Ransomware: A New Paradigm Shift appeared first on Cyber…

NATO releases its first strategy for Artificial Intelligence

This article has been indexed from Cyber Defense Magazine This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of […] The post NATO releases its first strategy for Artificial Intelligence appeared first…

Protecting SMBs from Current Cybersecurity Threats

This article has been indexed from Cyber Defense Magazine A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If […] The post Protecting SMBs from Current Cybersecurity Threats appeared first on Cyber…

Forensic Collections From a Mac: Challenges & Solutions

This article has been indexed from Cyber Defense Magazine INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches […] The post Forensic Collections From a Mac: Challenges & Solutions appeared first…

Making Sure the Lights Don’t Go Out

This article has been indexed from Cyber Defense Magazine By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel […] The post Making Sure the Lights Don’t Go Out appeared first on…

Why NDR? See the Entire Elephant in the Room

This article has been indexed from Cyber Defense Magazine By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, […] The post Why NDR? See the Entire Elephant in the Room appeared…

Is the Edge Really Secure?

This article has been indexed from Cyber Defense Magazine By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught […] The post Is the Edge Really Secure? appeared first on Cyber Defense…

Source Code Protection Market

This article has been indexed from Cyber Defense Magazine Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, […] The post Source Code Protection Market appeared first on Cyber Defense Magazine.…

The Top 6 Cyber Attacks Of 2021 So Far

This article has been indexed from Cyber Defense Magazine By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend […] The post The Top 6 Cyber Attacks Of 2021 So Far appeared…

SQL Cyber Attacks Are a Danger to Your Company

This article has been indexed from Cyber Defense Magazine By Ryan Ayers, Consultant Cyber attacks cost the global economy more than $1 trillion last year, making it […] The post SQL Cyber Attacks Are a Danger to Your Company appeared…

Rethinking Ransomware Resiliency

This article has been indexed from Cyber Defense Magazine Did you know an organization is hit with a ransomware attack every 11 seconds? As the global attack […] The post Rethinking Ransomware Resiliency appeared first on Cyber Defense Magazine. Read…

Defeat Ransomware with Immutable Backup Data and Encryption

This article has been indexed from Cyber Defense Magazine Move beyond traditional security strategies to protect against the two most common types of ransomware threats By Jon […] The post Defeat Ransomware with Immutable Backup Data and Encryption appeared first…

Cyber EO and Meeting Cloud Modernization Effort

This article has been indexed from Cyber Defense Magazine By Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, Zscaler In wake of recent […] The post Cyber EO and Meeting Cloud Modernization Effort appeared first on…

Apple fixes actively exploited FORCEDENTRY zero-day flaws

This article has been indexed from Cyber Defense Magazine Apple released security patches to fix two zero-day vulnerabilities in iOS and macOS that are actively exploited in […] The post Apple fixes actively exploited FORCEDENTRY zero-day flaws appeared first on…

HTML Smuggling: A Resurgent Cause for Concern

This article has been indexed from Cyber Defense Magazine By Vinay Pidathala, Director of Security Research, Menlo Security Cybersecurity is never straightforward. While defense techniques, technologies, policies […] The post HTML Smuggling: A Resurgent Cause for Concern appeared first on…

New CIOs: 5 Key Steps in Your First 100 Days

This article has been indexed from Cyber Defense Magazine Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, […] The post New CIOs: 5 Key Steps in Your First 100 Days…

Offense Activities Sharing in Criminal Justice Case

This article has been indexed from Cyber Defense Magazine By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need […] The post Offense Activities Sharing in Criminal Justice Case appeared first on…

New SOVA Android Banking trojan is rapidly growing

This article has been indexed from Cyber Defense Magazine SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the […] The post New SOVA Android Banking trojan is rapidly growing appeared first…

Revil ransomware operators are targeting new victims

This article has been indexed from Cyber Defense Magazine Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can […] The post Revil ransomware operators are targeting new victims appeared first on…

Why Your Hospital Network Needs an IoT Security Policy

This article has been indexed from Cyber Defense Magazine By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security […] The post Why Your Hospital Network Needs an IoT Security Policy appeared…

FBI IC3 warns of a spike in sextortion attacks

This article has been indexed from Cyber Defense Magazine The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of […] The post FBI IC3 warns of a spike in sextortion attacks appeared…

Considering Collateral Intrusion in Digital Forensics

This article has been indexed from Cyber Defense Magazine Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of […] The post Considering Collateral Intrusion in Digital Forensics appeared first on Cyber…

How Trustworthy is Your Cyber Defense?

This article has been indexed from Cyber Defense Magazine Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST […] The post How Trustworthy is Your Cyber Defense? appeared first on Cyber…