Category: Cyber Defense Magazine

Offense Activities Sharing in Criminal Justice Case

This article has been indexed from Cyber Defense Magazine By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need […] The post Offense Activities Sharing in Criminal Justice Case appeared first on…

New SOVA Android Banking trojan is rapidly growing

This article has been indexed from Cyber Defense Magazine SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the […] The post New SOVA Android Banking trojan is rapidly growing appeared first…

Revil ransomware operators are targeting new victims

This article has been indexed from Cyber Defense Magazine Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can […] The post Revil ransomware operators are targeting new victims appeared first on…

Why Your Hospital Network Needs an IoT Security Policy

This article has been indexed from Cyber Defense Magazine By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security […] The post Why Your Hospital Network Needs an IoT Security Policy appeared…

FBI IC3 warns of a spike in sextortion attacks

This article has been indexed from Cyber Defense Magazine The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of […] The post FBI IC3 warns of a spike in sextortion attacks appeared…

Considering Collateral Intrusion in Digital Forensics

This article has been indexed from Cyber Defense Magazine Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of […] The post Considering Collateral Intrusion in Digital Forensics appeared first on Cyber…

How Trustworthy is Your Cyber Defense?

This article has been indexed from Cyber Defense Magazine Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST […] The post How Trustworthy is Your Cyber Defense? appeared first on Cyber…

Understanding The Importance of Designing for Security

This article has been indexed from Cyber Defense Magazine By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of […] The post Understanding The Importance of Designing for Security appeared first on…

What is the Main Goal of Penetration Testing?

This article has been indexed from Cyber Defense Magazine By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the […] The post What is the Main Goal of Penetration Testing? appeared first…

Identity Matching: What You Need to Know About It

This article has been indexed from Cyber Defense Magazine When asked how they can improve a bank’s security from financial crime, many bankers are at a loss […] The post Identity Matching: What You Need to Know About It appeared…

The Future of Cybersecurity? Just One Word: Automation

This article has been indexed from Cyber Defense Magazine By Dr. Peter Stephenson If you are not better informed, smarter, better equipped, and faster than the adversary, […] The post The Future of Cybersecurity? Just One Word: Automation appeared first…

Is The Cloud Leaving You Exposed?

This article has been indexed from Cyber Defense Magazine Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. […] The post Is The Cloud Leaving You Exposed? appeared first on Cyber…

Cloud Security Automation: The Fastest Path to Zero Trust

This article has been indexed from Cyber Defense Magazine By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming […] The post Cloud Security Automation: The Fastest Path to Zero Trust appeared…

No, You Don’t Need

This article has been indexed from Cyber Defense Magazine By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution […] The post No, You Don’t Need appeared first on Cyber Defense Magazine.…

Taking Back Control of Today’s Software Supply Chain

This article has been indexed from Cyber Defense Magazine By Jasmine Noel,  Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches […] The post Taking Back Control of Today’s Software Supply Chain appeared first…

Trust Not in Third-Parties

This article has been indexed from Cyber Defense Magazine You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, […] The post Trust Not in Third-Parties appeared first on Cyber Defense Magazine.…

The Preventable Aspects of the APT40 Microsoft Hack

This article has been indexed from Cyber Defense Magazine On January 19th, the United States Department of Justice (DOJ) charged four Chinese nationals—Cheng Qingmin (程庆民), Wu Shurong […] The post The Preventable Aspects of the APT40 Microsoft Hack appeared first…

No, You Don’t Need EDR

This article has been indexed from Cyber Defense Magazine By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution […] The post No, You Don’t Need EDR appeared first on Cyber Defense…

It’s Time to Issue Company Passwords Again

This article has been indexed from Cyber Defense Magazine By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found […] The post It’s Time to Issue Company Passwords Again appeared first on…

The Importance Of Protecting Your App’s Source Code

This article has been indexed from Cyber Defense Magazine By Rui Ribeiro, CEO and Co-founder, Jscrambler If your business operations involve any type of web or mobile […] The post The Importance Of Protecting Your App’s Source Code appeared first…

The Internet of Things Ongoing Directions

This article has been indexed from Cyber Defense Magazine By Milica D. Djekic It takes time to get through the journey. Several decades back the global technological […] The post The Internet of Things Ongoing Directions appeared first on Cyber…

BIOPASS malware abuses OBS Studio to spy on victims

This article has been indexed from Cyber Defense Magazine Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) […] The post BIOPASS malware abuses OBS Studio to spy on victims appeared…

New LinkedIn breach exposes data of 700 Million users

This article has been indexed from Cyber Defense Magazine A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more […] The post New LinkedIn breach exposes data of 700 Million users appeared…

Linux version of REvil ransomware targets ESXi VM

This article has been indexed from Cyber Defense Magazine The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The […] The post Linux version of REvil ransomware targets ESXi VM appeared first…

All the User Experience, None of The Security?

This article has been indexed from Cyber Defense Magazine EU telcos gather a lot of highly sensitive customer information. New research suggests it’s not as well protected […] The post All the User Experience, None of The Security? appeared first…

Open XDR vs. SIEM

This article has been indexed from Cyber Defense Magazine Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire […] The post Open XDR vs. SIEM appeared first on Cyber Defense Magazine.…

Why We Care About Cybersecurity Hygiene

This article has been indexed from Cyber Defense Magazine By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as […] The post Why We Care About Cybersecurity Hygiene appeared first on Cyber…

Norway blames China-linked APT31 for 2018 government hack

This article has been indexed from Cyber Defense Magazine Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s […] The post Norway blames China-linked APT31 for 2018 government hack appeared first…

Uncovering hidden cybersecurity risks

This article has been indexed from Cyber Defense Magazine By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical […] The post Uncovering hidden cybersecurity risks appeared first on Cyber Defense Magazine.…

A Digital Journey: A Long and Winding Road

This article has been indexed from Cyber Defense Magazine How did we build the internet and not secure it? By David Jemmett, CEO and Founder, Cerberus Sentinel […] The post A Digital Journey: A Long and Winding Road appeared first…

Key Business Lessons Learned from The SolarWinds Hack

This article has been indexed from Cyber Defense Magazine By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced […] The post Key Business Lessons Learned from The SolarWinds Hack appeared first…

StayHackFree – Your Kid’s Sports Team

This article has been indexed from Cyber Defense Magazine Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s […] The post StayHackFree – Your Kid’s Sports Team appeared first on Cyber…

Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems

This article has been indexed from Cyber Defense Magazine By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for […] The post Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems appeared first…

These 2 attacks allow to alter certified PDF Documents

This article has been indexed from Cyber Defense Magazine Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the […] The post These 2 attacks allow to alter certified PDF Documents appeared…

How To Make The Most of Increased Cybersecurity Spend

This article has been indexed from Cyber Defense Magazine The average organization devotes 21% of its IT budget to cybersecurity. By Stu Sjouwerman, CEO, KnowBe4 With the […] The post How To Make The Most of Increased Cybersecurity Spend appeared…

Understanding The Surge in Cyber Extortion

This article has been indexed from Cyber Defense Magazine By Jamie Wilson, Founder and Chairman, Cryptoloc Ransomware is on the rise, and it’s not slowing down. Cryptoloc […] The post Understanding The Surge in Cyber Extortion appeared first on Cyber…

Executive Protection Needs to Include Digital

This article has been indexed from Cyber Defense Magazine By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks […] The post Executive Protection Needs to Include Digital appeared first on Cyber…

Contactless Passwordless Auto Login

This article has been indexed from Cyber Defense Magazine with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, […] The post Contactless Passwordless Auto Login appeared first on Cyber Defense Magazine.…

Zeppelin ransomware gang is back after a temporary pause

This article has been indexed from Cyber Defense Magazine Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption. Researchers from BleepingComputer reported […] The post Zeppelin ransomware gang is back after a temporary pause appeared…

French intel found flaws in Bluetooth Core and Mesh specs

This article has been indexed from Cyber Defense Magazine Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. […] The post French intel found flaws in Bluetooth Core and Mesh specs…

5 Tips to Building a Cyber-Smart Culture

This article has been indexed from Cyber Defense Magazine Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning […] The post 5 Tips to Building a Cyber-Smart Culture appeared first on…

A dozen Android apps exposed data of 100M+ users

This article has been indexed from Cyber Defense Magazine Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. […] The post A dozen Android apps exposed data of 100M+ users appeared…

Housekeeping Pitfalls of Vulnerability Management

This article has been indexed from Cyber Defense Magazine By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s […] The post Housekeeping Pitfalls of Vulnerability Management appeared first on Cyber Defense…

How to Prevent Ransomware Attacks On Industrial Networks

This article has been indexed from Cyber Defense Magazine Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By […] The post How to Prevent Ransomware Attacks On Industrial Networks appeared first…