This article has been indexed from Cyber Defense Magazine CDMG – 10th Anniversary – Trip to Walt Disney World Contest – up to $10,000.00 USD in Value […] The post Cyber Defense Media Group Launches our 10th Anniversary Contest appeared…
Category: Cyber Defense Magazine
Offense Activities Sharing in Criminal Justice Case
This article has been indexed from Cyber Defense Magazine By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need […] The post Offense Activities Sharing in Criminal Justice Case appeared first on…
New SOVA Android Banking trojan is rapidly growing
This article has been indexed from Cyber Defense Magazine SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the […] The post New SOVA Android Banking trojan is rapidly growing appeared first…
Revil ransomware operators are targeting new victims
This article has been indexed from Cyber Defense Magazine Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can […] The post Revil ransomware operators are targeting new victims appeared first on…
Why Your Hospital Network Needs an IoT Security Policy
This article has been indexed from Cyber Defense Magazine By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security […] The post Why Your Hospital Network Needs an IoT Security Policy appeared…
FBI IC3 warns of a spike in sextortion attacks
This article has been indexed from Cyber Defense Magazine The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of […] The post FBI IC3 warns of a spike in sextortion attacks appeared…
Considering Collateral Intrusion in Digital Forensics
This article has been indexed from Cyber Defense Magazine Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of […] The post Considering Collateral Intrusion in Digital Forensics appeared first on Cyber…
Combatting Industry Burnout by Building Resilient Security Teams
This article has been indexed from Cyber Defense Magazine By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. […] The post Combatting Industry Burnout by Building Resilient Security Teams appeared first…
Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach
This article has been indexed from Cyber Defense Magazine By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a […] The post Cyber Security Incident Response Plan: How to Proactively Prepare for…
New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats
This article has been indexed from Cyber Defense Magazine By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies The threat landscape is an erratic and ever-evolving beast. While […] The post New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats…
How Trustworthy is Your Cyber Defense?
This article has been indexed from Cyber Defense Magazine Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST […] The post How Trustworthy is Your Cyber Defense? appeared first on Cyber…
CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw
This article has been indexed from Cyber Defense Magazine The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed […] The post CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw…
ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft Azure Customers
This article has been indexed from Cyber Defense Magazine Microsoft has fixed a critical flaw in Cosmos DB that allowed any Azure user to remotely take over […] The post ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft…
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
This article has been indexed from Cyber Defense Magazine By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives […] The post Looking Back at Executive Order on Cybersecurity and What it Means…
The FBI issued a flash alert for Hive ransomware operations
This article has been indexed from Cyber Defense Magazine The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware […] The post The FBI issued a flash alert for Hive ransomware operations…
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
This article has been indexed from Cyber Defense Magazine By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to […] The post Looking Back at Executive Order on Cybersecurity and What it Means…
Silver Optis: Innovative and Socially Conscious Technologies at Black Hat
This article has been indexed from Cyber Defense Magazine By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies […] The post Silver Optis: Innovative and Socially Conscious Technologies at Black Hat…
Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks
This article has been indexed from Cyber Defense Magazine Zero Trust and Enforcing the Principle of Least Privilege Have Become Crucially Important. By Garret Grajek, CEO, YouAttest […] The post Evaluating Security Practices in Response to Colonial Pipeline And South…
Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G
This article has been indexed from Cyber Defense Magazine By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in […] The post Defending Against Increasing DDOS Attacks in The Light Of COVID-19…
Four Ways Smart Cities Can Stay Safe in An Interconnected World
This article has been indexed from Cyber Defense Magazine Mitigating the risks of cyber threats through cyber intelligence and frontier technologies By Ritesh Kumar, Chairman & CEO, […] The post Four Ways Smart Cities Can Stay Safe in An Interconnected…
Chinese Government Will Begin to Stockpile Zero-Days in September
This article has been indexed from Cyber Defense Magazine By Randy Reiter CEO of Don’t Be Breached July 2021 has Been A Busy Month in Cyber Security […] The post Chinese Government Will Begin to Stockpile Zero-Days in September appeared…
How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims
This article has been indexed from Cyber Defense Magazine By Irena Ducic, Growth Marketer, Embroker Article text: Every company that stores and handles sensitive customer, partner, or […] The post How Cyber Insurance Can Protect Your Business from Breach of…
Understanding The Importance of Designing for Security
This article has been indexed from Cyber Defense Magazine By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of […] The post Understanding The Importance of Designing for Security appeared first on…
What is the Main Goal of Penetration Testing?
This article has been indexed from Cyber Defense Magazine By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the […] The post What is the Main Goal of Penetration Testing? appeared first…
Identity Matching: What You Need to Know About It
This article has been indexed from Cyber Defense Magazine When asked how they can improve a bank’s security from financial crime, many bankers are at a loss […] The post Identity Matching: What You Need to Know About It appeared…
Vice Society ransomware also exploits PrintNightmare flaws in its attack
This article has been indexed from Cyber Defense Magazine Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. […] The post Vice Society ransomware also exploits PrintNightmare flaws in its attack…
StealthWorker botnet targets Synology NAS devices to drop ransomware
This article has been indexed from Cyber Defense Magazine Taiwanese vendor Synology has warned customers that the StealthWorker botnet is targeting their NAS devices to deliver ransomware. […] The post StealthWorker botnet targets Synology NAS devices to drop ransomware appeared…
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
This article has been indexed from Cyber Defense Magazine By eSentire The influx of cyber attacks within the past few years have painted a dire image for […] The post Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer? appeared…
Conti ransomware affiliate leaked gang’s training material and tools
This article has been indexed from Cyber Defense Magazine An affiliate of the Conti RaaS has leaked the training material shared by the group with its network […] The post Conti ransomware affiliate leaked gang’s training material and tools appeared…
Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks
This article has been indexed from Cyber Defense Magazine The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. […] The post Australian Cyber Security Centre warns of a surge of LockBit…
The Future of Cybersecurity? Just One Word: Automation
This article has been indexed from Cyber Defense Magazine By Dr. Peter Stephenson If you are not better informed, smarter, better equipped, and faster than the adversary, […] The post The Future of Cybersecurity? Just One Word: Automation appeared first…
Is The Cloud Leaving You Exposed?
This article has been indexed from Cyber Defense Magazine Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. […] The post Is The Cloud Leaving You Exposed? appeared first on Cyber…
Reshaping the future of transportation with the ITS World Congress
This article has been indexed from Cyber Defense Magazine The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As […] The post Reshaping the future of transportation with the ITS World Congress…
Cloud Security Automation: The Fastest Path to Zero Trust
This article has been indexed from Cyber Defense Magazine By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming […] The post Cloud Security Automation: The Fastest Path to Zero Trust appeared…
No, You Don’t Need
This article has been indexed from Cyber Defense Magazine By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution […] The post No, You Don’t Need appeared first on Cyber Defense Magazine.…
Taking Back Control of Today’s Software Supply Chain
This article has been indexed from Cyber Defense Magazine By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches […] The post Taking Back Control of Today’s Software Supply Chain appeared first…
How to Accelerate SecOps efficiency and extend capabilities with XDR
This article has been indexed from Cyber Defense Magazine By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their […] The post How to Accelerate SecOps efficiency and extend capabilities with XDR…
The Silver Bullet for Ransomware’s Golden Goose
This article has been indexed from Cyber Defense Magazine
Trust Not in Third-Parties
This article has been indexed from Cyber Defense Magazine You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, […] The post Trust Not in Third-Parties appeared first on Cyber Defense Magazine.…
How Cobwebs Technologies’ Webint Platform Helps Enterprises To Face The Rising Tide Of Security Risks Emerging From The Dark Web
This article has been indexed from Cyber Defense Magazine The ai-based dark web monitoring capability provides a visual representation of cyber events, revealing a larger, graphically displayed […] The post How Cobwebs Technologies’ Webint Platform Helps Enterprises To Face The…
Takeaways from The Oldsmar Water Attack & What Security Leaders Can Do About It
This article has been indexed from Cyber Defense Magazine With Real Examples & Screenshots of Cyber Attacks on Water & Wastewater Facilities By Michael Yehoshua, VP of […] The post Takeaways from The Oldsmar Water Attack & What Security Leaders…
The Preventable Aspects of the APT40 Microsoft Hack
This article has been indexed from Cyber Defense Magazine On January 19th, the United States Department of Justice (DOJ) charged four Chinese nationals—Cheng Qingmin (程庆民), Wu Shurong […] The post The Preventable Aspects of the APT40 Microsoft Hack appeared first…
A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of printers worldwide
This article has been indexed from Cyber Defense Magazine Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker […] The post A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of…
XLoader, a $49 spyware that could target both Windows and macOS devices
This article has been indexed from Cyber Defense Magazine Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both […] The post XLoader, a $49 spyware that could target both Windows and…
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
This article has been indexed from Cyber Defense Magazine By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle […] The post Boosting Morale During Tough Times Will Also Boost Your Security…
Extended Detection and Response (XDR) Needs a New Kill Chain
This article has been indexed from Cyber Defense Magazine When it comes to spotting and defeating today’s advanced cyberattacks, the predominant kill chains used in security products […] The post Extended Detection and Response (XDR) Needs a New Kill Chain…
No, You Don’t Need EDR
This article has been indexed from Cyber Defense Magazine By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution […] The post No, You Don’t Need EDR appeared first on Cyber Defense…
US DoJ indicts four members of China-linked APT40 cyberespionage group
This article has been indexed from Cyber Defense Magazine US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between […] The post US DoJ indicts four members of China-linked APT40 cyberespionage group…
If the recent attack on Microsoft is Chinese Government State Sponsored, isn’t it time for a Cyber Geneva Convention?
This article has been indexed from Cyber Defense Magazine State sponsored cyber hacking, espionage, ransomware and other attacks (mainly to steal trade secrets) needs to come to […] The post If the recent attack on Microsoft is Chinese Government State…
It’s Time to Issue Company Passwords Again
This article has been indexed from Cyber Defense Magazine By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found […] The post It’s Time to Issue Company Passwords Again appeared first on…
The Importance Of Protecting Your App’s Source Code
This article has been indexed from Cyber Defense Magazine By Rui Ribeiro, CEO and Co-founder, Jscrambler If your business operations involve any type of web or mobile […] The post The Importance Of Protecting Your App’s Source Code appeared first…
The Internet of Things Ongoing Directions
This article has been indexed from Cyber Defense Magazine By Milica D. Djekic It takes time to get through the journey. Several decades back the global technological […] The post The Internet of Things Ongoing Directions appeared first on Cyber…
BIOPASS malware abuses OBS Studio to spy on victims
This article has been indexed from Cyber Defense Magazine Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) […] The post BIOPASS malware abuses OBS Studio to spy on victims appeared…
Biden discussed Russian ransomware gangs with Putin in a phone call
This article has been indexed from Cyber Defense Magazine President Joe Biden expressed concerns about ransomware attacks carried out by Russian gangs during a phone call with […] The post Biden discussed Russian ransomware gangs with Putin in a phone…
Kaseya releases patches for flaws exploited in massive ransomware supply-chain attack
This article has been indexed from Cyber Defense Magazine Kaseya has released a security update to address the VSA zero-day vulnerabilities exploited by REvil gang in the […] The post Kaseya releases patches for flaws exploited in massive ransomware supply-chain…
REvil gang exploited a zero-day in the Kaseya supply chain attack
This article has been indexed from Cyber Defense Magazine Kaseya was addressing the zero-day vulnerability that REvil ransomware gang exploited to breach on-premise Kaseya VSA servers. A […] The post REvil gang exploited a zero-day in the Kaseya supply chain…
REvil ransomware gang demands $70M for universal decryptor for Kaseya victims
This article has been indexed from Cyber Defense Magazine REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil […] The post REvil ransomware gang demands $70M for universal decryptor for Kaseya…
How Various Flavors of PKI Can Protect and Secure Financial Services Data
This article has been indexed from Cyber Defense Magazine By Abul Salek, Director of Product Management, Sectigo How much time and budget does your company allocate to […] The post How Various Flavors of PKI Can Protect and Secure Financial…
Discovering Unknown Botnets with Command-and-Control Communications Analysis
This article has been indexed from Cyber Defense Magazine Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models […] The post Discovering Unknown Botnets with Command-and-Control Communications Analysis appeared first on…
Five Steps for Safely Migrating your Workloads to the Cloud
This article has been indexed from Cyber Defense Magazine Why security in the cloud is a shared responsibility relationship between the infrastructure provider and the customer By […] The post Five Steps for Safely Migrating your Workloads to the Cloud…
Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity framework
This article has been indexed from Cyber Defense Magazine By Kate Orekhova, Cleveroad company Health organizations deal with a large amount of sensitive personal information. That’s why […] The post Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity…
New LinkedIn breach exposes data of 700 Million users
This article has been indexed from Cyber Defense Magazine A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more […] The post New LinkedIn breach exposes data of 700 Million users appeared…
Linux version of REvil ransomware targets ESXi VM
This article has been indexed from Cyber Defense Magazine The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The […] The post Linux version of REvil ransomware targets ESXi VM appeared first…
Microsoft: Russia-linked SolarWinds hackers breached three new entities
This article has been indexed from Cyber Defense Magazine Microsoft discovered that Russia-linked SolarWinds hackers, tracked as Nobelium, have breached the network of three new organizations. Microsoft […] The post Microsoft: Russia-linked SolarWinds hackers breached three new entities appeared first…
All the User Experience, None of The Security?
This article has been indexed from Cyber Defense Magazine EU telcos gather a lot of highly sensitive customer information. New research suggests it’s not as well protected […] The post All the User Experience, None of The Security? appeared first…
How Our Pharmacy Group Has Readied Secure HIPAA-Compliant WFH Policies
This article has been indexed from Cyber Defense Magazine If anticipating a hybrid or remote workforce in the post-pandemic era, here are three best practices to ensure […] The post How Our Pharmacy Group Has Readied Secure HIPAA-Compliant WFH Policies…
The builder for Babuk Locker ransomware was leaked online
This article has been indexed from Cyber Defense Magazine The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their […] The post The builder for Babuk Locker ransomware was leaked online appeared…
Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail
This article has been indexed from Cyber Defense Magazine By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a […] The post Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed…
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
This article has been indexed from Cyber Defense Magazine By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, […] The post In the Midst of COVID-19, We’re Seeing a Pandemic of…
Securing Patient Private Information in The Age of Shared Information
This article has been indexed from Cyber Defense Magazine By Christian Gitersonke, CEO, Health Insurance Answers The Problem Theft of Private Health Information (PHI) has been around […] The post Securing Patient Private Information in The Age of Shared Information…
New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.
This article has been indexed from Cyber Defense Magazine By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection […] The post New Report Shows Over Two Million Secrets Detected on Public…
Open XDR vs. SIEM
This article has been indexed from Cyber Defense Magazine Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire […] The post Open XDR vs. SIEM appeared first on Cyber Defense Magazine.…
Threat actors in January attempted to poison the water at a US facility
This article has been indexed from Cyber Defense Magazine Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the […] The post Threat actors in January attempted to poison the water at…
Why We Care About Cybersecurity Hygiene
This article has been indexed from Cyber Defense Magazine By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as […] The post Why We Care About Cybersecurity Hygiene appeared first on Cyber…
Time Is Money: How to Minimize Data Breach Damages with Early Detection
This article has been indexed from Cyber Defense Magazine In the current landscape of cybersecurity, most CISOs have come to understand that breaches are inevitable – however, […] The post Time Is Money: How to Minimize Data Breach Damages with…
Norway blames China-linked APT31 for 2018 government hack
This article has been indexed from Cyber Defense Magazine Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s […] The post Norway blames China-linked APT31 for 2018 government hack appeared first…
Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today
This article has been indexed from Cyber Defense Magazine By Don Boxley, Co-founder and CEO, DH2i When it comes to optimizing Microsoft SQL Server high availability (HA) […] The post Why Ensuring Cyber Resilience Has Never Been More Critical or…
Uncovering hidden cybersecurity risks
This article has been indexed from Cyber Defense Magazine By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical […] The post Uncovering hidden cybersecurity risks appeared first on Cyber Defense Magazine.…
A Digital Journey: A Long and Winding Road
This article has been indexed from Cyber Defense Magazine How did we build the internet and not secure it? By David Jemmett, CEO and Founder, Cerberus Sentinel […] The post A Digital Journey: A Long and Winding Road appeared first…
How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar
This article has been indexed from Cyber Defense Magazine Click Here Register Now A trusted brand reputation is the product of relentless hard work and passionate devotion. […] The post How to Protect Your Corporate Brand and Reputation in the…
Key Business Lessons Learned from The SolarWinds Hack
This article has been indexed from Cyber Defense Magazine By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced […] The post Key Business Lessons Learned from The SolarWinds Hack appeared first…
Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients
This article has been indexed from Cyber Defense Magazine By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and […] The post Rethinking Remote Monitoring and Management: How MSPs Can Put Security…
Siloscape, first known malware that drops a backdoor into Kubernetes clusters
This article has been indexed from Cyber Defense Magazine Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying […] The post Siloscape, first known malware that drops a backdoor into Kubernetes…
Register today for Connect 2021 and receive exclusive eBooks on video surveillance and access control
This article has been indexed from Cyber Defense Magazine IFSEC International Connect, a major opportunity for security professionals to meet online, is LIVE! Connect with suppliers and […] The post Register today for Connect 2021 and receive exclusive eBooks on…
StayHackFree – Your Kid’s Sports Team
This article has been indexed from Cyber Defense Magazine Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s […] The post StayHackFree – Your Kid’s Sports Team appeared first on Cyber…
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
This article has been indexed from Cyber Defense Magazine The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in […] The post DoJ: Investigations into ransomware attacks must have similar priority as…
Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
This article has been indexed from Cyber Defense Magazine By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for […] The post Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems appeared first…
These 2 attacks allow to alter certified PDF Documents
This article has been indexed from Cyber Defense Magazine Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the […] The post These 2 attacks allow to alter certified PDF Documents appeared…
How To Make The Most of Increased Cybersecurity Spend
This article has been indexed from Cyber Defense Magazine The average organization devotes 21% of its IT budget to cybersecurity. By Stu Sjouwerman, CEO, KnowBe4 With the […] The post How To Make The Most of Increased Cybersecurity Spend appeared…
Understanding The Surge in Cyber Extortion
This article has been indexed from Cyber Defense Magazine By Jamie Wilson, Founder and Chairman, Cryptoloc Ransomware is on the rise, and it’s not slowing down. Cryptoloc […] The post Understanding The Surge in Cyber Extortion appeared first on Cyber…
Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail
This article has been indexed from Cyber Defense Magazine By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a […] The post Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed…
Executive Protection Needs to Include Digital
This article has been indexed from Cyber Defense Magazine By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks […] The post Executive Protection Needs to Include Digital appeared first on Cyber…
Contactless Passwordless Auto Login
This article has been indexed from Cyber Defense Magazine with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, […] The post Contactless Passwordless Auto Login appeared first on Cyber Defense Magazine.…
Zeppelin ransomware gang is back after a temporary pause
This article has been indexed from Cyber Defense Magazine Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption. Researchers from BleepingComputer reported […] The post Zeppelin ransomware gang is back after a temporary pause appeared…
French intel found flaws in Bluetooth Core and Mesh specs
This article has been indexed from Cyber Defense Magazine Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. […] The post French intel found flaws in Bluetooth Core and Mesh specs…
5 Tips to Building a Cyber-Smart Culture
This article has been indexed from Cyber Defense Magazine Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning […] The post 5 Tips to Building a Cyber-Smart Culture appeared first on…
A dozen Android apps exposed data of 100M+ users
This article has been indexed from Cyber Defense Magazine Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. […] The post A dozen Android apps exposed data of 100M+ users appeared…
Identity crisis? It’s time to take the holistic approach.
This article has been indexed from Cyber Defense Magazine In planning for a secure future hybrid working reality, many IT leaders have reconsidered how they manage the […] The post Identity crisis? It’s time to take the holistic approach. appeared…
Housekeeping Pitfalls of Vulnerability Management
This article has been indexed from Cyber Defense Magazine By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s […] The post Housekeeping Pitfalls of Vulnerability Management appeared first on Cyber Defense…
How to Prevent Ransomware Attacks On Industrial Networks
This article has been indexed from Cyber Defense Magazine Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By […] The post How to Prevent Ransomware Attacks On Industrial Networks appeared first…