This article has been indexed from Security on TechRepublic But is the cybercrime group down for the count or laying low for now due to outrage over the pipeline attack? Read the original article: DarkSide ransomware group suffers setbacks following…
Tag: Security on TechRepublic
Surface Laptop 4 showcases Microsoft’s new approach to PC security
This article has been indexed from Security on TechRepublic Microsoft is bringing advanced hardware security to more Surface devices with cloud firmware management to help enterprises deploy new PCs quickly. Read the original article: Surface Laptop 4 showcases Microsoft’s new…
How penetration testing can promote a false sense of security
This article has been indexed from Security on TechRepublic Penetration testing in and of itself is a good way to test cybersecurity, but only if every nook and cranny of the digital environment is tested; if not, there is no…
Intel: Thoughtful security is essential for innovation
This article has been indexed from Security on TechRepublic Intel execs stressed the importance of secure technologies and solid collaborations to improve product resilience and fuel innovation. Read the original article: Intel: Thoughtful security is essential for innovation
Cybersecurity spending to hit $150 billion this year
This article has been indexed from Security on TechRepublic The 12% bump in spending will be driven by ongoing demand for remote workers and cloud security, says Gartner. Read the original article: Cybersecurity spending to hit $150 billion this year
How Biden’s executive order on cybersecurity may impact vendors and developers
This article has been indexed from Security on TechRepublic Though most of the EO is aimed at government agencies, vendors and developers will have to design all of their products with a greater focus on security, according to Finite State.…
Expert: Biden’s executive order is a good sign and step toward solid cybersecurity
This article has been indexed from Security on TechRepublic Companies will be more likely to update their technology to prevent infrastructure attacks in the future, and sharing intel on attacks can help, cybersecurity expert says. Read the original article: Expert:…
Expert: Intel sharing is key to preventing more infrastructure cyberattacks
This article has been indexed from Security on TechRepublic Old technology and fear of sharing proprietary information are keeping companies from helping each other thwart attacks. Read the original article: Expert: Intel sharing is key to preventing more infrastructure cyberattacks
How to connect Ubuntu Linux Desktop 21.04 to an Active Directory domain
This article has been indexed from Security on TechRepublic Canonical has made it easy for admins to join Ubuntu Desktop to Active Directory domains. Jack Wallen walks you through the steps. Read the original article: How to connect Ubuntu Linux…
Biden’s executive order faces challenges trying to beef up US cybersecurity
This article has been indexed from Security on TechRepublic The EO is designed to protect federal networks, foster information sharing between the government and private sector, and better respond to cyber incidents. But will it do the trick? Read the…
Biden issues Executive Order to strengthen nation’s cybersecurity networks
This article has been indexed from Security on TechRepublic The administration, public and private sector leaders applaud the initial steps outlined but said more action needs to be taken. Read the original article: Biden issues Executive Order to strengthen nation’s…
Ransomware attackers are now using triple extortion tactics
This article has been indexed from Security on TechRepublic Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties. Read the original article: Ransomware attackers are now using triple extortion tactics
Blurred WFH lines create cybersecurity challenges for companies
This article has been indexed from Security on TechRepublic A new HP Wolf Security study focuses on shifting cybersecurity threats in the age of remote working as employees use work devices for personal entertainment. Read the original article: Blurred WFH…
Microsoft 365 email data breaches take center stage amid WFH in a new report
This article has been indexed from Security on TechRepublic According to the software company Egress, 85% of organizations using Microsoft 365 have experienced an email data breach. Read the original article: Microsoft 365 email data breaches take center stage amid…
How to prevent another Colonial Pipeline ransomware attack
This article has been indexed from Security on TechRepublic Government and business both need to step up to combat ransomware attacks against critical systems before they spiral further out of control. Read the original article: How to prevent another Colonial…
Our infrastructure is more vulnerable than we realized, pipeline attack shows
Expert says there are several ways the hackers may have gotten access and how we can possibly prevent these attacks in the future. Read the original article: Our infrastructure is more vulnerable than we realized, pipeline attack shows
Colonial Pipeline attack reminds us of our critical infrastructure’s vulnerabilities
Cybersecurity expert discusses the many ways attackers could have gotten access to the Colonial Pipeline company and reminds us why the threat always looms. Read the original article: Colonial Pipeline attack reminds us of our critical infrastructure’s vulnerabilities
Panda Stealer targets cryptocurrency wallets and VPN credentials via malicious XLS attachment
This latest attack also steals credentials from Telegram, Discord and Steam, according to a Trend Micro analysis. Read the original article: Panda Stealer targets cryptocurrency wallets and VPN credentials via malicious XLS attachment
The many sides of DarkSide, the group behind the Colonial pipeline ransomware attack
Though it likes to promote itself as being “philanthropic,” the DarkSide gang represents a dangerous threat to organizations around the world. Read the original article: The many sides of DarkSide, the group behind the Colonial pipeline ransomware attack
Cybersecurity technology is not getting better: How can it be fixed?
A recent survey found an unusual reason cybersecurity is failing. Experts share what it is and how to correct it. Read the original article: Cybersecurity technology is not getting better: How can it be fixed?
Colonial Pipeline attack ratchets up ransomware game
The latest security incident shows how ransomware is increasingly threatening critical infrastructure and systems. Read the original article: Colonial Pipeline attack ratchets up ransomware game
How to make sure there are no copyright risks in your video
Chances are low that you’ll get sued for copyright infringement based on what’s in the background of your Zoom call, but it’s better to be safe than sorry. Read the original article: How to make sure there are no copyright…
Colonial pipeline attack ratchets up ransomware game
The latest security incident shows how ransomware is increasingly threatening critical infrastructure and systems. Read the original article: Colonial pipeline attack ratchets up ransomware game
Web shells: Top 5 things to know
The use of web shells is increasing, which could put your business at risk. Tom Merritt lists five things to know about web shells. Read the original article: Web shells: Top 5 things to know
Top 5 things to know about web shells
The use of web shells is increasing, which could put your business at risk. Tom Merritt lists five things to know about web shells. Read the original article: Top 5 things to know about web shells
How to enable secure DNS on your Chromebook
Jack Wallen walks you through the process of using DNS-over-HTTPS on your Chromebook for a more secure experience. Read the original article: How to enable secure DNS on your Chromebook
Money makes the world go round: Mobile wallets and the future of commerce
Diving into a cashless future of transactions via digital wallets that keep consumers safe and reduce paper and waste. Read the original article: Money makes the world go round: Mobile wallets and the future of commerce
DevOps is getting code released faster than ever. But security is lagging behind
DevOps is speeding up software release cycles like never before. But according to GitLab’s latest survey, finger-pointing over who should be in charge of security remains an issue. Read the original article: DevOps is getting code released faster than ever.…
The need for cybersecurity “never goes away,” expert says: World Password Day
More than just passwords, internal computer credentials must also be secured. Read the original article: The need for cybersecurity “never goes away,” expert says: World Password Day
World Password Day: Computer credentials are just as important as passwords—protect them, too
Expert discusses the importance of keeping internal computer credentials as safe as your passwords. The need for security never goes away. Read the original article: World Password Day: Computer credentials are just as important as passwords—protect them, too
Cybersecurity: Don’t blame employees—make them feel like part of the solution
Scientists find that blaming employees is counterproductive and suggest creating a safe environment for people to admit their mistakes and learn from them. One company already puts that into practice. Read the original article: Cybersecurity: Don’t blame employees—make them feel…
Android phones may be vulnerable to security flaw in Qualcomm chip
Patched on Qualcomm’s end, the flaw could allow attackers to access your call history and text messages and eavesdrop on your phone conversations, says Check Point Research. Read the original article: Android phones may be vulnerable to security flaw in…
How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers
Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention. Read the original article: How to integrate Linux Malware Detection and ClamAV for automated malware…
World Password Day: How to keep your personal and work data safe
The first Thursday in May is World Password Day. Keeping your data safe isn’t as difficult as you think. Here are some strategies. Read the original article: World Password Day: How to keep your personal and work data safe
Knowledge of security risks hasn’t fixed the password problem
On world password day, data from Onfido serves as a reminder that most people don’t follow password recommendations, probably never will, and that means it’s time to find a new security standard. Read the original article: Knowledge of security risks…
Security teams plan a new pandemic quarantine for BYOD devices headed back to the office
A survey from Blackberry finds that IT departments are worried about unpatched devices connecting to corporate networks as offices reopen. Read the original article: Security teams plan a new pandemic quarantine for BYOD devices headed back to the office
How one phony vaccine website tried to capture your personal information
Recently seized by the government, the site spoofed an actual company developing a coronavirus vaccine in an effort to steal personal data for malicious purposes. Read the original article: How one phony vaccine website tried to capture your personal information
World Password Day: How to keep yourself and your company data secure
The first Thursday in May is World Password Day. Learn some tips for what your organization should do to foster good password management techniques. Read the original article: World Password Day: How to keep yourself and your company data secure
Poor collaboration between NOC and SOC hampers digital transformation efforts
Even though they both seek common ends, networking and security teams are often at odds with each other, slowing their companies down. Read the original article: Poor collaboration between NOC and SOC hampers digital transformation efforts
IBM Security announces new ways for customers to adopt a zero trust approach
In addition to new blueprints, IBM Security also announced a partnership with the cloud and network security provider Zscaler. Read the original article: IBM Security announces new ways for customers to adopt a zero trust approach
Cloud adoption is accelerating, but cloud security might be an issue
The problem is not the cloud, one expert said. It’s the speed at which companies are moving items to the cloud without considering security controls. Read the original article: Cloud adoption is accelerating, but cloud security might be an issue
Expert: The cloud is more secure than on-prem, but the speed of adoption is making it less so
Companies are accelerating their use of the cloud, but should slow down and make sure security is built in from the beginning. Read the original article: Expert: The cloud is more secure than on-prem, but the speed of adoption is…
Facebook: Don’t expect full end-to-end encryption on Messenger until 2022 ‘at the earliest’
Facebook says it wants to make E2EE the default across all of its messaging platforms, but this will be a gradual process. Read the original article: Facebook: Don’t expect full end-to-end encryption on Messenger until 2022 ‘at the earliest’
This ambitious Microsoft project aims to fix cloud computing security
Read the original article: This ambitious Microsoft project aims to fix cloud computing security Microsoft Research’s Project Freta aims to find invisible malware running on the cloud. Read the original article: This ambitious Microsoft project aims to fix cloud computing…
A security flaw in AirDrop found by users
Read the original article: A security flaw in AirDrop found by users Someone who knows how can obtain your phone number and email address when you try to share a file from your iPhone, say researchers at the University of…
Phishing attacks imitate Wells Fargo and Chase the most
Read the original article: Phishing attacks imitate Wells Fargo and Chase the most These popular banks are being spoofed in attacks targeting people filing taxes, getting stimulus checks and ordering deliveries, says Check Point. Read the original article: Phishing attacks…
These breached “Star Wars”-themed passwords need more than the force to save them
Read the original article: These breached “Star Wars”-themed passwords need more than the force to save them Turns out, even the most sci-fi-inspired passwords still need the occasional capital letter and special character splashed in. Read the original article: These…
How to connect a client to the open-source Pritunl VPN
Read the original article: How to connect a client to the open-source Pritunl VPN Now that you have your Pritunl VPN server up and running, Jack Wallen shows you how to connect the client. Read the original article: How to…
Apple’s macOS 11.3 fixes a zero-day exploit and includes M1 improvements
Read the original article: Apple’s macOS 11.3 fixes a zero-day exploit and includes M1 improvements The latest update to Apple’s Big Sur includes critical security patches, which is why Cory Bohon advises upgrading your macOS devices now. Read the original…
Ransomware attack hits Washington, D.C. police department
Read the original article: Ransomware attack hits Washington, D.C. police department The attack was reportedly pulled off by the Babuk gang, which has already leaked screenshots of some of the stolen data. Read the original article: Ransomware attack hits Washington,…
How phishing attacks spoofing Microsoft are evading security detection
Read the original article: How phishing attacks spoofing Microsoft are evading security detection The phishing emails use a Microsoft logo within an HTML table, which is not analyzed by security programs, says Inky. Read the original article: How phishing attacks…
Prisma Cloud can now automatically protect cloud workloads and containers
Read the original article: Prisma Cloud can now automatically protect cloud workloads and containers Palo Alto Networks’ cloud-native security suite is getting a bundle of new features to automate VM security and add malware protection to CI/CD workflows, among others.…
Senator discusses priorities for advancing national cybersecurity legislation
Read the original article: Senator discusses priorities for advancing national cybersecurity legislation Sen. Mark Warner was on a panel at a webinar sponsored by the U.S. Chamber of Commerce Tuesday. He said he is optimistic that new legislation will pass…
“Crypto Dictionary: 500 Cryptographic Tidbits for the Curious” is a crash course in ciphers and cryptids
Read the original article: “Crypto Dictionary: 500 Cryptographic Tidbits for the Curious” is a crash course in ciphers and cryptids Security expert publishes coffee table book for cryptographers to explain the science of secrecy. Read the original article: “Crypto Dictionary:…
Security expert publishes coffee table book for cryptographers to explain the science of secrecy
Read the original article: Security expert publishes coffee table book for cryptographers to explain the science of secrecy Crypto Dictionary: 500 Cryptographic Tidbits for the Curious covers everything from PGP and fuzzy extractors to conferences and proofs. Read the original…
Password-stealing spyware targets Android users in the UK
Read the original article: Password-stealing spyware targets Android users in the UK The spyware tries to steal passwords and other sensitive data and accesses your contact list, warns the U.K.’s National Cyber Security Centre. Read the original article: Password-stealing spyware…
Phishing attacks target Chase Bank customers
Read the original article: Phishing attacks target Chase Bank customers Two email campaigns discovered by Armorblox impersonated Chase in an attempt to steal login credentials. Read the original article: Phishing attacks target Chase Bank customers
Why hackers are increasingly targeting video game companies
Read the original article: Why hackers are increasingly targeting video game companies The targets of the latest attacks are C-suite executives in the video game industry, says BlackCloak. Read the original article: Why hackers are increasingly targeting video game companies
Linux kernel security uproar: What some people missed
Read the original article: Linux kernel security uproar: What some people missed Commentary: It’s not really very interesting that University of Minnesota researchers introduced bugs into the Linux kernel. What matters is what would have happened next. Read the original…
Bitcoin cheat sheet: Everything professionals need to know
Read the original article: Bitcoin cheat sheet: Everything professionals need to know If you’re curious about the original decentralized cryptocurrency, here’s what you need to know about Bitcoin, including why the price of a bitcoin keeps climbing. Read the original…
Apple AirDrop users reportedly vulnerable to security flaw
Read the original article: Apple AirDrop users reportedly vulnerable to security flaw Someone with the right know-how can obtain your phone number and email address when you try to share a file from your iPhone, say researchers at the University…
Love in a time of quarantine can be costly
Read the original article: Love in a time of quarantine can be costly A new report says people were scammed out of a record-breaking $304 million in the past year after being “catfished.” Read the original article: Love in a…
Business and operations leaders are building digital trust through partnerships
Read the original article: Business and operations leaders are building digital trust through partnerships Organizations are increasing investments in cybersecurity and their dependence on third parties—even in light of disruptions, according to PwC’s Cyber Trust report. Read the original article:…
Parrot OS Security edition is a Linux desktop distribution geared for security admins
Read the original article: Parrot OS Security edition is a Linux desktop distribution geared for security admins Security professionals would be well-served with this Linux distribution that offers a wide range of penetration and vulnerability testing tools. Read the original…
Are your Zoom meetings secure? More collaboration means more vulnerabilities
Read the original article: Are your Zoom meetings secure? More collaboration means more vulnerabilities While apps like Zoom, Slack, Teams and others are great for working from anywhere, they also create a larger attack surface. Read the original article: Are…
The boom in collaboration software creates extra security risks
Read the original article: The boom in collaboration software creates extra security risks While the software solutions have made it easier to work from home, they’ve also made it easier to launch malware. Read the original article: The boom in…
The award for the most popular movie used in leaked passwords goes to…
Read the original article: The award for the most popular movie used in leaked passwords goes to… Ahead of Sunday’s Oscars awards ceremony, password management provider Specops rolls out the red carpet to reveal its list. Read the original article:…
Apple supplier Quanta hit with $50 million ransomware attack from REvil
Read the original article: Apple supplier Quanta hit with $50 million ransomware attack from REvil Hackers claim to have infiltrated the networks of Quanta Computer Inc., which makes Macbooks and hardware for HP, Facebook and Google. Read the original article:…
Take this culture quiz to see if your users trust your cybersecurity training and team
Read the original article: Take this culture quiz to see if your users trust your cybersecurity training and team Security firm launches 18-question test to measure what employees think of security practices and how comfortable they are with calling out…
Baseball and cybersecurity have more in common than you think
Read the original article: Baseball and cybersecurity have more in common than you think A former pro baseball player and coach turned sports psychologist believes there is much cybersecurity pros can learn from sports mental conditioning. He wants to help…
Cryptocurrency scams: Top 5 ways to protect yourself
Read the original article: Cryptocurrency scams: Top 5 ways to protect yourself As the use of cryptocurrency increases, so does the risk of being a target for scammers. Tom Merritt offers five tips for defending against cryptocurrency scams. Read the…
Top 5 ways to protect against cryptocurrency scams
Read the original article: Top 5 ways to protect against cryptocurrency scams As the use of cryptocurrency increases, so does the risk of being a target for scammers. Tom Merritt offers five tips for defending against cryptocurrency scams. Read the…
How the open source community helped firms investigate their network activity following SolarWinds
Read the original article: How the open source community helped firms investigate their network activity following SolarWinds The open source community delivered vital help to companies affected by the SolarWinds attack. Read the original article: How the open source community…
VMware announces new Anywhere Workspace tool to help businesses make remote work easier
Read the original article: VMware announces new Anywhere Workspace tool to help businesses make remote work easier The new platform is a combination of SASE, access control and cloud-native endpoint security that the company said is the only solution of…
After Virginia passes new privacy law, states race to catch up to CCPA and GDPR
Read the original article: After Virginia passes new privacy law, states race to catch up to CCPA and GDPR Using Washington State’s proposed law as a guide, New York, Texas and many other states are inching their way toward a…
IT teams need to be coaches, not security guards, and shift to “self-service” for Microsoft 365
Read the original article: IT teams need to be coaches, not security guards, and shift to “self-service” for Microsoft 365 A new study finds that 84% of IT admins think allowing users to set up groups and set governance rules…
Concerns grow over digital threats faced from former employees
Read the original article: Concerns grow over digital threats faced from former employees Security experts said the recent upheaval in the job market makes it imperative to bolster separation protocols further. Read the original article: Concerns grow over digital threats…
Nonprofit provides help to hospitals battling ransomware
Read the original article: Nonprofit provides help to hospitals battling ransomware The Center for Internet Security recently launched a free tool for private U.S. hospitals to block malicious activity. Read the original article: Nonprofit provides help to hospitals battling ransomware
Update to REvil ransomware changes Windows passwords to automate file encryption via Safe Mode
Read the original article: Update to REvil ransomware changes Windows passwords to automate file encryption via Safe Mode The ransomware changes the device password to “DTrump4ever” and forces the device to log in automatically after being rebooted. Read the original…
What to consider when shopping for cyber insurance
Read the original article: What to consider when shopping for cyber insurance Cyber insurance is gaining favor in the business world. An expert offers tips on how to get what’s needed for the best price. Read the original article: What…
Report: It’s not all doom and gloom in cybersecurity with remote workers
Read the original article: Report: It’s not all doom and gloom in cybersecurity with remote workers Endpoint protection for remote workers is still a huge concern, but one report finds that there may be light at the end of the…
Microsoft releases biannual reports on digital trust
Read the original article: Microsoft releases biannual reports on digital trust The reports reveal an increase in requests from U.S. law enforcement agencies, and that the company received the most requests for content removal from China during this period. Read…
How to set up an SSH tarpit in Ubuntu Server 20.04
Read the original article: How to set up an SSH tarpit in Ubuntu Server 20.04 Jack Wallen shows you how to add an SSH tarpit to Ubuntu Server with the help of endlessh. Read the original article: How to set…
Phishing attack ramps up against COVID-19 vaccine supply chain
Read the original article: Phishing attack ramps up against COVID-19 vaccine supply chain Targeting global companies, the attackers are likely seeking confidential data on the distribution and storage of the coronavirus vaccines, says IBM Security X-Force. Read the original article:…
Wells Fargo and Chase now among most imitated brands in phishing attacks
Read the original article: Wells Fargo and Chase now among most imitated brands in phishing attacks The banks are being exploited in attacks targeting people filing taxes, getting stimulus checks and ordering home deliveries, says Check Point. Read the original…
100+ critical IT policies every company needs, ready for download
Read the original article: 100+ critical IT policies every company needs, ready for download From remote work and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates. Read the original article: 100+ critical IT…
FBI cleans up infected Exchange servers
Read the original article: FBI cleans up infected Exchange servers The feds removed web shells that provided backdoor access to cybercriminals in a recent exploit of Microsoft Exchange. Read the original article: FBI cleans up infected Exchange servers
Securonix, AWS partner on new cloud-native SIEM solution
Read the original article: Securonix, AWS partner on new cloud-native SIEM solution AWS customers will be able to connect their accounts to Securonix’s AWS-hosted SaaS security software using what it calls a “bring your own cloud” model. Read the original…
DDoS attacks increased by 20% in 2020, meaning everyone should consider themselves at risk
Read the original article: DDoS attacks increased by 20% in 2020, meaning everyone should consider themselves at risk There were more than 10 million DDoS attacks in 2020, driven by new attack vectors and new threat actors; most of the…
Cybersecurity funding hits all time high in 2020
Read the original article: Cybersecurity funding hits all time high in 2020 Investors pumped almost $8 billion into cybersecurity firms last year, according to Crunchbase. Read the original article: Cybersecurity funding hits all time high in 2020
High numbers of schools hit by phishing, account compromise and ransomware attacks
Read the original article: High numbers of schools hit by phishing, account compromise and ransomware attacks According to a new report, thieves are targeting the personal data of staff and students stored in the cloud. Read the original article: High…
How open source security flaws pose a threat to organizations
Read the original article: How open source security flaws pose a threat to organizations A majority of the open source codebases found in commercial applications analyzed by Synopsys contained security vulnerabilities. Read the original article: How open source security flaws…
Attacks against cloud users surged in 2020
Read the original article: Attacks against cloud users surged in 2020 Cloud-based user accounts were hit by almost 3.1 million external cyberattacks throughout the year, according to McAfee. Read the original article: Attacks against cloud users surged in 2020
Why adding neurodiversity to cybersecurity teams is a win-win for companies and employees
Read the original article: Why adding neurodiversity to cybersecurity teams is a win-win for companies and employees SAP and IBM have changed the hiring and onboarding process to open up more jobs to non-traditional candidates. Read the original article: Why…
User personas and DaaS could solve some security challenges of remote work
Read the original article: User personas and DaaS could solve some security challenges of remote work Use cases can make life easier for IT departments managing connectivity and access for thousands of home offices. Read the original article: User personas…
How to raise the cybersecurity poverty line and make companies more secure
Read the original article: How to raise the cybersecurity poverty line and make companies more secure The cybersecurity poverty line is a term that can help companies understand security gaps and build better awareness. Learn more about it and how…
5 ways to increase your security on Clubhouse and why you should take precautions
Read the original article: 5 ways to increase your security on Clubhouse and why you should take precautions The platform’s aggressive approach to data collection could put brand reputation, personal identity and even national security at risk. Read the original…
How scalper bots profit by buying and reselling Sony PS5 and Xbox consoles
Read the original article: How scalper bots profit by buying and reselling Sony PS5 and Xbox consoles These bots grab some of the limited stock of the PS5 and Xbox on eBay and Amazon and then resell them at huge…
This browser extension promises to block Google’s controversial new tracking algorithm
Read the original article: This browser extension promises to block Google’s controversial new tracking algorithm DuckDuckGo has launched a new browser extension for Chrome that will prevent FLoC, a new tracking technique used by Google to support web advertising without…
Zero trust: The good, the bad and the ugly
Read the original article: Zero trust: The good, the bad and the ugly Zero trust is a good cybersecurity platform, but experts suggest care to get it right and not disenfranchise users. Become a supporter of IT Security News…