Read the original article: VERT Threat Alert: September 2020 Patch Tuesday Analysis Today’s VERT Alert addresses Microsoft’s September 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-903 on Wednesday, September 9th. In-The-Wild…
Tag: The State of Security
DoppelPaymer Gang Claims Responsibility for Newcastle University Issues
Read the original article: DoppelPaymer Gang Claims Responsibility for Newcastle University Issues The DoppelPaymer ransomware gang claimed responsibility for a digital security incident that affected Newcastle University’s network and systems. In a news release published on its website, Newcastle University…
Podcast Episode 9 – Cloud Misconfigurations: Simple Mistakes, Big Consequences
Read the original article: Podcast Episode 9 – Cloud Misconfigurations: Simple Mistakes, Big Consequences Tripwire’s Brent Holder and Stephen Wood discuss recent study findings that provide a snapshot of what organizations are doing (and not doing) to secure their cloud.…
Identifying the Most Dangerous Common Software and Hardware Weaknesses and Vulnerabilities – The CWE Top 25 (2020 Edition)
Read the original article: Identifying the Most Dangerous Common Software and Hardware Weaknesses and Vulnerabilities – The CWE Top 25 (2020 Edition) So far, there has not been a perfect solution to ridding the world of software and hardware weaknesses.…
Targeted Company’s Homepage Used in Message Quarantine Phish
Read the original article: Targeted Company’s Homepage Used in Message Quarantine Phish Security researchers observed that malicious actors had incorporated a targeted company’s homepage into a message quarantine phishing campaign. The Cofense Phishing Defense Center found that the phishing campaign…
Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018
Read the original article: Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018 Security researchers at Slovak security firm ESET have discovered a new family of malware that they say has been using a variety of techniques to…
Google Ups Bug Bounty Reward Amounts for Product Abuse Risks
Read the original article: Google Ups Bug Bounty Reward Amounts for Product Abuse Risks Google announced its decision to increase the reward amounts for product abuse risks reported through its bug bounty program. On September 1, Google employees Marc Henson…
Covid-19 Exposure Logging: Key Privacy Considerations
Read the original article: Covid-19 Exposure Logging: Key Privacy Considerations Recently, both Apple and Google released new updates for iPhone and Android devices. One feature that was added was “Covid-19 Exposure Logging.” The feature is off (for now), and according…
Dashboards: An Effective Cybersecurity Tool
Read the original article: Dashboards: An Effective Cybersecurity Tool Data is only as good as what you are able to do with it. Not only does the cybersecurity universe collect data, but individual enterprises also collect cybersecurity data from within…
Former AlphaBay Moderator Sentenced to 11 Years in Prison
Read the original article: Former AlphaBay Moderator Sentenced to 11 Years in Prison A Colorado man received a prison sentence of 11 years for having served as a moderator on the AlphaBay underground marketplace. U.S. District Court Judge Dale A.…
CISO: What the Job REALLY Entails and How It’s Evolved over the Years
Read the original article: CISO: What the Job REALLY Entails and How It’s Evolved over the Years All of us know what a Chief Information Security Officer (CISO) does from afar. A CISO upholds the organization’s overall security by overseeing…
Meeting the Challenges of Remote Work with Chrome OS Policy Settings – Part I
Read the original article: Meeting the Challenges of Remote Work with Chrome OS Policy Settings – Part I Many organizations, from enterprises to small businesses and schools, are focusing efforts on distance working and learning. One significant hurdle for those…
Gift Cards Requested in Two-Thirds of BEC Attacks, Report Reveals
Read the original article: Gift Cards Requested in Two-Thirds of BEC Attacks, Report Reveals A report revealed that scammers requested funds in the form of gift cards in two-thirds of business email compromise (BEC) attacks. For a phishing trends report…
SCM in Practice: How to Strengthen Your Organization’s Security Processes
Read the original article: SCM in Practice: How to Strengthen Your Organization’s Security Processes Security configuration management (SCM) involves maintaining a secure baseline configuration for an organization’s systems and monitoring those assets for deviations from that baseline. This fundamental control…
Tripwire Patch Priority Index for August 2020
Read the original article: Tripwire Patch Priority Index for August 2020 Tripwire‘s August 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, and Apple. Up first on the patch priority list this month are patches for Microsoft…
Emotet Switches to ‘Red Dawn’ Template in Weaponized Word Documents
Read the original article: Emotet Switches to ‘Red Dawn’ Template in Weaponized Word Documents Researchers observed that the Emotet gang had incorporated a new “Red Dawn” template into their weaponized Word Documents delivered to users. Until recently, Emotet’s handlers had…
What Is the EU Cybersecurity Act and What Does It Mean for US-Based Businesses?
Read the original article: What Is the EU Cybersecurity Act and What Does It Mean for US-Based Businesses? During the previous weeks, we provided a thorough overview of the EU NIS Directive, focusing on the Operators of Essential Systems (OES),…
¿Te mudas a la nube para ahorrar dinero? Piénsalo de nuevo …
Read the original article: ¿Te mudas a la nube para ahorrar dinero? Piénsalo de nuevo … La mayoría de los clientes tienen en mente “ahorrar dinero” al pasarse a la nube. El “cloud deployment” de Google y encabezados de blogs…
North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks
Read the original article: North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks North Korea’s BeagleBoyz team resumed its efforts to target banks worldwide with fraudulent money transfers and ATM cash outs. On August 26, the Cybersecurity and Infrastructure Security Agency…
ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived
Read the original article: ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus…
New Zealand Stock Exchange Suffers Second DDoS Attack in Two Days
Read the original article: New Zealand Stock Exchange Suffers Second DDoS Attack in Two Days New Zealand’s stock exchange suffered its second distributed denial-of-service (DDoS) attack within a matter of two days. According to Reuters, cash market trading on the…
IoT Devices in Different Industries and How to Secure Them
Read the original article: IoT Devices in Different Industries and How to Secure Them Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization. The digitization in day-to-day…
Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program
Read the original article: Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program There is a story from years ago about a warehouse network of computers that was separated from the main network.…
3 Areas of Your IT Infrastructure that SCM Can Help to Secure
Read the original article: 3 Areas of Your IT Infrastructure that SCM Can Help to Secure Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or…
RDP Used by Iranian Actors in International Dharma Ransomware Attacks
Read the original article: RDP Used by Iranian Actors in International Dharma Ransomware Attacks Iranian actors leveraged the Remote Desktop Protocol (RDP) as part of an international campaign to target companies with Dharma ransomware. Group-IB uncovered the campaign while conducting…
What Are the Ways to Respond to an Unintentional HIPAA Violation?
Read the original article: What Are the Ways to Respond to an Unintentional HIPAA Violation? Accidents or mistakes are bound to happen. Even if healthcare providers and business associates are compliant to HIPAA Standards, there is always a possibility of…
How IT-OT Security Has Changed in the Wake of COVID-19
Read the original article: How IT-OT Security Has Changed in the Wake of COVID-19 After the global outbreak of coronavirus 2019 (COVID-19), organizations quickly transitioned to remote work in order to enforce social distancing and to keep their employees safe.…
University of Utah Paid Over $450K to Ransomware Attackers
Read the original article: University of Utah Paid Over $450K to Ransomware Attackers The University of Utah paid a fee of more than $450,000 to attackers after they infected a portion of its servers with ransomware. On July 19, 2020,…
Experian South Africa Announces Investigation into Data Incident
Read the original article: Experian South Africa Announces Investigation into Data Incident Experian South Africa announced that it’s in the process of investigating a security incident involving a fraudulent data inquiry. On August 19, the South African branch of the…
Drovorub “Taking systems to the wood chipper” – What you need to know
Read the original article: Drovorub “Taking systems to the wood chipper” – What you need to know On August 15th the NSA and FBI published a joint security alert containing details about a previously undisclosed Russian malware. The agencies say…
Snail Mail With a Privacy Twist
Read the original article: Snail Mail With a Privacy Twist A friend of mine received an interesting piece of snail mail the other day. It was one of those inheritance scam letters that usually arrive in E-Mail. An image of…
Decryption Tool Released for WannaRen Ransomware
Read the original article: Decryption Tool Released for WannaRen Ransomware Security researchers released a decryption tool that enables victims of WannaRen ransomware to recover their files for free. On August 19, Bitdefender announced that it had made a WannaRen decryption…
Taking Care of Your Data Responsibilities in a Shared Responsibility Model in the Cloud
Read the original article: Taking Care of Your Data Responsibilities in a Shared Responsibility Model in the Cloud “Send it to the cloud” has been the increasingly common response over the years for dealing with the issue of how to…
Carnival Reveals It Detected a Ransomware Attack on Its Systems
Read the original article: Carnival Reveals It Detected a Ransomware Attack on Its Systems British-American cruise operator Carnival Corporation & plc revealed it had detected a ransomware attack on some of its IT systems. In a regulatory filing submitted to…
From Customer to Employee – A Tripwire Journey
Read the original article: From Customer to Employee – A Tripwire Journey Tripwire is very much household name within the cybersecurity community. It’s been around from the early days of creating intrusion detection software that would later be known as…
Security Execs’ Advice on Overcoming the Challenges of Remote Work
Read the original article: Security Execs’ Advice on Overcoming the Challenges of Remote Work At the outset of the global coronavirus 2019 (COVID-19) pandemic, many organizations decided to enforce social distancing by requiring that their employees begin working from home.…
Credential Stuffing Attacks Targeted GCKey, CRA Accounts
Read the original article: Credential Stuffing Attacks Targeted GCKey, CRA Accounts Malicious actors launched credential stuffing attacks that targeted Canada’s GCKey service and Canada Revenue Agency (CRA) accounts. On August 15, the Treasury Board of Canada Secretariat announced that the…
SCM: Understanding Its Place in Your Organization’s Digital Security Strategy
Read the original article: SCM: Understanding Its Place in Your Organization’s Digital Security Strategy Digital attackers can compromise a system in a matter of minutes. But it generally takes organizations much longer to figure out that anything has happened. In…
NCSC Shut Down 300K URLs Linked to Investment Scams in 4 Months
Read the original article: NCSC Shut Down 300K URLs Linked to Investment Scams in 4 Months The National Cyber Security Center (NCSC) revealed it had shut down more than 300,000 URLs that linked to investment scams in a four-month period.…
Integrating the Risk Management Framework (RMF) with DevOps
Read the original article: Integrating the Risk Management Framework (RMF) with DevOps Information security should be at the heart of every system launched. In accordance with the Federal Information Security Management Act (FISMA), an information technology system is granted an…
CISA Warns of Phishing Emails Leading to Spoofed COVID-19 Relief Page
Read the original article: CISA Warns of Phishing Emails Leading to Spoofed COVID-19 Relief Page The Cybersecurity & Infrastructure Security Agency (CISA) warned that phishing emails are redirecting recipients to spoofed COVID-19 loan relief pages. On August 12, CISA announced…
Cybercriminals Are Infiltrating Netgear Routers with Ancient Attack Methods
Read the original article: Cybercriminals Are Infiltrating Netgear Routers with Ancient Attack Methods It would be heartening to think that cybersecurity has advanced since the 1990s, but some things never change. Vulnerabilities that some of us first saw in 1996…
Google App Engine, Azure App Service Abused in Phishing Campaign
Read the original article: Google App Engine, Azure App Service Abused in Phishing Campaign A phishing campaign abused both the Google App Engine and the Azure App Service to steal victims’ Microsoft Outlook credentials. Netskope observed that the attack campaign…
Survey: 76% of IT Pros Say It’s Difficult to Maintain Security Configs in the Cloud
Read the original article: Survey: 76% of IT Pros Say It’s Difficult to Maintain Security Configs in the Cloud Cloud misconfigurations are no laughing matter. In its “2020 Cloud Misconfigurations Report,” DivvyCloud revealed that 196 separate data breaches involving cloud…
Managing Information Security Skepticism by Changing Workplace Culture
Read the original article: Managing Information Security Skepticism by Changing Workplace Culture Imagine a workplace in which all of the staff support the function of information security. Employees report suspicious events, are committed to data privacy and see the value…
VERT Threat Alert: August 2020 Patch Tuesday Analysis
Read the original article: VERT Threat Alert: August 2020 Patch Tuesday Analysis Today’s VERT Alert addresses Microsoft’s August 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-899 on Wednesday, August 12th. In-The-Wild…
New Agent Tesla Variants Capable of Stealing Data from VPNs, Browsers
Read the original article: New Agent Tesla Variants Capable of Stealing Data from VPNs, Browsers Some new variants of the Agent Tesla infostealer family are capable of stealing data from multiple VPN clients and web browsers. SentinelOne observed that attackers…
The Importance of Content for Security Tools like Tripwire
Read the original article: The Importance of Content for Security Tools like Tripwire Have you ever stood in the airport security line when the agents bring the dog out to inspect everyone’s luggage? I’m always so fascinated watching the dog…
Phishers Send Out Fake cPanel Security Vulnerabilities Advisory
Read the original article: Phishers Send Out Fake cPanel Security Vulnerabilities Advisory Fraudsters launched a new phishing attack in which they sent out a fake cPanel advisory warning recipients about fabricated security vulnerabilities. On August 5, cPanel and WebHost Manager…
The State of Civil Aviation Cybersecurity
Read the original article: The State of Civil Aviation Cybersecurity Technology and cyber systems have become essential components of modern society. Despite the benefit of cyber technologies, insecurities arise. These could affect all systems and infrastructures. More than that, the…
Emotet Botnet Named ‘Most Wanted Malware’ for July 2020
Read the original article: Emotet Botnet Named ‘Most Wanted Malware’ for July 2020 The Emotet botnet earned the title of “most wanted” malware family for the month of July 2020 following a period of inactivity. Check Point revealed that Emotet…
The Center for Internet Security (CIS) Use Cases and Cost Justification
Read the original article: The Center for Internet Security (CIS) Use Cases and Cost Justification Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players…
Phishing Campaign Leads Users to Site Disguised as Email Scanner
Read the original article: Phishing Campaign Leads Users to Site Disguised as Email Scanner A phishing campaign tricked users into visiting a website that masqueraded as an email scanner in an effort to steal their account credentials. Kaspersky Lab found…
National Cybersecurity Authority (NCA): What You Need to Know
Read the original article: National Cybersecurity Authority (NCA): What You Need to Know In its Vision 2030 development plan, Saudi Arabia included a National Transformation Program whose purpose is to diversify the Kingdom’s income away from the oil industry. One…
FBI: Continued Use of Windows 7 Poses Security Risks Given EOL Status
Read the original article: FBI: Continued Use of Windows 7 Poses Security Risks Given EOL Status The Federal Bureau of Investigations (FBI) warned of the security risks that organizations face if they continue to use the Windows 7 operating system…
Tripwire Research: IoT Smart Lock Vulnerability Spotlights Bigger Issues
Read the original article: Tripwire Research: IoT Smart Lock Vulnerability Spotlights Bigger Issues The mechanical lock is perhaps the most fundamental, tangible, and familiar layer of security in our daily lives. People lock their doors with the expectation that these…
Secure Remote Access: Why It’s Important and How to Do It Right
Read the original article: Secure Remote Access: Why It’s Important and How to Do It Right COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected…
Moldovan National Pleaded Guilty to Role in Digital Crime Enterprise
Read the original article: Moldovan National Pleaded Guilty to Role in Digital Crime Enterprise A national of the Republic of Moldova pleaded guilty to his role in a digital crime enterprise that caused hundreds of millions of dollars in losses.…
Podcast Episode 9: Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques
Read the original article: Podcast Episode 9: Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques Jen Burns, lead cybersecurity engineer at MITRE, walks us through the MITRE ATT&CK© Framework and discusses some important changes brought by a July 2020 update.…
Belarus Announces Arrest of GandCrab Ransomware Distributor
Read the original article: Belarus Announces Arrest of GandCrab Ransomware Distributor Government officials in Belarus announced they had arrested an individual on charges of having helped to distribute GandCrab ransomware. On July 30, the Ministry of Internal Affairs (MIA) of…
Tripwire Patch Priority Index for July 2020
Read the original article: Tripwire Patch Priority Index for July 2020 Tripwire’s July 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, F5 Networks, Cisco, and Oracle. Up first on the patch priority list this month are patches…
The Biggest Challenges and Best Practices to Mitigate Risks in Maritime Cybersecurity
Read the original article: The Biggest Challenges and Best Practices to Mitigate Risks in Maritime Cybersecurity Ships are increasingly using systems that rely on digitalization, integration, and automation, which call for cyber risk management on board. As technology continues to…
Phishing Email Uses Google Ad Redirect to Steal Microsoft Credentials
Read the original article: Phishing Email Uses Google Ad Redirect to Steal Microsoft Credentials Security researchers came across a phishing email that used a Google Ad redirect as a part of its efforts to steal victims’ Microsoft credentials. Cofense found…
Cybersecurity Baseline for IoT Device Manufacturers
Read the original article: Cybersecurity Baseline for IoT Device Manufacturers The pervasive impact of Internet of Things (IoT) devices on our lives is greater than that of traditional IT devices. There are several unknowns in IoT security, and it raises…
FBI Releases Flash Alert on Netwalker Ransomware
Read the original article: FBI Releases Flash Alert on Netwalker Ransomware The Federal Bureau of Investigations (FBI) released a flash alert in which it warned organizations about the dangers of Netwalker ransomware. On July 28, the FBI revealed in Flash…
Effective Threat Intelligence Through Vulnerability Analysis
Read the original article: Effective Threat Intelligence Through Vulnerability Analysis Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of…
Social Engineering: Hacking Brains…It’s Easier than Hacking Computers
Read the original article: Social Engineering: Hacking Brains…It’s Easier than Hacking Computers The audience in the room is weirdly quiet. The contestant is in a small plexiglass booth with nothing but a phone, a laptop computer and some notes. On…
Dussman Group Subsidiary Struck by Ransomware that Leaked Its Data
Read the original article: Dussman Group Subsidiary Struck by Ransomware that Leaked Its Data A subsidiary of the Dussman Group suffered a ransomware infection in which malicious actors stole and publicly leaked its data. As reported by Bleeping Computer, the…
How Cloud Mitigation Techniques Can Help Prevent Ransomware and Phishing Attacks
Read the original article: How Cloud Mitigation Techniques Can Help Prevent Ransomware and Phishing Attacks The COVID-19 pandemic revealed flaws in the American healthcare system that were always there. The only difference now is that those flaws have been brought…
Phishers Using Fake Sharepoint Messages to Target Office 365 Details
Read the original article: Phishers Using Fake Sharepoint Messages to Target Office 365 Details Phishers leveraged fake automated messages from collaborative platform Sharepoint as a means to target users’ Office 365 credentials. Abnormal Security found that the phishing campaign began…
Using Good Cyber Practices to Frame your Personal Cyber Narrative
Read the original article: Using Good Cyber Practices to Frame your Personal Cyber Narrative Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot…
CISA, NSA Lay Out Recommendations for Protecting OT Assets
Read the original article: CISA, NSA Lay Out Recommendations for Protecting OT Assets The Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) laid out a series of recommendations for critical infrastructure owners and operators to protect…
Google Chrome Aims to Keep its Edge Over Other Browsers with its Latest Privacy and Security Features
Read the original article: Google Chrome Aims to Keep its Edge Over Other Browsers with its Latest Privacy and Security Features Google Chrome may currently enjoy the numero uno position in the world of browsers, but it is starting to…
Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack
Read the original article: Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack More information has emerged related to last week’s attack which saw a number of high profile Twitter accounts hijacked for the purposes of spreading…
Multi-Platform Malware Framework ‘MATA’ Claimed Victims Worldwide
Read the original article: Multi-Platform Malware Framework ‘MATA’ Claimed Victims Worldwide Security researchers discovered a multi-platform malware framework called “MATA” that had succeeded in targeting victims worldwide. On Securelist, Kaspersky Lab revealed that it had shared its discovery of MATA…
3 Emerging Innovations in Technology that Will Impact Cyber Security
Read the original article: 3 Emerging Innovations in Technology that Will Impact Cyber Security It goes without saying that innovations and trends in technology have a direct impact on digital security. Just look at what happened with COVID-19. As organizations…
The Cyber Risks of Remote Workers Returning to the Office
Read the original article: The Cyber Risks of Remote Workers Returning to the Office The COVID-19 pandemic has created a huge list of challenges for businesses. One that is potentially going unnoticed or under-reported is cybersecurity. Specifically, as lockdown ends…
Assisted Living Services Provider Discloses Data Security Incident
Read the original article: Assisted Living Services Provider Discloses Data Security Incident An assisted living services provider in Maryland revealed a data security incident in which attackers encrypted some of its information. In an update posted to its website, Lorien…
Understanding the Benefits of the Capability Maturity Model Integration (CMMI)
Read the original article: Understanding the Benefits of the Capability Maturity Model Integration (CMMI) “Cybersecurity is the leading corporate governance challenge today, yet 87% of C-suite professionals and board members lack confidence in their company’s cybersecurity capabilities. Many CISOs and CSOs…
Trading Cookies for U.S. Federal Data Privacy Regulations
Read the original article: Trading Cookies for U.S. Federal Data Privacy Regulations The General Data Protection Regulation (GDPR) has been in effect for two years in the European Union (EU). As Americans continue to become attentive to GDPR and their own…
Cloud Services Abused by Clever Phishing Campaign
Read the original article: Cloud Services Abused by Clever Phishing Campaign Security researchers detected a clever new phishing campaign that abused three enterprise cloud services in an attempt to steal victims’ credentials. On July 18, Bleeping Computer revealed that the…
Top 5 Cybersecurity Risks with Cloud Migration
Read the original article: Top 5 Cybersecurity Risks with Cloud Migration The demand for cloud computing has skyrocketed in recent years. Lower costs, a faster time to market, increased employee productivity, scalability, and flexibility are some of the beneficial factors…
Are You Ready To Automate Your Cloud Account Security?
Read the original article: Are You Ready To Automate Your Cloud Account Security? A Security Analyst, A Lead Developer, And A Cloud IT Admin Walk Into A Bar… Stop me if you’ve heard this one before. When we talk to…
Los Angeles Man Arrested, Charged with PPP Loan Fraud
Read the original article: Los Angeles Man Arrested, Charged with PPP Loan Fraud U.S. law enforcement arrested and charged a man with fraudulently obtaining loans via the Paycheck Protection Program (PPP). On July 16, Acting Assistant Attorney General Brian C.…
BlackRock Android Banking Malware Targeting 337 Mobile Apps
Read the original article: BlackRock Android Banking Malware Targeting 337 Mobile Apps Security researchers discovered a new Android banking malware family called “BlackRock” that targets 337 mobile applications. ThreatFabric found that BlackRock hid its icon when it first launched itself…
The Twitter mega-hack. What you need to know
Read the original article: The Twitter mega-hack. What you need to know What the heck has happened on Twitter? Twitter accounts, owned by politicians, celebrities, and large organisations suddenly started tweeting messages to their many millions of followers, at the…
Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive Action In The Cybersecurity Sector
Read the original article: Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive Action In The Cybersecurity Sector Being a cybersecurity company in these turbulent times puts us at Tripwire, to some degree, on the front-line. Working…
More Than a Tenth of Ransomware Attacks Now Involve Data Theft
Read the original article: More Than a Tenth of Ransomware Attacks Now Involve Data Theft Research into recent ransomware submissions revealed that more than a tenth of crypto-malware infections now involve some element of data theft. In the second quarter…
6 Cloud Security Threats Healthcare Companies May Face – With Solutions
Read the original article: 6 Cloud Security Threats Healthcare Companies May Face – With Solutions For healthcare organizations that handle a lot of patient data, including very sensitive information, cloud computing is a revolution to data storage. Cloud computing in…
VERT Threat Alert: July 2020 Patch Tuesday Analysis
Read the original article: VERT Threat Alert: July 2020 Patch Tuesday Analysis Today’s VERT Alert addresses Microsoft’s July 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-895 on Wednesday, July 15th. In-The-Wild…
Man Gets Prison Time for Identity Theft Scheme Targeting Veterans
Read the original article: Man Gets Prison Time for Identity Theft Scheme Targeting Veterans A man received prison time for helping to conduct an identity theft and fraud scheme that targeted thousands of veterans and U.S. service members. On July…
5 Risks You Need to Remember When Securing Your Containers
Read the original article: 5 Risks You Need to Remember When Securing Your Containers Containers are on the rise. As reported by GlobalNewswire, Allied Market Research estimated that the application market would grow from its 2016 value of $698 million…
TrickBot Malware Warning Victims of Infection by Mistake
Read the original article: TrickBot Malware Warning Victims of Infection by Mistake Security researchers observed some variants of the TrickBot malware family mistakenly warning victims that they had suffered an infection. Advanced Intel’s Vitali Kremez traced the mistake to “password-stealing…
VPNs: What Do They Do, and What Don’t They Do?
Read the original article: VPNs: What Do They Do, and What Don’t They Do? Virtual Private Networks, or VPNs, are not exactly a new technology. When I started my career in IT about 15 years ago, VPN tunnels were the standard…
Conti Ransomware Deemed a Possible Successor of Ryuk
Read the original article: Conti Ransomware Deemed a Possible Successor of Ryuk Security researchers found evidence that the Conti ransomware strain could be a possible successor to the Ryuk crypto-malware family. Vitali Kremez, strategic advisor for SentinelLabs, analyzed both Conti…
Cosmic Lynx: The Highly-Professional Cybercrime Gang Scamming Businesses Out of Millions of Dollars
Read the original article: Cosmic Lynx: The Highly-Professional Cybercrime Gang Scamming Businesses Out of Millions of Dollars Things just got serious. Business Email Compromise is no longer solely the province of chancers and opportunistic Nigerian actors such as the Yahoo…
Joker Spyware Infiltrated Google Play, Abused Old Trick to Target Users
Read the original article: Joker Spyware Infiltrated Google Play, Abused Old Trick to Target Users Security researchers detected a new variant of the Joker spyware family that had infiltrated Google Play and had begun abusing an old trick to target…
MITRE ATT&CK July 2020 Update: Sub-Techniques!
Read the original article: MITRE ATT&CK July 2020 Update: Sub-Techniques! The highly anticipated structural update to the MITRE ATT&CK framework was released July 8th, 2020. After a quiet first half of the year, it appears the ATT&CK team has been…
I Have Antivirus; I’m Protected, Right? Mis-steps Customers Make with their Security and Vulnerability Tools
Read the original article: I Have Antivirus; I’m Protected, Right? Mis-steps Customers Make with their Security and Vulnerability Tools I’ve worked in the IT field for over 30 years. 20 of those years have been spent in the network security…
EDP Renewables Notifies Landowners of Ransomware Attack
Read the original article: EDP Renewables Notifies Landowners of Ransomware Attack Renewable energy company EDP Renewables notified its landowners of a ransomware attack that it suffered in the spring of 2020. In a sample notification letter received by the Attorney…