Introducing Full Content Inspection: The New Standard in Network Security,...
Network security controls are no longer reliable or sufficient. They are easily evaded, prone to false positives, and feed a costly ecosystem of alert management and incident response. According to...
View ArticleBeware the tools that can bring risk to a Windows network
There are a few essential questions that anyone maintaining security on a Windows network needs to ask right now to avoid engaging in some very risky behavior, but there’s one that may be the most...
View ArticleAttackers abuse URL protection services to hide phishing links in emails
Recent phishing campaigns were seen abusing email security services that rewrite URLs to hide their own malicious links. The irony is that this URL rewriting feature, which is common in secure email...
View ArticleAttempted Trump assassination exploited in new crypto doubling scams
Crypto scammers are using the recent assassination attempts against former US President Donald Trump to lure customers into a crypto doubling scheme, according to a Bitdefender study. The new scam has...
View ArticleSAP security holes raise questions about the rush to AI
Cloud security firm Wiz has probed SAP defenses as part of its tenant isolation research on AI service providers, and on Wednesday published a lengthy list of shortcomings. SAP says that they fixed...
View ArticleCisco patches severe password reset flaw that lets hackers hijack SSM On-Prem...
Cisco has issued a patch that fixes a severe password weakness in many versions of its Smart Software Manager On-Prem (Cisco SSM On-Prem), used by a subset of customers to manage product licenses...
View ArticleHashcat explained: How this password cracker works
What is hashcat? Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins, as well as criminals and spies. Cracking passwords is different from...
View ArticleInside the world’s largest ‘live-fire’ cyber-defense exercise
The island country of Berylia is under threat. Over the next 48 hours, it will be subject to an endless number of cyberattacks without interruption, which it must contain in the best way possible....
View ArticleBlue screen of death strikes crowd of CrowdStrike servers
CrowdStrike has admitted to pushing out a bad software update, causing many Windows machines running the affected software to crash. The problem, apparently affecting its Falcon platform, brought down...
View ArticleSolarwinds patches critical RCE flaws in Access Rights Manager
US software development company Solarwinds has sent out important security fixes that close a number of critical vulnerabilities in its Access Rights Manager software. Six of the vulnerabilities...
View ArticleFederal judge greenlights securities fraud charges against SolarWinds and its...
Security firm SolarWinds had good news and bad news this week, as most of the charges in the US Securities and Exchange Commission (SEC) lawsuit, filed in the wake of the 2020 Sunburst cyberattack,...
View ArticleCrowdStrike CEO apologizes for crashing IT systems around the world, details fix
CrowdStrike CEO has apologized to the company’s customers and partners for crashing their Windows systems, and the company has described the error that caused the disaster. “I want to sincerely...
View ArticleInternships can be a gold mine for cybersecurity hiring
Willem Westerhof just might be the Cinderella of cybersecurity interns. The Dutchman had worked as a physiotherapist, made pies in a bakery, and toiled in overnight shifts at food and beverage stands...
View Article5 critical IT policies every organization should have in place
For many enterprises, IT infrastructures have broadened to the extent that they seemingly have no boundaries. Many employees are working remotely or via a hybrid model. Cloud-based services have...
View ArticleData of 13 million MediSecure customers compromised in ransomware attack
Approximately 12.9 million Australians using the MediSecure prescription delivery service suffered a loss of personal information from an April ransomware attack, MediSecure said in a statement. The...
View ArticleKey considerations for adopting a platform approach to cybersecurity
It’s no secret that the cybersecurity platform conversation is top of mind for many right now. Yet a platform approach to cybersecurity has existed for decades, and there’s long been a debate across...
View ArticleEarly IT takeaways from the CrowdStrike outage
Whether you’ve survived the CrowdStrike incident or didn’t use CrowdStrike and are merely seeing the impact to others, taking time to learn lessons from this event is vital. After all, if you couldn’t...
View ArticleChinese APT group Daggerfly revamps malware toolkit with new backdoors
Researchers have linked a previously unattributed Mac backdoor and a new Windows Trojan to a Chinese APT group known as Daggerfly that has been around for over a decade and targets organizations and...
View ArticleNHIs may be your biggest — and most neglected — security hole
Non-human identities (NHIs) have been a staple of enterprise IT for decades. Giving digital components credentials to access IT networks and devices, as IT would a human user, is key to ensuring...
View ArticleWiz shocks the tech world as it rejects Google’s $23 billion bid
In a surprising turn of events, Israeli cybersecurity startup Wiz has decided to end its acquisition talks with Google-parent Alphabet, which would have resulted in a $23 billion deal, the largest...
View Article