Healthcare payer CISO shares real-world insights: Protecting healthcare data in the cloudIn this interview, the CISO of an American healthcare provider offers insights into cloud security....
Day: August 22, 2022
Africa – the most cyber attacked continent, a 2022 review of trends
Africa – the most cyber attacked continent, a 2022 review of trendsIssam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the...
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malwareWordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the...
Using automated release management to increase data security
Using automated release management to increase data securityDevin Partida writes about cyber security and technology. She is also the Editor-in-Chief of ReHack.com. Developers working on apps may...
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bugHackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers....
10 key facts about callback phishing attacks
10 key facts about callback phishing attacksIs callback phishing on your radar screen? Hackers launch callback phishing campaigns to breach corporate networks. Once in the network,...
Hackers target hotel and travel companies with fake reservations
Hackers target hotel and travel companies with fake reservationsA hacker tracked as TA558 has upped their activity this year, running phishing campaigns that target multiple hotels...
A CISO’s critical recommendations for threat intel
A CISO’s critical recommendations for threat intelBy Pete Nicoletti, Check Point Field CISO, Americas If leveraged appropriately, cyber threat intelligence is a critical cyber security tool...
An encrypted ZIP file can have two correct passwords — here’s why
An encrypted ZIP file can have two correct passwords — here's whyPassword-protected ZIP archives are common means of compressing and sharing sets of files—from sensitive documents to...
58% of Organizations Surveyed Report that Third Parties and Suppliers Were the Target of a Cloud-Based Breach in 2021, Cloud Security Alliance and Proofpoint Study Reveals
58% of Organizations Surveyed Report that Third Parties and Suppliers Were the Target of a Cloud-Based Breach in 2021, Cloud Security Alliance and Proofpoint Study RevealsContenido...
Top 7 reasons to try out the CISO-as-a-Service model
Top 7 reasons to try out the CISO-as-a-Service modelEXECUTIVE SUMMARY: Dedicated security expertise, optimization, governance and innovation on-demand? Almost. For a subset of businesses, the CISO-as-a-Service...
How secure is your hybrid data center?
How secure is your hybrid data center?By Dave Gronner, Product Marketing Manager, Security Platforms, Check Point. As data centers evolve, so do the cyber attacks An...
CVE-2022-31656: critical auth bypass flaw in multiple VMware products
CVE-2022-31656: critical auth bypass flaw in multiple VMware productsVMware on Tuesday announced patches for several critical and high-severity vulnerabilities affecting VMware Workspace ONE Access, Identity Manager,...
Two years on, Apple iOS VPNs still leak IP addresses
Two years on, Apple iOS VPNs still leak IP addressesPrivacy, it's a useful marketing term. *Offer does not apply in China Apple has left a VPN...
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplaceThe top ransomware gangs have become so relentless that it’s not unusual for two or...
Google blocks third record-breaking DDoS attack in as many months
Google blocks third record-breaking DDoS attack in as many months46 million requests per second network flood comes as attacks increase by more than 200% compared to...
State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims
State-Sponsored APTs Dangle Job Opps to Lure In Spy VictimsAPTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored...
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategyMigrating to and utilizing cloud environments – public, hybrid, or multi – is...
Cybersecurity Solutions Must Evolve, Says Netography CEO
Cybersecurity Solutions Must Evolve, Says Netography CEOJust as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to...
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliencyNetwork security is in dire straits. Security teams must defend an expanding attack surface,...
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tacticsThe sunsetting of Virtual Private Networks is underway. Related: VPNs as a DIY tool...
Patch Now: 2 Apple Zero-Days Exploited in Wild
Patch Now: 2 Apple Zero-Days Exploited in WildThe fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being...
NIST Weighs in on AI Risk
NIST Weighs in on AI RiskNIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.Leer másDark...
Intel Adds New Circuit to Chips to Ward Off Motherboard Exploits
Intel Adds New Circuit to Chips to Ward Off Motherboard ExploitsThe countermeasure, which compares the time and voltage at which circuits are activated, is being implemented...
PIXM: Stopping Targeted Phishing Attacks With ‘Computer Vision’
PIXM: Stopping Targeted Phishing Attacks With 'Computer Vision'Chris Cleveland, founder of PIXM, talks about phishers’ evasive maneuvers and how organizations can tap Computer Vision to keep...
The HEAT Is On, Says Menlo Security
The HEAT Is On, Says Menlo SecurityNeko Papez, senior manager, cybersecurity strategy for Menlo Security, helps customers understand if they’re vulnerable to highly evasive adaptive threats...
DeepSurface Adds Risk-Based Approach to Vulnerability Management
DeepSurface Adds Risk-Based Approach to Vulnerability ManagementDeepSurface’s Tim Morgan explains how network complexity and cloud computing have contributed to the challenge, and how automation can help.Leer...
Banyan Recommends Phased Approach When Introducing Zero Trust
Banyan Recommends Phased Approach When Introducing Zero TrustBanyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.Leer másDark ReadingBanyan Security’s...
Mimecast: Mitigating Risk Across a Complex Threat Landscape
Mimecast: Mitigating Risk Across a Complex Threat LandscapeGarret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since...