Mass scanning activity targeting VMware servers with the remote code execution security bug after a Chinese researcher released proof of concept (POC) code. Read More
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Report from White Ops demonstrates that marketing fraud is growing, but that many in the online advertising space may not realize exactly how much the problem has grown in the past year. Read More
The CMMC framework raises the bar for DOD contractors and is apropos in the wake of such events as the SolarWinds hack, calling attention to the importance of cybersecurity and data privacy. Read More
Red Canary researchers said Silver Sparrow macOS malware infecting about 40,000 Macs using both Intel and ARM chips could deliver malicious payloads at a moment's notice. Read More
Report prepared by the New York Cyber Task Force examines the leading cyber defense challenges and finds that coordination between government agencies and private business must be revamped. Read More
As part of a Digital New Deal, cybersecurity bootcamps will play a pivotal role in improving the earning potential of professionals in a space that is desperately looking to fill roles. Read More
Challenge in securing critical national infrastructure (CNI) can be boiled down to the fact that many of these systems were never designed to be connected to the Internet and integrated with a slew of other solutions and devices. Read More
Ponemon and WhiteSource report on application security indicates that most large enterprise-scale organizations feel that their portfolio of applications has become more vulnerable recently. Read More
Report from Mandiant mapped out recent cyber attacks against FTA and finds it likely that more organizations have been compromised. CISA has issued a joint advisory with Australia, New Zealand, Singapore and the UK. Read More
Law firm associated with Donald Trump and half of Fortune 500 companies leaked 100 GB of confidential client information in a third-party data breach linked to Clop ransomware. Read More