A zero-day remote code execution vulnerability in Microsoft Office has come to light, and is considered very serious due to potential for code execution if a victim opens a malicious document in Word.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
New report detailed a wide variety of IoT security and privacy flaws in common smart devices bought off-the-shelf from major retailers. Some of which are sending personal information to third party companies in China.
By truly understanding the service level agreements of a cloud service provider, enterprises can ensure that the joint responsibility of securing data, applications and processes is maintained, allowing IT teams to create a comprehensive cybersecurity strategy.
Vietnam’s controversial new cyber law went into effect on Jan 1, 2019. Google and Facebook has reason to be cautious about entering into what could easily become a global discussion over freedom of speech.
Many IoT devices can easily be hijacked, weaponized and made part of IoT botnets to launch DDoS attacks, it’s called the DDoS of Things.
Japanese tech giant Olympus suffered a suspected BlackMatter ransomware attack in early August that disrupted operations in its European, Middle East, and African operations.
Implementing SASE is unlike rolling out any other technology. It requires dedicated coordination between security and networking teams, a streamlined security and networking architecture, and a fundamental understanding of the business goals and current processes.
Protect your company and customers by layering multiple security protections against cyber attacks including employee education, strong authentication, passive biometrics and behavioral analytics.
Thycotic survey of global CISOs shows that board decisions about cybersecurity spending are decidedly reflexive, with the primary drivers being fear of regulatory penalties or the costs of a repeat breach.
FBI is issuing more cyber security alerts than usual, covering human trafficking, COVID-19 scams, vulnerabilities in networking platforms and cloud-based business email compromise campaigns.