Latest Posts

B6749cd99f8cb495abe4ed3508a31c08

Thoughts on DoS Attack on US Electric Utility

June 04, 2019 Added by:Phil Neray

The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Network of Fake Social Accounts Serves Iranian Interests

May 29, 2019 Added by:Ionut Arghire

FireEye security researchers have uncovered a network of fake social media accounts that engage in inauthentic behavior and misrepresentation, likely in support of Iranian political interests.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Researchers Analyze the Linux Variant of Winnti Malware

May 28, 2019 Added by:Ionut Arghire

Chronicle, the cybersecurity arm of Google’s parent Alphabet, has identified and analyzed samples of the Winnti malware that have been designed specifically for the Linux platform.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

BlackWater Campaign Linked to MuddyWater Cyberspies

May 21, 2019 Added by:Ionut Arghire

A recently discovered campaign shows that the cyber-espionage group MuddyWater has updated tactics, techniques and procedures (TTPs) to evade detection, Talos’ security researchers report.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Privilege Escalation Flaws Impact Wacom Update Helper

May 17, 2019 Added by:Ionut Arghire

Talos’ security researchers have discovered two security flaws in the Wacom update helper that could be exploited to elevate privileges on a vulnerable system.

Comments  (0)

46208e1048c9421f04baab5dc8814df3

Answering Tough Questions About Network Metadata and Zeek

May 08, 2019 Added by:Kevin Sheu

As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Qakbot Trojan Updates Persistence, Evasion Mechanism

May 06, 2019 Added by:Ionut Arghire

The Qakbot banking Trojan has updated its persistence mechanism in recent attacks and also received changes that potentially allow it to evade detection, Talos’ security researchers say. Also known as Qbot and Quakbot, the Trojan has been around for nearly a decade, and has received a variety of changes over time to remain a persistent threat, although its functionality remained largely unalte...

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Flaws in D-Link Cloud Camera Expose Video Streams

May 06, 2019 Added by:Ionut Arghire

Vulnerabilities in the D-Link DCS-2132L cloud camera can be exploited by attackers to tap into video or audio streams, but could also potentially provide full access to the device.

Comments  (0)

404b3b611dd8d2186d07c3a74d2fb4da

SOAR: Doing More with Less

April 26, 2019 Added by:Michele Zambelli

Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.

Comments  (0)

408ac1e5b2b05b63e650bd356018b62c

Gaining Control of Security and Privacy to Protect IoT Data

April 24, 2019 Added by:Mike Nelson

It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Growing Reliance on Digital Connectivity Amplifies Existing Risks, Creates New Ones

April 24, 2019 Added by:Steve Durbin

Major threats to information security emerging over the next two years could impact businesses operating in cyberspace at break-neck speeds.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

How Microsegmentation Helps to Keep Your Network Security Watertight

April 24, 2019 Added by:Avishai Wool

Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.

Comments  (0)

6fe4d99c3f5787c7098e67eb3c9161fd

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

March 28, 2019 Added by:Neal Goldman

By focusing on specific AppSec initiatives and applying well-tested strategies and tools, you can prioritize the most important issues to focus on.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Next Generation Firewalls are Old News in the Cloud

March 27, 2019 Added by:Sanjay Kalra

As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging

March 27, 2019 Added by:Perry Carpenter

Let’s talk about another Trojan Horse for the Mind -- visuals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise

March 21, 2019 Added by:Ionut Arghire

Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

1 Million Apps Patched in Android Security Improvement Program

March 01, 2019 Added by:Ionut Arghire

Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says.

Comments  (0)

47c22ebc25ad3d1dac97fc04f17f8e52

The Role of Analytics in Protecting Healthcare Data Privacy and Security

February 27, 2019 Added by:Nilesh Dherange

Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WINDSHIFT Hackers Target Government Agency in the Middle East

February 26, 2019 Added by:Ionut Arghire

A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

The Rise of Ransomware and the Consequences for SMBs

February 21, 2019 Added by:Timur Kovalev

Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.

Comments  (0)