Vectra releases 2023 security predictions for APAC
Infrastructure-as-Code and MFA’s demise get top billing as Vectra highlights the weakest links and heralds upcoming developments in the protection toolbox. Read more
Infrastructure-as-Code and MFA’s demise get top billing as Vectra highlights the weakest links and heralds upcoming developments in the protection toolbox. Read more
Bloomberg’s sources report that Apple employees are laying the groundwork to eventually allow iOS and iPadOS users to install apps outside the App Store. The process could involve allowing third-party app stores, sideloading, or both. The company may initially only open its walled garden for users in European Union countries…Read more
CyberData Pros collaborates with RiskRecon, a Mastercard Company, to provide threat prevention services for clients worldwide. Specializing in data security, compliance, consulting and due diligence, CDP analysts provide solution-oriented awareness and implementation routes to improve and eliminate security risks for clients. RiskRecon is a SaaS platform that analyzes a company’s internet-facing assets for cyber risks. …
CyberData Pros and RiskRecon launch global cybersecurity protection for businesses Read More »
The collaboration between Intel 471 and Threatray will leverage Threatray’s core engine to perform code reuse analysis and identify malware variants with a high degree of resilience. It will enable a more accurate tracking of actors and campaigns to better inform threat landscape reporting. Finally, this joint research effort will generate higher value IOC extraction …
Intel 471 and Threatray enter into a joint research collaboration Read More »
Red Canary has unveiled a new integration with Palo Alto Networks, adding Cortex XDR and broadening its detection coverage for mutual customers. This deepening of the partnership between the two companies builds on existing Red Canary integrations, including PAN-OS, Advanced Threat Prevention, and WildFire. Red Canary analyzes petabytes of data every day, applying advanced analytics …
Red Canary and Palo Alto Networks expand partnership to improve detection coverage Read More »
Cloudflare announced that the Cloudflare One suite of zero trust security tools is available at no cost to at-risk public interest groups that are part of Cloudflare’s Project Galileo, as well as local and state election sites part of Cloudflare’s Athenian Project. These organizations will now have access to the comprehensive and deeply-integrated zero trust …
Cloudflare offers zero trust security tools for free to at-risk public interest groups Read More »
Patch Tuesday For its final Patch Tuesday of the year, Microsoft fixed one bug that’s already been exploited in the wild – and another that’s publicly known. That brings its total for December to 49 patched vulnerabilities, six of which are rated critical. The bug that’s listed as exploited-in-the-wild is tracked as CVE-2022-44698. It’s a …
Microsoft ain’t the only one squashing exploited-in-the-wild bugs this month Read More »
Fortinet continues to garner and release information to address a recently-discovered heap-based buffer overflow vulnerability impacting several versions of FortiOS (FOS), the operating system behind an entire series of FortiGate next-generation firewalls and security appliances. This new vulnerability comes on the heels of a very recent one whereby an alternate path or channel could allow …
CVE-2022-42475: Fortinet Pre-authentication Code-execution Vulnerability Read More »
The healthcare industry is seeing tremendous change. With the pandemic, staffing shortages, and a backlog of patients needing care, now is the time to reset and question traditional approaches. Add in the pressure of data protection and compliance, supporting remote working environments, and providing telehealth services – finding the right technologies and endpoint security solutions …
Azure Cloud Migration As we go into 2023, hybrid work is no longer the new normal, it is simply the normal. IT departments at organizations around the world have continued to come up with innovative ways to provide workers with access to everything they need to do their jobs from anywhere, and the demand for migrating to the cloud …
Hey there, I hope you’ve been doing well! 🎄 Greetings of the Season I’m back in Cincinnati for the holidays, where I mostly grew up. For non-American (and East or West Coast) readers: Cincinnati is in Ohio, which is part of the “Midwest.” Feel free to share that fun fact over the dinner table and …
Imagine being able to mimic a celebrity’s look with a screenshot. Users could use the image to quickly find clothing sold online that matches the style. But, this is not the search experience of today. Customers struggle to find what they need, and if they can’t, they’ll leave. Some of them don’t remember the name …
In late September 2022, threat researchers uncovered a supply-chain attack carried out by malicious actors using a trojanized installer of Comm100, a chat-based customer engagement application. Our investigation of the incident revealed that the breadth and depth of the campaign’s impact were greater than what the researchers had initially thought; we also found that more …
Probing Weaponized Chat Applications Abused in Supply-Chain Attacks Read More »
As 2022 draws to a close, we reflect on a cyber security landscape shaped by a partial return to office but with a wide acceptance of hybrid and flexible working, as well zero-trust principles becoming mainstream, increasingly complex digital landscapes, and a geopolitical situation marred by Russia’s invasion of Ukraine.These new challenges have been accompanied …
With the increasing use of artificial intelligence, and quantum computing expected to soon become a reality, the cyber threatscape is changing more than ever.Read more
InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum. Meanwhile, the hackers responsible are communicating directly with …
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked Read More »
Corporate sustainability initiatives increasingly are finding their way into the data center. But many CIOs who invest in and deploy leading-edge carbon-cutting technology aren’t even aware they’re taking climate action. They’re just trying to improve the bottom line. That puts CIOs in an enviable position. In most corners of the enterprise, ESG decision-making necessitates squaring …
Fraud Management & Cybercrime , Healthcare , Industry Specific Latest Variant Uses Capabilities of BlackMatter, Other Malware Marianne Kolbasuk McGee (HealthInfoSec) • December 13, 2022 U.S. federal authorities are warning healthcare and public health sector organizations of attacks involving LockBit 3.0 ransomware, which includes features of other ransomware variants along with the threat …
LockBit 3.0 Ransomware Threatens Health Sector, Feds Warn Read More »
LockBit claims it was behind a cyber-attack on the California Department of Finance, bragging it stole data during the intrusion. The notorious ransomware gang boasted it exfiltrated 76GB from the state agency, which apparently included databases, confidential information, financial and IT documents, and, oddly enough, “sexual proceedings in court.” LockBit has promised to publish “all …
LockBit threatens to leak confidential info stolen from California’s beancounters Read More »
No longer limited to email, BEC attacks are hitting users through text messages in an attempt to steal money or commit other types of fraud, says Trustwave. Image: panuwat/Adobe Stock A business email compromise attack is a type of scam aimed at an organization’s employees in which the attacker impersonates a top executive or other …
Business email compromise attacks now targeting people via SMS messages Read More »
Last updated at Tue, 13 Dec 2022 23:19:21 GMT Emergent threats evolve quickly, and as we learn more about this vulnerability, this blog post will evolve, too. On Tuesday, December 13, 2022, Citrix published Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518 announcing fixes for a critical unauthenticated remote code execution (RCE) vulnerability that …
CVE-2022-27518: Critical Fix Released for Exploited Citrix ADC, Gateway Vulnerability Read More »
Yesterday, Rep Slotkin (D,MI) was added as cosponsor to HR 8806, the Healthcare Cybersecurity Act of 2022. That bill would require CISA to work with the Department of Health and Human Services (HHS) to improve cybersecurity in the Healthcare and Public Health Sector. Slotkin is a member of the House Homeland Security Committee to which …
HR 8806 Cosponsor Added – Healthcare Cybersecurity Read More »
Former SpaceX exec Lee Rosen co-founded ThinkOrbital last year to develop commercial space station applications. Rosen previously served as vice president of mission and launch operations at SpaceX. He has worked as ThinkOrbital’s chief strategy officer since its founding and was appointed company president last week. He recently revealed details…Read more
Venafi has released its predictions for the cybersecurity landscape in 2023, indicating that this will be one the most challenging years yet for the industry.Read more
Cyber threats should no longer be viewed as just an IT problem, but also a business problem, Deloitte said in its latest Future of Cyber study. Operational disruption, loss of revenue, and loss of customer trust are the top three significant impact of cyber incidents. More than half, or 56%, of respondents told Deloitte they …
Cybersecurity Drives Improvements in Business Goals Read More »
The U.S. Department of Health and Human Services Office for Civil Rights (OCR) issued guidance regarding covered entities’ and business associates’ use of tracking technologies (the Guidance). As discussed in greater detail below, the Guidance reveals OCR’s position that an IP address is not just an identifier but is itself individually identifiable health information (IIHI) …
OCR Guidance on Use of Tracking Technologies Warrants Review of Website Tech Read More »
Dive Brief: Prominent threat actors have abused legitimately signed Microsoft drivers to bypass traditional endpoint security and launch attacks against organizations in several key industries, according to research from SentinelOne and Mandiant. Researchers discovered Poortry and Stonestop malware, which are part of small toolkits that can shut down antivirus and endpoint detection and response (EDR) …
Threat actors abuse legitimate Microsoft drivers to bypass security Read More »
Today’s VERT Alert addresses Microsoft’s December 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1034 on Wednesday, December 14th. In-The-Wild & Disclosed CVEs CVE-2022-44698 This vulnerability allows a malicious individual to bypass SmartScreen, which does a reputation check based on Mark of the Web identifiers. We saw …
VERT Threat Alert: December 2022 Patch Tuesday Analysis Read More »
School administrators, safety resource officers, and community stakeholders filled HyperWerx building #2 last Thursday for a series of live demos and discussions exploring how K-12 and higher education leaders can deploy SparkCognition Visual AI Advisor to improve school safety. Over several information-packed hours, the game-changing advantages of “more time” kept coming to the fore in …
Increasing the Barrier of Time: Recapping SparkCognition’s School Safety Demo Event Read More »