Identity Matching: What You Need to Know About It
When asked how they can improve a bank’s security from financial crime, many bankers are at a loss for words. Granted, the question is a broad one and difficult to…
What is the Main Goal of Penetration Testing?
By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the top priorities for today’s business world. The internet has enabled businesses to…
Vice Society ransomware also exploits PrintNightmare flaws in its attack
Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice Society ransomware operators are actively exploiting Windows print spooler PrintNightmare…
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has…
Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks
The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. The Australian Cyber Security Centre (ACSC) warns of an escalation in LockBit 2.0 ransomware…
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and…
Is The Cloud Leaving You Exposed?
Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. On a traditional network, user accounts are the main identity type and,…
Reshaping the future of transportation with the ITS World Congress
The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As more and more organizations look to digital tech to transform their operations,…
Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have…
How to Accelerate SecOps efficiency and extend capabilities with XDR
By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every…
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions…
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To…