article thumbnail

CISA adds 95 flaws to the Known Exploited Vulnerabilities Catalog

Security Affairs

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

What are the security risks? The most significant impending security risks associated with switching over to quantum computers are related to cryptographic encryption. To put this in perspective, it took a group of 300,000 people and four years of work to crack a 64-bit key in 2002. Implement Zero Trust.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday Fixes Actively Exploited MOTW Vulnerability

eSecurity Planet

“But with two zero days, it’s crucial that all IT departments deploy the recommended patches to reduce serious risk,” he said. Another key update, Leonard noted, patches CVE-2002-41076 , a critical remote code execution flaw in PowerShell with a CVSS score of 8.5.

Risk 117
article thumbnail

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

CyberSecurity Insiders

The rule was first introduced in 2002 and has been revised multiple times to keep up with evolving technology and security threats. Implementation of multi-factor authentication. Conducting a risk assessment will help you identify vulnerabilities and potential threats to your customer’s data.

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. There are so many more ways to subvert authentication.

Risk 131
article thumbnail

FISMA Compliance: A Complete Guide to Navigating Low, Moderate, and High Levels

Centraleyes

FISMA Compliance FISMA, enacted in 2002, incorporated the principles outlined in FIPS-199 into its framework. The FISMA regulation mandates that federal agencies follow a risk-based approach to information security, including categorizing their information systems based on FIPS-199 guidelines. .”

Risk 52
article thumbnail

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002. “ CloudSEK ’s flagship digital risk monitoring platform XVigil discovered a post, on a surface web database marketplace, advertising the information of 3.4 million users.

Hacking 102