Mon.Sep 07, 2020

article thumbnail

Botnets: A cheat sheet for business users and security admins

Tech Republic Security

Almost anything with an internet connection can be hijacked and used in a malicious botnet attack--IoT devices are especially popular targets. Learn how to spot and prevent this malware threat.

IoT 189
article thumbnail

SMBs and Cyber Insurance – Third Certainty #27

Adam Levin

With the average cost of a data breach exceeding three million dollars, cyber insurance has become a necessity for SMBs. Find out more on the latest episode of Third Certainty with Adam Levin. The post SMBs and Cyber Insurance – Third Certainty #27 appeared first on Adam Levin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Farewell Flash Player: Microsoft tells businesses to get ready for the end of support

Tech Republic Security

From January 2021, Flash will be disabled by default in IE 11 and Microsoft Edge browser.

191
191
article thumbnail

Phil Venables Blogging

Adam Shostack

Phil Venables is one of the more reflective and thoughtful CSOs out there, and in this era where everything is a tweet or a linkedin post (sigh) you may have missed that Phil has a blog. This Labor day, why not take the time to catch up on his writing?

100
100
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CEOs Could Be Held Personally Liable for Cyberattacks that Kill

Threatpost

As IT systems, IoT and operational technology converge, attacks on cyber-physical systems in industrial, healthcare and other scenarios will come with dire consequences, Gartner predicts.

article thumbnail

How to enable Canonical Livepatch from the command line

Tech Republic Security

If you have Ubuntu Servers in your data center, you should consider adding Canonical Livepatch to keep them up to date with kernel security patches.

119
119

More Trending

article thumbnail

Julian Assange Lays Out His Case Against US Extradition

WIRED Threat Level

The argument hinges in part on psychiatrists' testimony that Assange is a high suicide risk.

Risk 145
article thumbnail

France national cyber-security agency warns of a surge in Emotet attacks

Security Affairs

The French national cyber-security agency warns of a surge in Emotet attacks targeting the private sector and public administration entities. The French national cyber-security agency published an alert to warn of a significant increase of Emotet attacks targeting the private sector and public administration entities in France. The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.

Malware 104
article thumbnail

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

Threatpost

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists.

InfoSec 104
article thumbnail

US Federal systems must be covered by vulnerability-disclosure policies by March 2021

Security Affairs

A new Cybersecurity and Infrastructure Security Agency (CISA) mandate requires U.S. agencies to implement vulnerability-disclosure policies by March 2021. The U.S. government’s cybersecurity agency CISA has issued a mandate that requires federal agencies to implement vulnerability-disclosure policies (VDPs) by March 2021. The main purpose of vulnerability-disclosure policies is to ensure that required information, other than confidential business information, is disclosed to the public and share

InfoSec 87
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Boost WhatsApp’s Privacy and Better Protect Your Data

WIRED Threat Level

The Facebook-owned company has end-to-end encryption by default—but that doesn't mean the service’s settings are as private as they could be.

article thumbnail

Russian national indicted for attempting to recruit Tesla employee to install malware

Security Affairs

US authorities have indicted a Russian national for conspiring to recruit a Tesla employee to install malware onto the company’s infrastructure. Russian national Egor Igorevich Kriuchkov (27) has been indicted in the United States for conspiring to recruit a Tesla employee to install malware onto the company’s network. In August, US authorities arrested the Russian national Egor Igorevich Kriuchkov (27) after attempting to recruit an employee at a targeted company to plant a piece of malware.

Malware 84
article thumbnail

ImmuniWeb Gained Over 50 New Partners in 2020

ImmuniWeb

New business partners from over 35 countries enhance ImmuniWeb’s global presence and drive new recurrent sales around the globe for the award-winning ImmuniWeb® AI Platform.

60
article thumbnail

Exposed Docker Server Abused to Drop Cryptominer, DDoS Bot

Trend Micro

Malicious actors continue to target environments running Docker containers. We recently encountered an attack that drops both a malicious cryptocurrency miner and a DDoS bot on a Docker container built using Alpine Linux as its base image.

DDOS 52
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Epic Manchego gang uses Excel docs that avoid detection

Security Affairs

A recently discovered cybercrime gang, tracked as Epic Manchego , is using a new technique to create weaponized Excel files that are able to bypass security checks. Security experts from NVISO Labs recently spotted the activity of a new malware gang, tracked as Epic Manchego, that is actively targeting companies across the world with phishing emails since June.