Latest Blog Posts

Fa42af438e58b799189dd26386f5870f

Cisco Patches Critical Flaw in Vision Dynamic Signage Director

July 20, 2019 Added by:Ionut Arghire

Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cybersecurity: Drones Will Soon Become Both Predator and Prey

July 19, 2019 Added by:Steve Durbin

Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.

Comments  (0)

2de88989281faa7581932957d89e74d2

The Automotive Industry: Stepping up on Defense

July 19, 2019 Added by:David Barzilai

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

Comments  (0)

7b6799b0baa4ae08467bb98e99a89ae4

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

July 19, 2019 Added by:Filip Truta

Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.

Comments  (0)

8864b99db2b2651e51dbd14fde0e361e

Today’s Top Public Cloud Security Threats …And How to Thwart Them

June 21, 2019 Added by:Michael Koyfman

In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Influence Operation Uses Old News of New Purposes

June 18, 2019 Added by:Ionut Arghire

A recently uncovered influence campaign presents old terror news stories as if they were new, likely in an attempt to spread fear and uncertainty, Recorded Future reports.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building Modern Security Awareness with Experiences

June 14, 2019 Added by:Perry Carpenter

Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.

Comments  (0)

14a18daeba459ca50c5e7bcdde3a5fa0

The Promise and Perils of Artificial Intelligence

June 14, 2019 Added by:Boris Cipot

AI will help us to improve our lives. We, in turn, must ensure that the software doing so is secure.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Utilising the Benefits of Industrial Robots Securely

June 05, 2019 Added by:Jalal Bouhdada

The benefits of industrial robots won’t be achieved for long if they are not deployed with cybersecurity at their core.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure

June 04, 2019 Added by:Steve Durbin

Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.

Comments  (0)

B6749cd99f8cb495abe4ed3508a31c08

Thoughts on DoS Attack on US Electric Utility

June 04, 2019 Added by:Phil Neray

The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Network of Fake Social Accounts Serves Iranian Interests

May 29, 2019 Added by:Ionut Arghire

FireEye security researchers have uncovered a network of fake social media accounts that engage in inauthentic behavior and misrepresentation, likely in support of Iranian political interests.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Researchers Analyze the Linux Variant of Winnti Malware

May 28, 2019 Added by:Ionut Arghire

Chronicle, the cybersecurity arm of Google’s parent Alphabet, has identified and analyzed samples of the Winnti malware that have been designed specifically for the Linux platform.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

BlackWater Campaign Linked to MuddyWater Cyberspies

May 21, 2019 Added by:Ionut Arghire

A recently discovered campaign shows that the cyber-espionage group MuddyWater has updated tactics, techniques and procedures (TTPs) to evade detection, Talos’ security researchers report.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Privilege Escalation Flaws Impact Wacom Update Helper

May 17, 2019 Added by:Ionut Arghire

Talos’ security researchers have discovered two security flaws in the Wacom update helper that could be exploited to elevate privileges on a vulnerable system.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »