Hot topics close

Week in review: Improving vulnerability triage, RDP attacks soaring, hackers in high demand

Week in review Improving vulnerability triage RDP attacks soaring hackers in high demand
Here's an overview of some of last week's most interesting news and articles: Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack

Here’s an overview of some of last week’s most interesting news and articles:

Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attackForescout researchers have discovered nine vulnerabilities affecting nine different TCP/IP stacks widely used in IoT and OT devices.

February 2021 Patch Tuesday: Microsoft and Adobe fix exploited zero-daysAdobe has fixed a Reader flaw used in limited attacks, as well as delivered security updates for a variety of products, including Acrobat and Reader, Dreamweaver, and Magento.

Dark web analysis shows high demand for hackersPositive Technologies’ experts have analyzed the ten most active forums on the dark web, which offer services for hacking websites, buying and selling databases, and accessing web resources.

Hackers hit CD Projekt Red, steal data, ask for ransomPolish game developer CD Projekt Red has been hit by hackers, who breached its internal network, stole data, encrypted some devices, and asked for a ransom to not sell of leak online sensitive company documents and the source code of some of their more popular games.

For SOC teams, the analytics and automation hype is realTools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better time. In the wake of the COVID-19 pandemic, security has become a top priority for nearly all organizations.

Which users are at higher risk of email-based phishing and malware?The risk of being targeted with email-based phishing and malware attacks is not evenly spread across geographic and demographic boundaries, Google and Stanford University researchers have discovered.

Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive filesCyberArk researchers have released BlobHunter, an open-source tool organizations can use to discover Azure blobs containing sensitive files they have inadvertently made public.

How do I select a remote access solution for my business?To select a suitable remote access solution for your business, you need to think about a variety of factors. We’ve talked to several industry professionals to get their insight on the topic.

Microsoft to alert enterprise security teams when nation-state attackers target their employeesMicrosoft will introduce this month a new security alert that will notify enterprise security teams when an employee is being targeted by suspected nation-state attackers.

Organizations can no longer afford a reactive approach to risk managementBoard members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic conditions that may restrict growth and market conditions that may continue to impact customer demand, according to a survey from Protiviti and North Carolina State University.

Protecting productivity within the disappearing perimeterDuring the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work.

Misplaced expectations securing water treatment systemsThe cyber attack that tried to poison the drinking water system in Oldsmar, Florida is similar to last year’s attack on small water systems in Israel.

Can we put a stop to cyber harassment?It might seem inevitable, as people are spending more and more time online, but Matthieu Boutard, Managing Director at Bodyguard, a French technology start-up that protects users against cyber-bullying, hate speech and toxic content online, believes that to understand what is fueling the rise of cyber harassment, we should look at the current social and economic context.

5 cybersecurity trends MSPs must address in 2021Now that COVID-19 has become a known hurdle and companies have had time to adapt to it, MSPs can make better plans for how they can service their customers in the coming year, and they can take the time to refine their strategies for this new normal.

Researchers develop approach that can recognize fake newsResearchers at the Universities of Göttingen and Frankfurt and the Jožef Stefan Institute in Ljubljana have developed an approach that can recognize fake news, even when the news contents are repeatedly adapted.

When it comes to vulnerability triage, ditch CVSS and prioritize exploitabilityWhen it comes to software security, one of the biggest challenges facing developers today is information overload.

Three ways MITRE ATT&CK can improve your organizational securityThere’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as well as the coverage provided by EDR solutions. Still, even while you appreciate ATT&CK, it’s not always clear how you can use it to improve your own organizational security.

Most zoombombing incidents are inside jobsMost zoombombing incidents are “inside jobs” according to a study featuring researchers at Binghamton University, State University of New York.

Your security technology is only as strong as your teamBusinesses aren’t shy about investing in cybersecurity, but are organizations getting the maximum return on those investments?

Collaboration is the key to a secure world-class sporting eventSecuring any world-class event is a massive undertaking that requires teams of security professionals to coordinate with each other and constantly share information.

Big Tech will try to pre-empt harsh privacy laws by writing their ownOver the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era.

IPCDump: Open-source tool for tracing interprocess communication on LinuxGuardicore released IPCDump, a new open source tool for tracing interprocess communication on Linux.

Whitepaper: A new approach to help you achieve least privilege at cloud scaleLearn more about Cloud Infrastructure Entitlements Management (CIEM) in this free CloudKnox whitepaper, no registration required.

BluBracket Community Edition: Detect and monitor secrets in code for freeBluBracket announced its Community Edition, a free, robust and automated tool for finding passwords, tokens and other security vulnerabilities in code.

Product showcase: USB-Lock-RPUSB-Lock-RP allows security system administrators to manage USB access from a central administrative console. The program works on-premises and licensing cost is for perpetual licensing.

Get your free ticket to Cobalt’s SecTalks virtual conferenceGet your free ticket for Cobalt’s SecTalks: Leading with GRIT in Security to find out.

Similar shots
  • How to remove gmail account from android phone 2023 REMOVE GOOGLE ACCOUNT gmail smartphone
  • Google celebrates 50 years of email as Gmail reaches 3 bn users
News Archive
  • Patrick Gower
    Patrick Gower
    Patrick Gower: On Booze is not the alcohol documentary we need
    14 Jun 2022
    4
  • Myrtle Beach Classic
    Myrtle Beach Classic
    Chris Gotterup wins Myrtle Beach Classic, clinches spot in 2024 ...
    13 May 2024
    2
  • Canelo vs Charlo
    Canelo vs Charlo
    Canelo vs Charlo: Lions Only land 71 punches in 12 rounds ...
    1 Oct 2023
    6
  • Rita Lee
    Rita Lee
    Rita Lee, Brazil's Queen Of Rock And Os Mutantes Founder Dies ...
    10 May 2023
    2
  • Happy Lohri 2024
    Happy Lohri 2024
    Happy Lohri 2024: Wishes, Messages, Quotes, Images, Greetings ...
    13 Jan 2024
    6
This week's most popular shots