-
How CIS Can Help You Enact Defense-in-Depth in the Cloud
In a previous post, we introduced the concept of defense-in-depth and explained how it strengthens an enterprise’s security program against a Read More
-
Spaf on the Morris Worm
Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—35 years ago. His lessons from then are still applicable today. Read More
-
Google hopes to better fight malicious apps with real-time scanning on Android devices
Google has added a new real-time app scanning capability to Google Play Protect in order to help it better protect against malicious apps installed from outside the official app store. Read more in my article on the Tripwire State of Security blog. Read More
-
Cybersecurity hiring and retention challenges in 2023
Scott Scheppers, chief experience officer for AT&T Cybersecurity, weighs on how his team is addressing the cybersecurity talent shortage. This is part one of a two-part blog. The boundaries between the physical and digital worlds are decreasing. The Internet of things (IoT), artificial intelligence, blockchain technology, and virtual reality are buzzwords that have already made…
-
Veeam Patches Two Critical Bugs in Veeam ONE
Two flaws have near-maximum CVSS scores Read More
-
SIM Box Fraud to Drive 700% Surge in Roaming Scams
Juniper Research warns telcos they need bilateral agreements in place Read More
-
Critical Atlassian Bug Exploited in Ransomware Attacks
Attempts to deploy Cerber variant on Confluence servers Read More
-
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
In recent times, the humble password’s efficacy as a security measure has come under scrutiny. With tendencies to be easily guessed, stolen, or bypassed, passwords have been deemed inadequate for securing sensitive information. Thankfully, more secure alternatives have emerged, with terms such as “two-factor” and “multi-factor” authentication gaining traction. However, these terms may seem abstract…
-
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year. According to McAfee 2023 Consumer Mobile Threat Report, Clicker…
-
Russian National Sanctioned For Virtual Currency Money Laundering
Zhdanova reportedly utilized cash, international money laundering associates and businesses fronts Read More