News

  • Real-time is where the cybersecurity risk is

    PRIVACY PRIVACY I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The truth is, that type of statement may illustrate a control weakness, but unless the unwanted outcome is a ding in an audit report where MFA is required, that…

    Read More

  • 5 ways to improve security hygiene and posture management

    PRIVACY PRIVACY As management guru Peter Drucker famously said: ‘You can’t manage what you can’t measure.’  That’s certainly true when it comes to security hygiene and posture management. Organizations must know what assets are deployed on the external/internal attack surface, understand the state of these assets, identify exposures, prioritize remediation actions based on risk, and…

    Read More

  • What is a botnet? When infected devices attack

    PRIVACY PRIVACY Botnet definition A botnet is a collection of internet-connected devices that an attacker has compromised to carry out DDoS attacks and other tasks as a swarm. The idea is that each computer becomes a mindless robot in a larger network of identical robots, which gives the word botnet its meaning. “Malware infects an…

    Read More

  • Jail Releases 300 Suspects Due to Computer “Glitch”

    PRIVACY PRIVACY Outage caused by system update disrupts processing of defendants in Texas county Read More

    Read More

  • Fortinet tightens integration of enterprise security, networking controls

    PRIVACY PRIVACY Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software. Read More

    Read More

  • Cadbury Warns of Easter Egg Scam

    PRIVACY PRIVACY Cyber-criminals target sweet-toothed consumers with fake Easter Egg hunt scam Read More

    Read More

  • The Russian cyberattack threat might force a new IT stance

    PRIVACY PRIVACY With the threat of Russian cyberattacks still with us, companies need to be on a war footing when it comes to security. Read More

    Read More

  • Activist Admits Shutting Down California County’s Website

    PRIVACY PRIVACY Commander X attacked Santa Cruz County government’s site during no-camping law protest Read More

    Read More

  • Wyze Camera Vulnerability

    PRIVACY PRIVACY Wyze ignored a vulnerability in its home security cameras for three years. Bitdefender, who discovered the vulnerability, let the company get away with it. In case you’re wondering, no, that is not normal in the security community. While experts tell me that the concept of a “responsible disclosure timeline” is a little outdated…

    Read More

  • JavaScript supply chain issues

    PRIVACY PRIVACY In open source we trust JavaScript code—used in 98% of all global websites–is a notable contributor to the ongoing software supply chain attack problems. In fact, vulnerable or malicious JavaScript is likely responsible for a sizable portion of the increase in attacks during 2021. With much of the JavaScript code that drives websites…

    Read More

News, Advisories and much more

Exit mobile version