News
-
#RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds
A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors’ favorite initial access vectors Read More
-
New Attack on VPNs
This attack has been feasible for over two decades: Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering. TunnelVision, as the researchers have named their attack, largely negates…
-
Ransomware Strikes Wichita, Services Disrupted
Online payment systems, such as those for water bills and court citations, are still offline Read More
-
LockBit Leader aka LockBitSupp Identity Revealed
Russian national Dmitry Yuryevich Khoroshev is behind the LockBitSupp persona, law enforcement revealed Read More
-
#RSAC: Three Battle-Tested Tips for Surviving a Cyber-Attack
CISOs share their experience of managing real-life cyber incidents provide their recommendations to survive cyber-attacks Read More
-
CIS Benchmarks Community Volunteer Spotlight: Bruce Bading
CIS relies on a global community of IT security professionals to ensure that the CIS Benchmarks provide independent, vendor-agnostic security guidance. These volunteers provide their expertise for the benefit of all those who seek to use the internet to interact with the world safely and securely online. Bruce F. Bading, President, BFB Consulting, Inc., has…
-
Report Shows AI Fraud, Deepfakes Are Top Challenges For Banks
Mitek surveyed 1500 financial services risk and innovation professionals in UK, US and Spain Read More
-
How to Report Identity Theft to Social Security
In the hands of a thief, your Social Security Number is the master key to your identity. With a Social Security Number (SSN), a thief can unlock everything from credit history and credit line to tax refunds and medical care. In extreme cases, thieves can use it to impersonate others. So, if you suspect your number is lost or stolen, it’s important to report identity theft to Social Security right away. Part of what makes an…
-
CIS Controls Volunteer Spotlight: Randy Marchany
Randy Marchany has been a CIS Controls Community member since the beginning. Hear what he’s learned in his 24 years of volunteering with CIS. Read More
-
2024 Cyber Resilience Research Reveals a Complex Terrain
New data helps business leaders understand how and why to prioritize resilience. In the ever-evolving landscape of digital innovation, businesses find themselves at the intersection of progress and peril. The data reveals that the tradeoffs are not just dramatic, but they also put the organization at significant risk. One of the primary obstacles is the…