Poor Identity Management Amplifies Ransomware

Poor Identity Management Amplifies Ransomware

By David Mahdi, Chief Strategy Officer and CISO Advisor, Sectigo While ransomware is malware, security leaders must go beyond legacy anti-malware approaches to mitigate risk. Ransomware is a data-centric threat; that is, ransomware preys on corporate data. Cunning and successful ransomware attacks hijack user access with an aim to encrypt sensitive files, stealing data. So, if ransomware is all about the data and the hijacking of user access to get to the data, then the…

Read More

3 Ways Cisco is Redefining the Summer Internship

3 Ways Cisco is Redefining the Summer Internship

This post was authored by Kat Falcinelli, a recent marketing intern on our Global Events TechX team. To my Gen Z peers entering the work world: If you, too, feel disillusioned by the “all talk, no action” companies hiring interns, I ask you to hear me out! Coming of age in the wake of the Great Resignation and the Covid-19 pandemic, I was inherently skeptical of what the corporate ladder had to offer. However, that…

Read More

New Spear Phish Methodology Relies on PuTTY SSH Client to Infect Systems

New Spear Phish Methodology Relies on PuTTY SSH Client to Infect Systems

Hackers associated with North Korea are using trojanized versions of the PuTTY SSH open-source terminal emulator to install backdoors on victims’ devices. Discovered by Mandiant, the threat actor responsible for this campaign would be ‘UNC4034’ (also known as Temp.Hermit or Labyrinth Chollima). “Mandiant identified several overlaps between UNC4034 and threat clusters we suspect have a North Korean nexus,” reads an advisory published by the company on Wednesday. The campaign, trying to trick victims into clicking on…

Read More

Information Warfare and What Infosec Needs to Know

Information Warfare and What Infosec Needs to Know

By Wasim Khaled, Co-Founder and CEO, Blackbird.AI Cyberthreats are growing more sophisticated by the day, which in terms means cyber is at the top of every CIOs list. Known as Information Warfare (IW), it is the evolution of cybersecurity which now includes misinformation, disinformation, and mal-information (MDM). It is an imminent cybersecurity threat and the cost of being unable to detect and shut down known and unknown threats can cost large organizations potentially millions of…

Read More

CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws

CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has added six known flaws to its Known Exploited Vulnerabilities Catalog on September 15, 2022. “These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose a significant risk to the federal enterprise,” the Agency wrote. The six issues include three that affect the Linux kernel, one in the Code Aurora ACDB audio driver (which is present in third-party products including Qualcomm and Android),…

Read More

Become an ethical hacker online

Become an ethical hacker online

Get nine bundled courses on white hat hacking for just $34. Image: StackCommerce IT teams in every industry struggle with all kinds of issues, from continuous deployment to asset management, but no issue is as significant as cybersecurity. Companies of all sizes are putting an emphasis on cybersecurity as cybercriminals get more sophisticated and adept at stealing information. Whether you’re running a business worried about cybercrime or looking to earn some more money, becoming an…

Read More

Cisco U. Inclusive Learning, Delivered

Cisco U. Inclusive Learning, Delivered

We recently introduced Cisco U., one of our newest learning initiatives, at Cisco Live. Cisco U. promises to meet the diverse global community through an inclusive digital learning experience. If you’re wondering what that means, well, I’m so glad. Inclusive learning is something that is a huge priority for me on a personal level. And as a member of the product team for Cisco U., I find myself uniquely positioned to explain how Cisco U….

Read More

Limitations of automation orchestrators and the rise of automation optimization

Limitations of automation orchestrators and the rise of automation optimization

Without a doubt, one of the key drivers of the Fourth Industrial Revolution is Robotic Process Automation (RPA). Organizations worldwide have increasingly leveraged RPA technology and are now adopting multi-vendor strategies for a multitude of enterprise automation tools, beyond RPA. From recent conversations with the VOCAL Council, I estimate that almost 40% of the nearly 40,000 customers using RPA are deploying a multi-vendor strategy. RPA tools have evolved from simple bots that automate single, micro…

Read More

Uber investigating security breach of several internal systems

Uber investigating security breach of several internal systems

Image: Adobe Stock Must-read security coverage Ride-sharing company Uber suffered a security breach Thursday, Aug. 15, that forced the company to shut down several internal communications and engineering systems. The company confirmed the incidents in a Twitter post, saying officials have been in touch with law enforcement, and The New York Times reported that a person claiming responsibility for the hack sent images of emails, cloud storage and code repositories to cybersecurity researchers and the…

Read More

70% of legal departments don’t invest in digital transformation: Report

70% of legal departments don’t invest in digital transformation: Report

More than 70% of US legal departments across enterprises spanning various industry sectors have not made any investment towards digital transformation in the last two years, according to a joint report from The Association of Corporate Counsel (ACC) and legal-technology company Disco. The report captures insights from a survey of 278 law department leaders and legal operations professionals and shows that larger companies were more open to transformation initiatives than smaller ones. Survey respondents from…

Read More
1 2,749 2,750 2,751 2,752 2,753 4,149