Tripwire Patch Priority Index for July 2022 | The State of Security

Tripwire Patch Priority Index for July 2022 | The State of Security

Tripwire’s July 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe. First on the patch priority list this month are patches that resolve 2 vulnerabilities in Edge. Next is a patch that resolves a security feature bypass vulnerability in Office. Up next are patches for Adobe Reader and Acrobat that resolve 22 issues including arbitrary code execution and memory leak vulnerabilities. Up next are patches that affect components of the Windows…

Read More

UK’s Top 10 Universities Failing on DMARC

UK’s Top 10 Universities Failing on DMARC

The UK’s top 10 universities and most of the leading educational institutions in the US and Australia are failing to protect their staff and students from email-borne threats, according to Proofpoint. The security vendor assessed each of the leading 10 universities in each country for their DMARC policy, and found 97% across all regions are failing to actively block fraudulent emails from reaching recipients. The figure rose to 100% in the UK. Whilst not a…

Read More

Proofpoint: 97% of top universities in the US, UK and Australia putting students, staff, and stakeholders at risk of being impersonated by cybercriminals | Proofpoint US

Proofpoint: 97% of top universities in the US, UK and Australia putting students, staff, and stakeholders at risk of being impersonated by cybercriminals | Proofpoint US

Proofpoint, Inc., a leading cybersecurity and compliance company, today released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, subjecting students, staff and stakeholders to higher risks of email-based impersonation attacks. Proofpoint’s research found that 97% of the top ten universities [1] across each country are not taking appropriate measures to proactively block attackers from spoofing their email domains, increasing the risk…

Read More

Exploring ESG Through a GRC Lens | The State of Security

Exploring ESG Through a GRC Lens | The State of Security

Oftentimes, three-letter acronyms trend and become buzzwords. At other times, they act as catalysts by influencing the business environment in which an organization operates. Such acronyms include CSR (corporate social responsibility), GRC (governance, risk, and compliance), and the most recent one, ESG (environmental, social, and governance). These are important business concepts that drive investment considerations and organizations’ cybersecurity commitments to customers. A common factor amongst CSR, GRC, and ESG is the role of governance in…

Read More

Arista buys software-defined networking pioneer Pluribus

Arista buys software-defined networking pioneer Pluribus

Arista Networks has acquired Pluribus Networks with an eye toward bolstering its own Unified Cloud Networking service. There were no details such as cost of the acquisition nor what the deal means for the 140 Pluribus employees most based in Los Altos, Calif.   Pluribus is a software-defined networking pioneer, founded in 2010 and has morphed its original Netvisor One, a virtualized Linux-based NOS that provides Layer 2 and Layer 3 networking and distributed fabric…

Read More

Arista snaps-up software defined networking pioneer Pluribus

Arista buys software-defined networking pioneer Pluribus

Arista Networks has acquired Pluribus Networks with an eye toward bolstering its own Unified Cloud Networking service. There were no details such as cost of the acquisition nor what the deal means for the 140 Pluribus employees most based in Los Altos, Calif.   Pluribus is a software-defined networking pioneer, founded in 2010 and has morphed its original Netvisor One, a virtualized Linux-based NOS that provides Layer 2 and Layer 3 networking and distributed fabric…

Read More

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant This blog entry offers a technical analysis of a new SolidBit variant that is posing as different applications to lure gamers and social media users. The SolidBit ransomware group appears to be planning to expand its operations through these fraudulent apps and its recruitment of ransomware-as-a-service affiliates. By: Nathaniel Morales, Ivan Nicole Chavez, Monte de Jesus, Lala…

Read More

Dark Web credit card fraud less pervasive but still an ongoing problem

Dark Web credit card fraud less pervasive but still an ongoing problem

Credit cards with security chips have helped cut down on Dark Web sales of stolen card data, but the problem persists, especially in the U.S., says Cybersixgill. Image: Adobe Stock Stolen credit card data is always a hot item for sale on the Dark Web, particularly if the package includes not just the card number but the expiration date and CVV code. To crack down on fraud, card vendors have long since turned away from…

Read More

Getting a business grip on security frameworks

Getting a business grip on security frameworks

Trying to explain secure access service edge (SASE pronounced ‘sassy’) and zero trust can be exasperating when you’re making the case for business leaders to invest in new products and infrastructure. The onus is on IT leaders to focus top executives on the business benefits these technology concepts entail and how they will advance the cause of enterprise security. Both SASE and zero trust are fast-evolving security concepts, creating somewhat of a moving target. Vendors…

Read More

Get Hands-on with the Meraki API in the DevNet Sandbox

Get Hands-on with the Meraki API in the DevNet Sandbox

One of the strongest components of the Meraki platform is the consistent and simplified operational management of the network. The modern API, as an extension to the cloud managed service, makes it amazingly simple to programmatically control and manage all aspects of your network. There are customers that fully automate the onboarding of devices via the Meraki portal using routine automation scripts. Or, front-end systems or operational teams with lookup tools that pull analytics or…

Read More
1 2,804 2,805 2,806 2,807 2,808 4,084