Protecting against Windows privilege escalation tactics and techniques

Protecting against Windows privilege escalation tactics and techniques

Protecting against commonly utilized windows privilege escalation tactics and techniques | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Top 5 Infrastructure as Code (IaC) Security Challenges

Top 5 Infrastructure as Code (IaC) Security Challenges

Infrastructure as code (IaC), an essential component of contemporary software, enables developers to spin up software infrastructure while offering systems the ability to grow in a flexible and on-demand manner. Tools that make these configurations based on a programmatic method fall under the category of IaC, including: AWS CloudFormation Azure Resource Manager Helm Charts Progress Chef Puppet Red Hat Ansible Terraform IaC has altered the process of deploying environments for online services and applications. Rather…

Read More

The CIO’s Triple Play: Cyber Resilience, Performance, and AIOps/DevOps

The CIO’s Triple Play: Cyber Resilience, Performance, and AIOps/DevOps

CIOs of large enterprises have pain points that are complex, underscoring the need for suppliers to listen intently and understand their predicaments. The challenges of managing data, the lifeblood of any enterprise, are continuously evolving and require attention because ignoring them only makes the “pain points” worse. CIOs and their teams look to the tech industry to solve their problems, develop new, cost-effective technology solutions, and make implementation of new solutions smooth and easy, with…

Read More

Healthcare Provider Exposed Transplant Donor and Recipient Data

Healthcare Provider Exposed Transplant Donor and Recipient Data

The Virginia Commonwealth University Health System (VCU) has warned almost 4500 transplant participants about a privacy breach affecting their healthcare information. The company warned that some transplant recipients’ medical records contained their donor’s information, while recipient information also showed up in some donors’ records. It has been inappropriately exposing this information since 2006 in some cases. Information available included names, Social Security numbers, lab results, medical record numbers, the dates of medical procedures and dates…

Read More

1.9 Million Healthcare Records Breached in Ransomware Attack

1.9 Million Healthcare Records Breached in Ransomware Attack

US debt collector Professional Finance Company (PFC) has reported a data breach affecting 1.9 million individuals across over 650 different healthcare providers. The Colorado-based company, which chases outstanding debts for healthcare companies, said that an unauthorized intruder accessed personal data including names, addresses, amount owing, and information regarding payments made to accounts. Some individuals also had their social security number, date of birth, and health insurance and medical treatment information exposed, it warned. The company…

Read More

Chinese hackers targeted U.S. reporters days before Jan. 6: Report

Chinese hackers targeted U.S. reporters days before Jan. 6: Report

A Chinese hacking group that’s believed to have “strategic espionage objectives” targeted American journalists and media organizations in the days leading up to the January 6, 2021, riots at the U.S. Capitol, according to a Thursday report from cybersecurity firm Proofpoint. Proofpoint said its researchers found evidence that an “advanced persistent threat” (APT) actor group from China hit U.S.-based journalists in early 2021 with “numerous reconnaissance phishing campaigns.” The firm also stated it uncovered hacking…

Read More

Protecting Data in the Cloud: Multi-Layered DLP Technologies are Critical

Protecting Data in the Cloud: Multi-Layered DLP Technologies are Critical

By Thyaga Vasudevan, VP of Product Management, Skyhigh Security As enterprises consider adoption of security service edge (SSE) solutions, they are raising questions about how best to secure data that touches the cloud in any way – whether data is accessed by or stored in websites, Software-as-a-Service (SaaS) applications, or private applications that reside in the cloud. When evaluating SSE vendors, it’s critical to ensure their cloud-delivered security services provide consistent and unified data protection….

Read More

CISOs rank their top security priorities through 2025

CISOs rank their top security priorities through 2025

CISOs rank their top security priorities through 2025 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

BlackCat Ransomware Group Deploys Brute Ratel Pen Testing Kit

BlackCat Ransomware Group Deploys Brute Ratel Pen Testing Kit

The BlackCat ransomware group has deployed a new binary to help with its intrusion efforts, according to security company Sophos. The company has discovered it is using Brute Ratel, a penetration testing suite that includes remote access features for attackers. Several Sophos customers have called the company out to investigate BlackCat ransomware infections. The new analysis found the group is exploiting unpatched firewalls and VPNs to internal systems. The attackers used vulnerabilities reported as early as 2018 to read…

Read More

Cyberinsurers looking for new risk assessment models

Cyberinsurers looking for new risk assessment models

As ransomware attacks increase, a number of difficulties have risen for cyberinsurers that will need to be addressed swiftly. Image: Adobe Stock The ever-increasing number of ransomware attacks has created a quandary for those in the cyberinsurance industry. With premiums skyrocketing, coverage being limited and insurers struggling to earn revenue because of the cost and growing number of claims, something has to give. Due to these factors, organizations are searching for new methods of risk…

Read More
1 2,835 2,836 2,837 2,838 2,839 4,072