Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Lateral movement to machines in the network After the initial infection with Cobalt Strike, we observed that the threat actor dropped node.exe, which is a stowaway proxy tool that is publicly available on Github. The tool is written in the GO language and can provide many capabilities to threat actors: remote shell execution, upload/downloading files, and more. In this case, the tool is used to provide a reverse shell to threat actors on IP: 45[.]32.108.54…

Read More

Access with Choice: Power Hybrid Work Your Way

Access with Choice: Power Hybrid Work Your Way

If you didn’t catch us in Las Vegas or online for this year’s Cisco Live, not to worry. Among a slew of exciting announcements to support our vision for hybrid work, we introduced new platform innovations for network management. One of the most exciting is Cloud Management for Catalyst, which combines the number one platform in cloud networks, Cisco Meraki, with the industry-leading Catalyst access portfolio. Now, Cisco customers have access to a more unified…

Read More

Why Multi-Factor Authentication is Key to Modern Cybersecurity

Why Multi-Factor Authentication is Key to Modern Cybersecurity

According to recent data from the Identity Theft Resource Center, there was a 14% increase in data breaches and compromises in the first quarter of 2022 compared to 2021. What’s more — this is the third consecutive year where breaches have increased in Q1. With cyberattacks becoming increasingly common, the importance of cybersecurity cannot be overstated. One of the best ways to ensure security? Multi-factor authentication, or MFA. Multi-factor authentication requires users to provide two…

Read More

Cybercriminals Use Azure Front Door in Phishing Attacks

Cybercriminals Use Azure Front Door in Phishing Attacks

Resecurity, Inc. (USA) has identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud CDN service provided by Microsoft. The identified resources in one of the malicious campaigns impersonated various services appearing to be legitimately created on the “azurefd.net” domain. This allows the bad actors to trick users and spread phishing content to intercept credentials from business applications and e-mail accounts. Notably, most phishing resources were designed to target SendGrid, Docusign…

Read More

IONOS Is Focusing on Four Pillars of Sustainability: Planet, People, Digital Responsibility, and Customer

IONOS Is Focusing on Four Pillars of Sustainability: Planet, People, Digital Responsibility, and Customer

“We want our customers to know that achieving zero carbon emissions isn’t our final goal, it’s just part of the journey. We want to continue improving the energy efficiency of our data centers, generate renewable energy on site, and integrate circular economy concepts into the lifecycle of our IT equipment and our operations. Corporate climate change discussions typically focus on customers, regulations, and efforts to reduce costs, which of course are all important. But it’s…

Read More

The Value of Automation Testing for Enterprises

The Value of Automation Testing for Enterprises

Enterprises that have adopted automation across their organizations—including development, IT operations, and business teams—often find it is difficult to scale their automations due to manual or old testing methods. This can create further delays that prevent the automations from scaling properly, thus defeating the purpose of many process automation and digital transformation efforts. In addition, software testing groups are often thought of as a cost center, rather than a group that can add value to…

Read More

PCI DSS v4.0: A Perspective from India

PCI DSS v4.0: A Perspective from India

  Nitin Bhatnagar: Hello, listeners. Welcome to Coffee with the Council, where we discuss what’s happening around the payment industry globally and bring a regional perspective to our audience. I’m your host, Nitin Bhatnagar, Associate Director of India for the PCI Security Standards Council. Today, we will be talking about PCI DSS v4.0, a perspective from India, with our special guests Swati Sharma, Leader, CISO Office, Amazon Pay; Dhananjay Khanna SVP and CISO of SBI…

Read More

Create the Talent of the Future

Create the Talent of the Future

Each year in June, the world celebrates World Refugee Day in honor of refugees and celebrating the strength and courage of people who have been forced to flee their home country to escape conflict or persecution. The year’s theme – whoever, wherever, whenever, everyone has the right to seek safety – really resonates with me. My grandmother was a refugee. In 1944, as the war waged in Europe and bombs dropped on the German city…

Read More

Developing Inclusive Teams

Developing Inclusive Teams

It is increasingly important for teams to embrace diversity, equity, and inclusivity. I hosted a panel discussion with Tony Colon, SVP, Cisco Customer & Partner Experience; Jeff Levensailor, Engineering Manager, Presidio; and Hoda Alshami, Technology Product Manager – Network Observability & Automation, Nationwide where we discussed, among other things, the importance of this critical topic. Bringing to the table ideas from people of different backgrounds helps in decision making, team planning, corporate strategy, and ultimately…

Read More

Unknown Hacker Steals $100m From California-Based Cryptocurrency Firm Harmony

Unknown Hacker Steals 0m From California-Based Cryptocurrency Firm Harmony

An unidentified hacker group has stolen more than $100m from Californian cryptocurrency firm Harmony. The company made the announcement last Thursday in a Twitter thread, saying they had identified a theft occurring on the Horizon bridge amounting to approximately $100m. “We have begun working with national authorities and forensic specialists to identify the culprit and retrieve the stolen funds,” reads the first Twitter post. Further, Harmony published the cryptocurrency address of the malicious actor and reassured customers the rest…

Read More
1 2,969 2,970 2,971 2,972 2,973 4,158