Crypto Dev Gets Five Years for Helping North Korea Evade Sanctions

Crypto Dev Gets Five Years for Helping North Korea Evade Sanctions

A noted Ethereum developer has been sentenced to more than five years behind bars after pleading guilty to helping North Korea evade sanctions. Virgil Griffith, 39, initially pleaded not guilty back in January 2020, following his arrest at Los Angeles International Airport in November 2019. However, he changed that plea last year. He conspired to provide technical advice to the hermit kingdom on how to circumvent sanctions by using cryptocurrency and blockchain technology, according to the…

Read More

April Records First Patch Tuesday of 2022 to Top 100 CVEs

April Records First Patch Tuesday of 2022 to Top 100 CVEs

Sysadmins will have a busy time ahead after Microsoft published fixes for over 100 CVEs this month, including two zero-day bugs. April’s Patch Tuesday saw patches released for 119 vulnerabilities in total. The two publicly disclosed prior to Tuesday were CVE-2022-24521, a bug in the Windows Common Log File System Driver (CLFS) reported by the NSA. Already exploited in the wild, the vulnerability has a CVSS score of 7.8 and could allow privilege escalation. The CLFS…

Read More

Tripwire & FoxGuard: Patching for compliance and security

Tripwire & FoxGuard: Patching for compliance and security

There’s a saying in the cybersecurity community which states that just because you are compliant doesn’t mean that you are secure. Over the years, many images have been used to illustrate the point. One memorable image is that of a nude bicyclist wearing a helmet. By all standards, that is the epitome of “compliant, but not secure”.  Many organizations have shifted the focus away from merely achieving compliance, to being both compliant and secure. Security is often more difficult…

Read More

RSA Conference 2022 product preview

RSA Conference 2022 product preview

RSA Conference 2022 product preview | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

4 must-have SaaS security posture management capabilities

4 must-have SaaS security posture management capabilities

4 must-have SaaS security posture management capabilities | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Developing an effective cybersecurity workforce

Developing an effective cybersecurity workforce

Developing an effective cybersecurity workforce | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Strategies for dealing with the enterprise technology skills crisis

Strategies for dealing with the enterprise technology skills crisis

Australia is facing a technology skills crisis. Enterprises everywhere are having trouble finding the people they need to carry out key roles in their IT departments in just about every discipline, from data analytics to cloud computing and cyber security. A February 2021 report by RMIT Online with Deloitte Access Economics claimed that Australia needs 156,000 new technology workers with 87% of jobs requiring digital skills. Further, more than half of the Australian working professionals…

Read More

Improve Data Security Through Automation

Improve Data Security Through Automation

Human error is endemic to data breaches. Process automation can minimize the risk. By Gregory Hoffer, CEO, Coviant Software Human error is the most common cause of a data breach, and it’s not even close. A 2020 study by Stanford University found that an astounding 88% of data breaches involved human error. Whether as a root cause or as a critical component in a chain of events, somewhere along the line a human being took…

Read More

Cybersecurity Basics: Authentication and Authorization

Cybersecurity Basics: Authentication and Authorization

What is identity and access management? Identity and access management (IAM) ensures the right people in the right job roles can access the tools, systems, and services absolutely necessary to do their jobs. It is part of the foundation to a strong zero trust approach that answers two fundamental questions you should be asking about every solution you build: who is that and what have we allowed them to do? The “Who” Determining who you…

Read More

VERT Threat Alert: April 2022 Patch Tuesday Analysis | The State of Security

VERT Threat Alert: April 2022 Patch Tuesday Analysis | The State of Security

Tag CVE Count CVEs Windows File Explorer 1 CVE-2022-26808 Windows Upgrade Assistant 1 CVE-2022-24543 Windows Work Folder Service 1 CVE-2022-26807 Windows Fax Compose Form 3 CVE-2022-26916, CVE-2022-26917, CVE-2022-26918 Windows iSCSI Target Service 1 CVE-2022-24498 Microsoft Local Security Authority Server (lsasrv) 1 CVE-2022-24493 Windows Installer 2 CVE-2022-24530, CVE-2022-24499 Visual Studio 3 CVE-2022-24513, CVE-2022-24765, CVE-2022-24767 Windows Common Log File System Driver 2 CVE-2022-24521, CVE-2022-24481 Windows Ancillary Function Driver for WinSock 1 CVE-2022-24494 Microsoft Windows ALPC 2 CVE-2022-24482,…

Read More
1 3,128 3,129 3,130 3,131 3,132 4,113