The Key Challenges for Cybersecurity Professionals Going into 2022

The Key Challenges for Cybersecurity Professionals Going into 2022

Tripwire recently conducted a series of surveys and interviews to understand IT professionals who manage security for their company. The cybersecurity landscape is constantly changing, new challenges are rapidly emerging, and new threats have surfaced, especially throughout the pandemic. We were curious to know some of the struggles that security professionals experience as a part of their job. We were especially interested in small to mid-size companies, entities which often don’t have the necessary budgets…

Read More

Priorities for retail security heading into 2022 – Cisco Blogs

Priorities for retail security heading into 2022 – Cisco Blogs

More than two-thirds of U.S.-based retailers said that the COVID-19 pandemic increased risks for their organizations in 2020 and even as shoplifting rates decreased in 2021, the retail shrink rate remained steady at a 5-year high of 1.62%. In the past year, loss prevention teams have had to adapt to new priority concern areas while 44% of retailers allocated more budget to loss prevention. So, what have been the top concerns in retail security from…

Read More

Patch Now Apache Log4j Vulnerability Called Log4Shell Actively Exploited

Patch Now Apache Log4j Vulnerability Called Log4Shell Actively Exploited

A vulnerability in Apache Log4j, a widely used logging package for Java has been found. The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell. It was first reported privately to Apache on November 24 and was patched with version 2.15.0 of Log4j on December 9. It affects Apache Struts, Apache Solr, Apache Druid, Elasticsearch, Apache Dubbo, and VMware…

Read More

A Look Into Purple Fox’s Server Infrastructure

A Look Into Purple Fox’s Server Infrastructure

Operating system execution via SQL Server Purple Fox focuses on SQL servers as its target as opposed to normal computers for the former’s cryptocurrency-mining activities. This is mainly because of the more powerful hardware configuration — for both CPU and memory — that the servers would usually have. More specifically for SQL servers, the combination of CPU, memory, and disk factors should scale with the database-related operations to avoid bottlenecks in performance. These machines normally…

Read More

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape

Why You Need XDR in Today’s Threat Landscape Detection and Response Trend Micro’s VP of Threat Intelligence, Jon Clay, explores the latest trends in today’s threat landscape and why XDR is key to enabling more resilience. By: Jon Clay December 13, 2021 Read time:  ( words) I’m proud to share the Forrester New Wave™: for Extended Detection and Response (XDR) that named Trend Micro a Leader in both current offerings and strength of strategy. I’d…

Read More

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

As organizations around the world scramble to address the critical Log4j vulnerability, known as Log4Shell, the number one question on every security leader’s mind is: How do I know if I have this out there? The sheer ubiquity of Apache Log4j, an open-source logging framework, makes this a particularly challenging question to answer. Not only do many organizations use Log4j in their own source code, it’s also used in many of the products these organizations…

Read More

Microsoft: Log4j exploits extend past crypto mining to outright theft

Microsoft: Log4j exploits extend past crypto mining to outright theft

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more Microsoft said Saturday that exploits so far of the critical Apache Log4j vulnerability, known as Log4Shell, extend beyond crypto coin mining and into more serious territory such as credential and data theft. The tech giant said that its threat intelligence teams have been tracking attempts to exploit the…

Read More

Apache Log4j 2 CVE-2021-44228 – Docker Blog

Apache Log4j 2 CVE-2021-44228 – Docker Blog

We know that many of you are working hard on fixing the new and serious Log4j 2 vulnerability CVE-2021-44228, which has a 10.0 CVSS score. We send our #hugops and best wishes to all of you working on this vulnerability, now going by the name Log4Shell. This vulnerability in Log4j 2, a very common Java logging library, allows remote code execution, often from a context that is easily available to an attacker. For example, it…

Read More

VMSA-2021-0028 & Log4j: What You Need to Know

VMSA-2021-0028 & Log4j: What You Need to Know

VMware has released a new critical security advisory, VMSA-2021-0028, in response to the industry-wide issue regarding the open source Apache Software Foundation log4j Java logging component, which was discovered to have a critical vulnerability (CVE-2021-44228). Because the log4j component is used by many vendors and software packages, this needs your immediate attention, not just at the VMware product level, but also for all other software in your environment. Because of the ubiquity of the log4j…

Read More

December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

Authored by: Gary Miliefsky of Cyber Defense Magazine Deep fake, dropped USB sticks, free offers, vishing, smishing and deep phishing attacks, smart-everything (weak IoT devices), malicious apps, driveby malware, distributed denial of service attacks and so much more abound in our world – my team and yours is bombarded with this garbage, on a daily basis.  There is one purpose – steal data.  They want identities and they want money.  It’s that simple.  If we…

Read More
1 3,142 3,143 3,144 3,145 3,146 3,825