An In-Depth Look at ICS Vulnerabilities Part 1

An In-Depth Look at ICS Vulnerabilities Part 1

In 2021, there were significant changes in the methods used by cyber attackers. More advanced destructive supply chain attacks also came to the surface this year. This has created an anxious environment, driving developments in cyber defense and the discovery of ICS-related CVEs. 2021’s timeline overview of major OT and ICS cyber incidents shows that modern criminal operations have become so developed that a service industry has emerged with a common business model – Ransom­ware-as-a-Service…

Read More

Troubleshooting puzzle: What caused the streaming to degrade?

Troubleshooting puzzle: What caused the streaming to degrade?

You’ve just been given the task of solving a network problem that has been unresolved for many months. Where do you start? Is it a solvable problem or is it just the way the network works? Maybe you’ve encountered a limitation on how network protocols function. What follows is an account of just such a problem that stumped many good network engineers for months and how it was resolved by NetCraftsmen’s Samuel Bickham. It may…

Read More

5 Types of Costly Data Waste and How to Avoid Them

5 Types of Costly Data Waste and How to Avoid Them

Do you know someone who bought a lot of fancy exercise equipment but doesn’t use it? Turns out, exercise equipment doesn’t provide many benefits when it goes unused. The same principle applies to getting value from data. Organizations may acquire a lot of data, but they aren’t getting much value from it. This is a widespread issue that cuts across different sectors. It is estimated that nearly 75% of the data that enterprises collect remains…

Read More

CIO exit interview: Steve Hodgkinson, Victoria Department of Health

CIO exit interview: Steve Hodgkinson, Victoria Department of Health

It’s been seven years since Steve Hodgkinson began the task of leading complex digital transformation programs at the Victoria Department of Health as CIO. “Seven years is a long time in the CIO game,” Hodgkinson says, “so I think it’s time to step aside and let somebody else lead the next phase of the digital transformation journey for the Department of Health. The department is charting a new way forward, changing gears on the COVID-19…

Read More

CCIE Labs Take a Big Step Forward as BYOD Expands Mobile Lab Footprint – Cisco Blogs

CCIE Labs Take a Big Step Forward as BYOD Expands Mobile Lab Footprint – Cisco Blogs

The CCIE certification is one of the most prestigious marks of achievement in IT, evolving over the years to address the needs of both the IT landscape and CCIE candidates. At the forefront of every change is our unwavering commitment to deliver lab exams at the same standard and rigor for which the CCIE is known. And as we face new challenges that have led us to a new normal, our CCIE program has evolved…

Read More

Cr8escape: How Tenable Can Help (CVE-2022-0811)

Cr8escape: How Tenable Can Help (CVE-2022-0811)

CrowdStrike discloses container escape vulnerability affecting CRI-O for Kubernetes. Here’s how Tenable.cs can help you detect vulnerable pods. Background On March 15, CrowdStrike published technical details and a proof-of-concept for CVE-2022-0811, a vulnerability they have named cr8escape, in the CRI-O Container Engine for Kubernetes. CRI-O is an open source container runtime engine that is used to share kernel resources among applications running on a container node. There have not been any reported exploitations in the…

Read More

Aruba service overlays existing infrastructure with virtual networks

Aruba service overlays existing infrastructure with virtual networks

Aruba Networks is expanding its Edge Services Platform to better manage and automate the operation of far-flung distributed enterprise networks. Hewlett Packard Enterprise’s network subsidiary rolled out NetConductor, a cloud-based service that Aruba says will help enterprises centrally manage the security of distributed networks while simplifying policy provisioning and automating the orchestration of network configurations in wired, wireless, and WAN infrastructures. NetConductor is a service delivered by Aruba Central, the vendor’s core cloud-based management platform…

Read More

Secure Your Seat at Automation Developer Days

Secure Your Seat at Automation Developer Days

Register here We are happy to announce that Automation Developer Days is open for registration. The event, formerly known as NSO Developer Days has a new name to reflect that NSO (Network Services Orchestrator)  is part of a broader Network Automation suite.  Kevin Wollenweber, VP/GM of the Mass-scale Infrastructure Routing and Automation team, will kick off the event by reinforcing the importance of Automation for Cisco going forward. Before diving into the technical deep dives,…

Read More

Assessing the Real-World Environmental Impact of Routers – Cisco Blogs

Assessing the Real-World Environmental Impact of Routers – Cisco Blogs

Power claims for networking equipment are often difficult to understand. It’s not always clear whether chip, card, or system power is being stated and what conditions were used for the evaluation. If we’re going to pursue more energy-efficient routers and switches, we need to understand what that really means. Let’s take a step back and consider a better way of keeping score. In my opinion – and hopefully soon yours too – these are the…

Read More

Anomali Cyber Watch: North Korean APTs Used Chrome Zero-Day, Russian Energy Sector SCADA Targeting Unsealed, Lapsus$ Breached Microsoft – Finally Arrested, and More

Anomali Cyber Watch: North Korean APTs Used Chrome Zero-Day, Russian Energy Sector SCADA Targeting Unsealed, Lapsus$ Breached Microsoft – Finally Arrested, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Data leak, Drive-by, ICS, Spearphishing, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News…

Read More
1 3,147 3,148 3,149 3,150 3,151 4,093