Defending manufacturing facilities from security threats

Defending manufacturing facilities from security threats

Defending manufacturing facilities from security threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Christmas came early – Log4Shell & mitigating open-source vulnerabilities

Christmas came early – Log4Shell & mitigating open-source vulnerabilities

Christmas came early – Log4Shell & mitigating open-source vulnerabilities | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Identifying solutions to enhance security

Identifying solutions to enhance security

Identifying solutions to enhance security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

The evolution of top corporate security leadership roles

The evolution of top corporate security leadership roles

The evolution of top corporate security leadership roles | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Leadership lessons across generations

Leadership lessons across generations

Leadership lessons across generations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Privacy in 2021: A Year Worth Reviewing | The State of Security

Privacy in 2021: A Year Worth Reviewing | The State of Security

With two new U.S. State privacy laws, new Standard Contractual Clauses out of the EU, more GDPR-style laws passed around the globe, and record data protection fines, 2021 provided plenty of fodder for an end-of-year review. U.S. Domestic: A Summary Despite a growing consensus on the need for comprehensive privacy in the United States, lawmakers once again failed to make meaningful headway on the matter. While this might have been expected given the Biden administration’s…

Read More

Cryptojacking Attacks Target Alibaba ECS Instances

Cryptojacking Attacks Target Alibaba ECS Instances

Cryptojacking Attacks Target Alibaba ECS Instances Workload Security Discover how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. By: Alfredo de Oliveira February 04, 2022 Read time:  ( words) Cryptojacking attacks continue to increase. Unlike ransomware, cryptojacking cybercriminals make their money staying silent and undetected, leeching the computer power from their target to mine valuable cryptocurrency. Cryptomining can cause serious downtime for developers by draining the enterprise’s processing…

Read More

Why Cyber Change Outpaces Boardroom Engagement

Why Cyber Change Outpaces Boardroom Engagement

Humans are addicted to stories. But sometimes the stories we tell are overly simplistic. In cybersecurity, a recurring narrative is one of C-suite executives perpetually at odds with IT leaders. They’re disinterested in what the security team does, and release funds begrudgingly and often reactively once a serious incident has occurred. This leads to mounting cyber risk, and an increasing likelihood that the organization will suffer serious reputational and financial damage stemming from future incidents—or…

Read More

This Week in Security News – February 4th, 2022

This Week in Security News – February 4th, 2022

Read on:  The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It An earlier version of an out-of-bounds (OOB) vulnerability in Samba was disclosed via Trend Micro Zero Day Initiative’s (ZDI) Pwn2Own Austin 2021. While we have not seen any active attacks exploiting this vulnerability, CVE-2021-44142 received a CVSS rating of 9.9 out of the three variants reported. If abused, this security gap can be used by remote attackers to execute arbitrary code as…

Read More

Using the seq command to generate numeric sequences

Using the seq command to generate numeric sequences

The seq command is handy for generating number sequences on Linux. It requires at least one number as an argument and, given that, it will provide all the numbers from 1 to whatever number you specify. However, that’s just the command’s simplest use. With additional arguments, seq can be surprisingly useful, especially when you use the generated numbers to drive a loop or do a calculation. The seq command below illustrates the most basic use…

Read More
1 3,220 3,221 3,222 3,223 3,224 4,025