Microsoft issues a fix for on-prem Exchange mail servers

Microsoft issues a fix for on-prem Exchange mail servers

Microsoft Exchange admins got a bit of a rude surprise as the new year rang in, with a “latent date issue” striking the on-premises versions of Exchange Server 2016 and 2019 that saw emails queued up instead of being distributed to inboxes. The problem lay with Exchange’s malware scanning engine, however, Microsoft took great pains to emphasize in a blog post from the Exchange team that the problem relates to a date-check failure with the…

Read More

3 types of edge-gateway vendors

3 types of edge-gateway vendors

As the enterprise edge expands to encompass everything from the factory floor and oil rigs to solar arrays and retail stores, overcoming the challenges of processing, managing, and securing data traffic close to the source has become a top priority for many organizations. Enter edge gateways. These devices process data from sensors, monitors, industrial controllers, and other devices at the edge, passing only actionable information over the WAN to cloud and enterprise data centers while…

Read More

Fractured edge-gateway market starts to heat up

3 types of edge-gateway vendors

As the enterprise edge expands to encompass everything from the factory floor and oil rigs to solar arrays and retail stores, overcoming the challenges of processing, managing, and securing data traffic close to the source has become a top priority for many organizations. Enter edge gateways. These devices process data from sensors, monitors, industrial controllers, and other devices at the edge, passing only actionable information over the WAN to cloud and enterprise data centers while…

Read More

Anomali Cyber Watch: $5 Million Breach Extortion, APTs Using DGA Subdomains, Cyberespionage Group Incorporates A New Tool, and More

Anomali Cyber Watch:  Million Breach Extortion, APTs Using DGA Subdomains, Cyberespionage Group Incorporates A New Tool, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Cyberespionage, Data breach, DGA, Infostealer, Phishing, Rootkit, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending…

Read More

Morgan Stanley Agrees to Data Breach Settlement

Morgan Stanley Agrees to Data Breach Settlement

American multinational investment bank and financial services company Morgan Stanley has agreed to pay $60m to settle a legal claim over data security. A class-action lawsuit was filed against the company in July 2020 over two security breaches that compromised the personal data of approximately 15 million of its customers. The suit alleges that Morgan Stanley failed to safeguard the personally identifiable information (PII) of its current and former clients. According to the plaintiffs, data center equipment decommissioned by…

Read More

Allied Universal acquires security firm Norred & Associates

Allied Universal acquires security firm Norred & Associates

Allied Universal acquires security firm Norred & Associates | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Security professionals aid healthcare workers during US Omicron surge

Security professionals aid healthcare workers during US Omicron surge

Security professionals aid healthcare workers during US Omicron surge | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

MalSmoke attack: Zloader malware exploits Microsoft’s signature verification to steal sensitive data

MalSmoke attack: Zloader malware exploits Microsoft’s signature verification to steal sensitive data

Already impacting more than 2,000 victims, the malware is able to modify a DLL file digitally signed by Microsoft, says Check Point Research. Image: danijelala, Getty Images/iStockPhoto A new malware campaign is taking advantage of a vulnerability in the way Microsoft digitally signs a specific file type. As described on Wednesday by cyber threat intelligence firm Check Point Research, an attack using the infamous Zloader banking malware aims to steal account credentials and other private…

Read More

Behind the scenes: A day in the life of a cybersecurity curriculum director

Behind the scenes: A day in the life of a cybersecurity curriculum director

The Kennedy Space Center kick-started Andee Harston’s career in cybersecurity. Here’s how she worked her way up to overseeing the cybersecurity curriculum for Infosec. Image: Shutterstock/kkssr Andrea Harston (who goes by Andee) grew up in Florida, not far from the Kennedy Space Center. “The town that I was in — that was really what the economy was built off of, was the space program,” she said. “It was a common occurrence to walk outside and…

Read More

The Bug Report – December 2021

The Bug Report – December 2021

Your Cybersecurity Comic Relief  Why am I here?  If you’re reading these words, CONGRATULATIONS! You’ve made it to 2022! And even better, you found your way to ATR’s monthly security digest where we discuss our favorite vulnerabilities of the last 30 days. Feel free to pat yourself on the back, get yourself a nice cup of coffee, tea, LaCroix (you fancy!) or if you’d rather choose violence, you can go straight for the energy drink. And now that we are comfortable and energized, let’s…

Read More
1 3,267 3,268 3,269 3,270 3,271 3,996