Arrest Made Over Multi-million-dollar BEC Scam

Arrest Made Over Multi-million-dollar BEC Scam

Texas law enforcement officers have made an arrest in connection with a multi-million-dollar wire fraud and money laundering scheme involving Business Email Compromise (BEC). Guillermo Perez was taken into custody Wednesday morning for allegedly defrauding businesses and individuals of more than $2m through cyber-scams and bank fraud schemes. An indictment unsealed on June 9 accuses 26-year-old Houston resident Perez of participating in the illegal scam from at least October 2018 to October 2019. Perez is accused of impersonating…

Read More

How to secure your WordPress login with 2FA

How to secure your WordPress login with 2FA

Jack Wallen shows you how to add two-factor authentication to your WordPress sites to avoid possible unwanted intrusion. Image: Jack Wallen Nothing is perfect. No matter what you do to lock down every account you have, you’re still at risk. However, doing nothing is akin to opening the metaphorical door and inviting trouble in. You don’t want that. Even though it might seem futile, you still want to enable every possible hurdle to make the…

Read More

Data Loss Prevention in Turbulent Times

Data Loss Prevention in Turbulent Times

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of the biggest businesses on earth but unlike oil, more and more of it is being created, at an exponential pace. Around 2.5 quintillion bytes of new data every day, to be precise. The most valuable forms of data exist within enterprises. Customer data, financial data,…

Read More

Texas to Publish Data Breach Notifications

Texas to Publish Data Breach Notifications

Lawmakers in Texas have passed a bill requiring notices to be published online of any data breaches involving the personal information of 250 or more Lone Star State residents. The unanimously passed House Bill 3746, which amends the Texas Business and Commerce Code §521.053, requires the Texas Attorney General’s Office to post the breach notifications to its public-facing website. Notifications must be uploaded to the website within 30 days of receipt, and listings of organizations impacted by a…

Read More

How Cloud Native Buildpacks Simplify Container Automation

How Cloud Native Buildpacks Simplify Container Automation

When it comes to being a traditional network engineer, we often have a “go it alone” mindset. This is due to the nature of working in operations. Normally we are given a task or a series of projects that we must complete solo. This is because our teammates are just as loaded with work as we are. Although, this does not mean we can’t ask for help. The DevOps way is a completely different shift…

Read More

Microsoft Exchange Server vulnerabilities, ransomware lead spring 2021 cyberattack trends

Microsoft Exchange Server vulnerabilities, ransomware lead spring 2021 cyberattack trends

Cisco’s Talos team said 35% of incidents led back to Microsoft Exchange Server vulnerabilities reported early in 2021, but new ransomware families have been appearing to fill the Emotet hole, too. Rawpixel, Getty Images/iStockphoto Cisco’s Talos Intelligence Group has released its incident response trends report for spring 2021, and found that Microsoft Exchange Server vulnerabilities reported in early 2021 were the most detected incident over the past three months. Talos said the four Exchange Server…

Read More

#Infosec21: Lack of Vision Explains Cyber Skills Shortage

#Infosec21: Lack of Vision Explains Cyber Skills Shortage

The cybersecurity skills gap is caused by a lack of vision in the industry rather than it being a pipeline problem, argued Wendy Nather, head of advisory CISOs at Cisco, during her keynote address on day three of the Infosecurity Europe virtual conference. Nather, who was recently inducted into the Infosecurity Hall of Fame, believes it is a complete misnomer that there is a lack of talent available to fill the expanding number of security roles. Instead,…

Read More

Are Virtual Machines the New Gold for Cyber Criminals? | McAfee Blogs

Are Virtual Machines the New Gold for Cyber Criminals? | McAfee Blogs

Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT systems in a heartbeat, allowing then to be more agile as opposed to investing into dedicated “bare-metal” hardware. To the outside untrained eye, it might seem that there are different machines on the network, while in fact all the “separate” machines are controlled by a hypervisor server. Virtualization plays such a big role…

Read More

Cisco Secure Firewall Threat Defense Virtual now supported on Cisco HyperFlex – Cisco Blogs

Cisco Secure Firewall Threat Defense Virtual now supported on Cisco HyperFlex – Cisco Blogs

With today’s multi-cloud and modern application environments, security is more complex than ever before. With the Cisco Secure platform approach, we are helping you take steps to achieve radically simplified security across your organization. Today, we are driving simplified security to your hyperconverged infrastructure (HCI), delivering support for Cisco Secure Firewall Threat Defense Virtual (formerly FTDv/NGFWv) on Cisco HyperFlex. Cisco HyperFlex, recognized by CRN as the HCI product of the year for 2019 and 2020,…

Read More
1 3,326 3,327 3,328 3,329 3,330 3,584