Microsoft’s June 2021 Patch Tuesday Addresses 49 CVEs (CVE-2021-31955, CVE-2021-31956 and CVE-2021-33742)

Microsoft’s June 2021 Patch Tuesday Addresses 49 CVEs (CVE-2021-31955, CVE-2021-31956 and CVE-2021-33742)

CVE-2021-33739 | Microsoft Desktop Window Manager Core Library Elevation of Privilege Vulnerability CVE-2021-33739 is an EoP vulnerability in the Microsoft Desktop Window Manager (DWM) core library, dwmcore.dll. It was discovered and reported to Microsoft by researchers at DBAPPSecurity Threat Intelligence Center. In February, DBAPPSecurity Threat Intelligence Center disclosed another zero-day vulnerability, CVE-2021-1732, an elevation of privilege vulnerability in Win32k linked to a threat actor known as BITTER APT. In April, researchers at Kaspersky…

Read More

MoviePass Operators Settle Data Security Allegations

MoviePass Operators Settle Data Security Allegations

The operators of subscription service MoviePass have agreed to settle Federal Trade Commission allegations of fraud and data security failures.  It is alleged that MoviePass used an elaborate three-prong approach to prevent and discourage subscribers from using its $9.95 “one movie a day” monthly subscription service as advertised. First, according to the FTC complaint, the company blocked as many as 75,000 subscribers from accessing content by purposefully invalidating their passwords.  The FTC said: “MoviePass’s operators invalidated subscriber passwords…

Read More

Control Cisco Secure Workload Using APIs, Ansible, and Terraform

Control Cisco Secure Workload Using APIs, Ansible, and Terraform

Cisco Secure Workload, (formerly Cisco Tetration) provides policy lifecycle services, micro-segmentation, and cloud workload protection. Furthermore, it is completely accessible via open APIs and by using Ansible and Terraform. It is also part of Cisco Application-First Security and a pillar of the Cisco Zero Trust architecture.   Do you want to learn more about Cisco Secure Workload, and how to control it using APIs, Ansible and Terraform?Register here for the webinarTuesday, June 15th, 8:00 AM PDT …

Read More

Cyber-attack on NYC Law Department

Cyber-attack on NYC Law Department

An intrusion into the IT system of the New York City Law Department is being co-investigated by the New York Police Department and the FBI’s Cyber Task Force. The hack was first reported by The Daily News, which learned that sensitive information belonging to more than a thousand department employees may have been exposed in the security incident. After discovering the intrusion, the city restricted admission to the system, preventing government lawyers from accessing documents.  On…

Read More

Top 5 things to know about medical data security

Top 5 things to know about medical data security

Medical data is a valuable commodity—one that needs to be protected from cybersecurity threats. Tom Merritt lists five things to know about medical data security. Seth Rosenblatt’s “The Parallax View” recently posted about medical vulnerabilities found by CybelAngel’s senior cybersecurity analyst, David Sygula. TechCrunch had a similar writeup about warnings for medical imaging from Greenbone Networks’ lead researcher, Dirk Schrader. Last December, Kaspersky project manager Maria Namestnikova warned that software used by medical organizations is…

Read More

Paving the way: Inspiring Women in Payments – A podcast featuring Carey Ferro

Paving the way: Inspiring Women in Payments – A podcast featuring Carey Ferro

  Carey Ferro credits much of her success to having a healthy sense of curiosity. Asking questions and understanding how things work at an early age can help one shape and grow technology as a lifelong passion. But even more important, Carey says learning to practice reflection is an essential part of continued personal growth and finding balance in one’s life. In this edition of our podcast, Carey discusses the importance of curiosity, courage, and…

Read More

TrustSec Policy Analytics – Part Two: Policy Visualization

TrustSec Policy Analytics – Part Two: Policy Visualization

In Part One of the Cisco TrustSec Policy Analytics blog series, Samuel Brown addressed some of the challenges related to designing group-based security policies and introduced one of the new feature sets of Cisco Secure Network Analytics – TrustSec Analytics reports. In this blog, we’ll dive a little bit deeper into the challenges associated with designing segmentation policies and how TrustSec Analytics reports and the visibility they provide can help make this easier. I’d like…

Read More

Illinois County Stricken with Grief

Illinois County Stricken with Grief

A new organized cybercrime group claims to have stolen sensitive data belonging to a county in Illinois.  St. Clair County disabled its website on June 2 out of “an abundance of caution” after suffering a cyber-attack. Ransomware gang Grief has claimed responsibility for the digital assault.   Because of the incident, several county services were rendered unavailable from May 28, including access to court records and payment for ticket fees.  The county jail’s network was also impacted, with…

Read More
1 3,332 3,333 3,334 3,335 3,336 3,584