Securing Today’s Hybrid Remote Workforce

Securing Today’s Hybrid Remote Workforce

By CISO T.J. Minichillo Work may never be the same again as the world continues to grapple with the global pandemic — pivoting from office-based business environments to fully remote home-based work and now to a hybrid of the two. Just 11% of companies expect all of their employees to return to the office fulltime, according to a survey by the National Association for Business Economics. The new normal is a hybrid model with over…

Read More

Attackers deploy Linux backdoor on e-stores compromised with software skimmer

Attackers deploy Linux backdoor on e-stores compromised with software skimmer

Researchers discovered threat actors installing a Linux backdoor on compromised e-commerce servers after deploying a credit card skimmer into e-stores. Security researchers from Sansec Threat Research Team discovered a Linux backdoor during an investigation into the compromised of an e-commerce server with a software skimmer. The attackers initially conducted a reconnaissance phase by probing the e-store with automated eCommerce attack probes. After a day and a half, the threat actors found and exploited a file…

Read More

Cisco partners with JupiterOne to enhance its SecureX product portfolio

Cisco partners with JupiterOne to enhance its SecureX product portfolio

The new product, Cisco Secure Cloud Insights, offers cloud inventory tracking and relationship mapping to navigate public clouds as well as access rights management and security compliance reporting. Image: Shutterstock/GreenTech Cisco announced this week it has partnered with cloud security and governance platform provider JupiterOne to launch Cisco Secure Cloud Insights. Secure Cloud Insights will be part of Cisco’s SecureX family of products and is intended to help customers manage risk and reduce the attack…

Read More

8 advanced threats Kaspersky predicts for 2022

8 advanced threats Kaspersky predicts for 2022

Advanced threats constantly evolve. This year saw multiple examples of advanced persistent threats under the spotlight, allowing us to predict what threats might lead the future. Image: Profit_Image/Shutterstock Advanced persistent threats, which focus on cyberespionage goals, are a constant threat to companies, governments and freedom activists, to name a few. This activity keeps growing and evolving as more threat actors increase their skill. SEE: Google Chrome: Security and UI tips you need to know  (TechRepublic…

Read More

FCC auction for prime 5G bandwidth rakes in $21.8B

FCC auction for prime 5G bandwidth rakes in .8B

The FCC auction for a prime band of 5G wireless spectrum has attracted $21.8 billion in bids, underscoring the importance of the frequency blocks that range from 3.5GHz to 3.55GHz. Of the 4,060 blocks available for discrete geographic areas throughout the country, all but 19 sold during the 29-day auction, according to the FCC. Carriers have been hungrily buying up this mid-range spectrum that some call the Goldilocks Zone because its transmissions propagate over a…

Read More

Sky Slow to Fix Bug in Routers

Sky Slow to Fix Bug in Routers

Entertainment company Sky took more than 17 months to fix a security flaw that impacted roughly six million routers belonging to its customers.  The DNS rebinding vulnerability was discovered in May 2020 by Raf Fini, a researcher at British cybersecurity company Pen Test Partners.  Six router models were affected by the flaw: Sky Hub 3, Sky Hub 3.5, Booster 3, Sky Hub, Sky Hub 4, and Booster 4.  “It affected users with the default router’s admin password (admin:sky),…

Read More

Get A Great Job in Cyber Security Faster, Here’s How…

Get A Great Job in Cyber Security Faster, Here’s How…

Looking for a Hot High Paying Cyber Security Job?  Look No Further – Enter CyberDefenseProfessionals.com In the third quarter of 2021, Cyber Defense Media Group, the cybersecurity industry’s leading publisher and provider of daily infosec news from around the globe, initiated the service of Cyber Defense Professionals, a free Online Cybersecurity Jobs Portal, after spinning out from Ingersoll Lockwood, Inc. COST OF CYBERCRIME: “Cybercrime has surpassed Drug Crime as the largest form of global thievery…

Read More

Xilinx launches a data-center accelerator for HPC

Xilinx launches a data-center accelerator for HPC

Xilinx has introduced its latest data-center accelerator, the Alveo U55C, which it says is its most powerful accelerator yet thanks to a memory change. For the most part, the FPGA-powered Alveo U55C is similar to its predecessor, Alveo U280. But the U280 has 8GB of HBM2 memory and 16GB of DDR4 DRAM, while the U55C comes with 16GB of HBM2 memory, and no DDR4. HBM2 is considerably faster and more expensive than DDR4 memory. By…

Read More

Brit Admits Role in International Movie Piracy Ring

Brit Admits Role in International Movie Piracy Ring

A British man has admitted being a member of an international video piracy ring that illegally distributed “nearly every movie released by major production studios.” On Thursday, before United States District Judge Richard M. Berman, George Bridi pleaded guilty to conspiracy to commit copyright infringement, which carries a maximum sentence of five years in prison. Bridi, who is 52 years old, has been part of Sparks Group – described by Europol as “one of the biggest online piracy groups…

Read More

US Charges Two Iranians with Cyber-based Electoral Interference

US Charges Two Iranians with Cyber-based Electoral Interference

The United States has charged two Iranian computer hackers in connection with a cyber-campaign intended to influence the outcome of America’s 2020 presidential election. An indictment unsealed in New York on Thursday alleges that 24-year-old Seyyed Mohammad Hosein Musa Kazemi and 27-year-old Sajjad Kashian conspired with others to intimidate and influence American voters, undermine voter confidence, and create societal discord. Starting in approximately August 2020, Kazemi, Kashian, and other co-conspirators allegedly began a four-pronged campaign that included…

Read More
1 3,343 3,344 3,345 3,346 3,347 3,976