Saving time and effort during lockdowns with mass notification

Saving time and effort during lockdowns with mass notification

Saving time and effort during lockdowns with mass notification | 2021-03-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Ghidra 101: Loading Windows Symbols (PDB files)

Ghidra 101: Loading Windows Symbols (PDB files)

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively. The process of transforming source code into application binaries is a lossy process, but at least some…

Read More

Compliance – The Invisible Hand Guiding Cybersecurity

Compliance – The Invisible Hand Guiding Cybersecurity

Have you ever worked with a company that operates as “close to broken” as reasonably possible? Companies that follow that mindset usually do not have the most robust security practice, and they certainly will walk very close to the edge of compliance. Even if you don’t work in such a dysfunctional enterprise as described above, many companies still do not appreciate the interconnection of security and compliance. Both are often considered cost centers, and that paints a…

Read More

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

We urge organizations to patch Proxylogon (CVE-2021-26855) and related vulnerabilities (CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) in Microsoft Exchange Server and investigate for potential compromise within their networks. Here’s how Tenable products can help. Background Following Microsoft’s out-of-band advisory for four zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild by a nation-state threat actor known as HAFNIUM, multiple reports have emerged that over 30,000 organizations may have been compromised as a result of these…

Read More

Driving Impact with Strong Leadership – Cisco Blogs

Driving Impact with Strong Leadership – Cisco Blogs

Cisco’s purpose is to power an inclusive future for all, and that purpose infuses all that we do, whether it’s our deep focus on delivering the best results for our customers, partners, and employees, or our commitment to making a difference in communities across the world. That purpose also guides our strategy for driving innovation – we are committed to helping our customers connect, secure and automate their digital agility in a cloud-first world, and…

Read More

How the Microsoft Exchange hack could impact your organization

How the Microsoft Exchange hack could impact your organization

Cybercriminals are racing to exploit four zero-day bugs in Exchange before more organizations can patch them. Image: Microsoft Organizations that run Microsoft Exchange Server are being urged to apply several bug fixes to the program in response to a hack from a Chinese cybercriminal group. The attack has sparked concern among everyone from security experts to the White House. Early last week, Microsoft revealed that a China-based group called Hafnium has been launching cyberattacks against…

Read More

Outsourcing Security Operations with Cisco Secure Endpoint

Outsourcing Security Operations with Cisco Secure Endpoint

Companies and organizations in our modern world have a big problem — there are not enough people with the right skill set. What kind of people? Cyber security experts that can handle their company’s security incidents. This is not a new problem. As a result of this, more and more organizations are outsourcing their security operations to Managed Security Services Providers (MSSP). A MSSP has a goal to prove their ongoing value to customers by…

Read More

Virginia Passes New Data Protection Law

Virginia Passes New Data Protection Law

Virginia governor Ralph Northam has signed a new state data protection act into law.  The Virginia Consumer Data Protection Act (CDPA) requires people conducting business in the Commonwealth of Virginia to comply with a novel set of data security and privacy requirements.  The CDPA, which mirrors some of the provisions laid out in the EU’s General Data Protection Regulation (GDPR), comes into effect on January 1, 2023.  Businesses found to have violated the CDPA will…

Read More

Hackers Target Texas University

Hackers Target Texas University

An ongoing network outage at a university in Texas is believed to have been caused by a malicious hack. The computer network of the University of Texas at El Paso was turned off out of caution after a “potentially malicious intrusion” was detected in the early hours of Friday morning. Email and the server hosting the university’s website were affected by the incident, forcing faculty and students to communicate via Blackboard. The cyber-attack has also…

Read More
1 2 3 4 5 6 268