Linux 101: How to block users from setting up their own cron jobs

Linux 101: How to block users from setting up their own cron jobs

Jack Wallen shows you how to gain a bit more security on your Linux servers by blocking users from adding cron jobs. Image: Pixabay You’re a new Linux admin and you’re familiar with how cron works. You’ve been tasked with hardening your Linux servers and one thing you’d like to do is prevent users from setting up their own cron jobs. After all, shouldn’t that task fall into your hands?  You certainly don’t want users…

Read More

Kaspersky: Decline in DDoS Attacks Linked to Surge in Cryptocurrency Value

Kaspersky: Decline in DDoS Attacks Linked to Surge in Cryptocurrency Value

DDoS attacks fell by almost a third (31%) in Q4 of 2020 compared to Q3, according to new figures from Kaspersky. The researchers believe this reduction is linked to the surge in cryptocurrency costs, with cyber-criminals increasingly turning their attention to cryptomining. Kaspersky statistics showed that while the number of cryptominers declined throughout 2019 and at the start of 2020, from August 2020, this form of malware has gone up slightly. With cryptomining becoming more lucrative, it…

Read More

Shift to Remote Work Necessitating Greater Innovation in Cybersecurity

Shift to Remote Work Necessitating Greater Innovation in Cybersecurity

Cybersecurity trends emerging from nearly a year of remote working were highlighted by a panel of experts during a RSAC 365 Innovation Showcase webinar. Robert Ackerman JR, founder and managing director, Allegis Cyber, described how the “virtualization” of organizations’ perimeters has significantly expanded the attack surface for cyber-criminals. He believes COVID-19 lockdown measures have accelerated this new perimeter by five years in the space of one, and encouragingly, there has been “a lot of innovation…

Read More

Cisco + IMI: Delivering the Future of Customer Experience, Together

Cisco + IMI: Delivering the Future of Customer Experience, Together

After years of consideration, a friend of mine finally caved and bought a Tesla. He described an interaction with them recently that really got my attention. He got a notification stating that he was overdue on his payments, but he had already set up autopay. He called their customer service department, was connected directly to an agent who knew exactly who he was and that he had just purchased his car. Before he could even…

Read More

IRS Warns of Fresh Fraud Tactics as Tax Season Starts

IRS Warns of Fresh Fraud Tactics as Tax Season Starts

Fraud Management & Cybercrime , Fraud Risk Management , ID Fraud Site Spoofing, Phishing Campaigns Proliferate Scott Ferguson (Ferguson_Writes) • February 19, 2021     As tax season begins, the Internal Revenue Service is warning that it’s seeing signs of fraudsters spoofing the agency’s domains and incorporating its logos and language into phishing campaigns. See Also: Live Webinar | The EVIL-Ution Of Ransomware In 2021-Top Protection Tips Meanwhile, security experts warn of other…

Read More

2021 Security Outcomes Study: Stress Relief for CISOs – Cisco Blogs

2021 Security Outcomes Study: Stress Relief for CISOs – Cisco Blogs

We have heard countless times that, during the COVID-19 pandemic, digital transformation has advanced three years in three months. It is difficult to actually measure this, but the feeling is definitely there. Activities with questionable results in the virtual environment, such as telemedicine and distance learning, which both suffered from socio-economic biases, became an integral part of our daily routine, with no contest. It was this or nothing. This intensification of our digital life, with…

Read More

4 ways to defend against the Dark Web’s cybercrime ecosystem, according to MIT researchers

4 ways to defend against the Dark Web’s cybercrime ecosystem, according to MIT researchers

The Dark Web allows cybercriminals to create a Cyber Attacks-as-a-Service ecosystem that outmaneuvers security defenses. Here are tips on how businesses can try to thwart cybercrime. Image: gorodenkoff, Getty Images/iStockphoto A group at the Massachusetts Institute of Technology (MIT) studied why cybercriminals are way ahead when it comes to technical innovation. Cybersecurity researchers Keman Huang, Michael Siegel, Keri Pearlson and Stuart Madnick in their paper Casting the Dark Web in a New Light, published in…

Read More

Palo Alto Networks to Present at Upcoming Investor Event

Palo Alto Networks to Present at Upcoming Investor Event

SANTA CLARA, Calif., Feb. 19, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that members of its management team will be presenting at the following financial community event: Morgan Stanley Technology, Media and Telecom ConferenceTuesday, March 2, 20218:00 a.m. PST Additional information about upcoming investor event participation and a live audio webcast of each presentation will be accessible from the “Investors” section of the Palo Alto Networks website at…

Read More

CrowdStrike Snaps Up London Start-Up Humio

CrowdStrike Snaps Up London Start-Up Humio

CrowdStrike has announced a $400 million deal to acquire British log management firm Humio in a bid to bolster its extended detection and response (XDR) capabilities. The endpoint security and threat intelligence giant claimed it was “blown away” by the London-based firm’s high-performance cloud log management and observability technology. Its proven ability to deliver at scale makes it the perfect fit for the CrowdStrike Security Cloud, it added. “By leveraging new ingest pipelines and cloud…

Read More

SolarWinds Attackers Breached 100+ Private Firms

SolarWinds Attackers Breached 100+ Private Firms

Over 100 private sector firms were breached in the SolarWinds attack, the White House has revealed. Anne Neuberger, deputy national security advisor for cyber and emerging technology, told the press yesterday that many of those affected were technology companies, “whose products could be used to launch additional intrusions.” That’s certainly what appears to have happened with the targeting of firms like FireEye, Microsoft, Malwarebytes, Mimecast and Palo Alto Networks — although not all of these…

Read More
1 43 44 45 46 47 268