Microsoft warns of an actively exploited Windows zero-day security hole

Microsoft warns of an actively exploited Windows zero-day security hole

In a security advisory, Microsoft has warned that malicious hackers are exploiting an unpatched vulnerability in Windows to launch targeted attacks against organisations. The security hole, dubbed CVE-2021-40444, is a previously unknown remote code execution vulnerability in MSHTML, a core component of Windows which helps render web-based content. According to Microsoft, attacks exploiting the vulnerability have targeted companies via boobytrapped Microsoft Office documents. In short, a typical timeline of infection might go something like this:…

Read More

Accelerate CSP Digital Transformation with VMware Ready for Telco Cloud Certified Partner Solutions on VMware Marketplace

Accelerate CSP Digital Transformation with VMware Ready for Telco Cloud Certified Partner Solutions on VMware Marketplace

VMware Marketplace includes over 200 market-leading, pre-integrated solutions in the VMware Ready for Telco Cloud certification program. Discover how easy it is to find telco ecosystem partners via the Marketplace. To operate in the digital era, Communications Service Providers (CSPs) have long recognized the need to transform into more agile networks that deliver services on-demand, leverage network resources to improve efficiency, and increase optionality via multi-cloud networks. CSPs around the world have chosen VMware Telco…

Read More

How to set up two-step verification for your Google account

How to set up two-step verification for your Google account

Two-step verification can better secure and safeguard your account. Here’s how to set it up. Google will now require all users to enable two-step verification to protect their accounts. This means you’ll be need to respond to a notification on your mobile phone anytime you try to log into a Gmail account or other Google service. How do you set up two-step verification for Google? The process isn’t difficult but does require a few steps…

Read More

WFH is a cybersecurity

WFH is a cybersecurity

IT teams are experiencing employee pushback due to remote work policies and many feel like cybersecurity is a “thankless task” and that they’re the “bad guys” for implementing these rules. GettyImages/Petri Oeschger At the onset of COVID-19, companies around the globe shifted to remote work on short notice.  The revamped operations transformed the traditional workday and cybersecurity efforts for companies virtually overnight, leading to new challenges for remote workers and IT teams. On Thursday, HP…

Read More

Security Now a “Thankless Task” For 80% of IT Teams

Security Now a “Thankless Task” For 80% of IT Teams

Securing the new hybrid workplace may require significant changes to culture, policy and technology after new HP research revealed significant pushback from remote workers during the pandemic. The tech giant surveyed over 1000 IT decision-makers and more than 8400 workers across the globe to compile its latest HP Wolf Security study, Rebellions & Rejections. It revealed that nearly all (91%) IT leaders had felt pressure to compromise on security during the pandemic, with three-quarters (76%) admitting security took…

Read More

Attacker Breakout Time Now Less Than 30 Minutes

Attacker Breakout Time Now Less Than 30 Minutes

The average time it takes threat actors to move from initial access to lateral movement has fallen by 67% over the past year, putting extra pressure on security operations (SecOps) teams, according to CrowdStrike. The findings come from the security firm’s own investigations with customers across around 248,000 unique global endpoints. For incidents where this “breakout time” could be derived over the past year, it averaged just 1 hour 32 minutes. However, in over a third (36%) of…

Read More

Berners-Lee Joins ProtonMail Following Privacy Debacle

Berners-Lee Joins ProtonMail Following Privacy Debacle

Tim Berners-Lee has joined the advisory board of ProtonMail, just days after the encrypted email service was criticized for unmasking the identity of a user for French police. The worldwide web inventor was a scientist at the European Organization for Nuclear Research (CERN) at the same time as ProtonMail CEO Andy Yen, and helped to sketch the initial plans for what is now the world’s largest encrypted email service, with over 50 million users. “I’m…

Read More

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

Co-authored with Intel471 and McAfee Enterprise Advanced Threat Research (ATR) would also like to thank Coveware for its contribution. Executive Summary McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized…

Read More

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

CIS Control 3: Data Protection – Protect and Identify to safeguard data

CIS Control 3: Data Protection – Protect and Identify to safeguard data

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it is therefore safe. While it is critical to encrypt data at rest as well as in transit, the job of protecting data goes much deeper. Encryption can mitigate risk from certain attack scenarios such as physically compromised hardware or a tapped network link,…

Read More
1 2,112 2,113 2,114 2,115 2,116 2,600