Robert Soderberg: Risk-based, business-minded and business enabling

Robert Soderberg: Risk-based, business-minded and business enabling

Robert Soderberg: Risk-based, business-minded and business enabling | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Todd Vigneault: Focusing on risk and intelligence

Todd Vigneault: Focusing on risk and intelligence

Todd Vigneault: Focusing on risk and intelligence | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Adam Dwyer: Professionalism and support foster a community environment

Adam Dwyer: Professionalism and support foster a community environment

Adam Dwyer: Professionalism and support foster a community environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Invest in Cyber Awareness to Prevent Attacks | The State of Security

Invest in Cyber Awareness to Prevent Attacks | The State of Security

Today’s cyber threat landscape is extremely challenging. Ransom this, ransom that, ransom everywhere – information technology (IT) professionals must work to protect organizations against the next big ransomware attack. Over the years, the sophistication of ransomware attacks has increased as well as the amount of money demanded and paid out in exchange for the ransom-held information. This is why it is extremely important that organizations equip their employees with the knowledge and awareness necessary to identify activities that…

Read More

What to Remember When Choosing a Managed Service Provider (MSP)

What to Remember When Choosing a Managed Service Provider (MSP)

In my previous post, I discussed some of the most common types of services offered by managed service providers (MSPs). This brings us to what organizations need to do to prepare to work with an MSP. Here are some considerations to keep in mind. Have an Idea What You Need Organizations could land themselves in trouble if they end up wasting money on services they don’t need. The same goes for those that might go…

Read More

TeamTNT Upgrades Arsenal Refines Focus on Kubernetes and GPU Environments

TeamTNT Upgrades Arsenal Refines Focus on Kubernetes and GPU Environments

TeamTNT Upgrades Arsenal Refines Focus on Kubernetes and GPU Environments Using a new batch of campaign samples, we take a look at its more recent cybercrime contributions and compare them with its previous deployments to demonstrate the group’s use of upgraded tools and payloads. By: David Fiser, Alfredo Oliveira November 11, 2021 Read time:  ( words) In previous entries, we described how the hacking group TeamTNT targeted unsecured Redis instances, exposed Docker APIs, and vulnerable Kubernetes clusters in order to deploy cryptocurrency-mining payloads and credential…

Read More

Episode 2: What are you doing about ransomware?

Episode 2: What are you doing about ransomware?

Security pros are used to uncertainty. They don’t like it, but it’s part of the job. But one thing is certain: They’re going to be asked: What are we doing to prevent a ransomware attack? That’s because ransomware attacks have increased by nearly 500 percent since the start of the COVID-19 pandemic.   “You know I think any security conversation that doesn’t bring up and really address ransomware would be making a mistake, certainly,” says Wayne Anderson, Security Architect, in the Office…

Read More

NUCLEUS:13: 13 Vulnerabilities Found in Siemens Nucleus TCP/IP Stack

NUCLEUS:13: 13 Vulnerabilities Found in Siemens Nucleus TCP/IP Stack

Thirteen new vulnerabilities have been discovered in the Nucleus TCP/IP stack used in potentially billions of devices. Background On November 9, Forescout Research published a report called NUCLEUS:13. The report details research they conducted into the Nucleus NET, the TCP/IP stack of the Siemens owned Nucleus real-time operating system (RTOS), where they found 13 new vulnerabilities. This research is the fifth report of PROJECT:MEMORIA. Prior reports include: INFRA:HALT, a joint project with Forescrout and JFrog…

Read More

Ransomware attack disrupted store operations in the Netherlands and Germany

Ransomware attack disrupted store operations in the Netherlands and Germany

Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail giant MediaMarkt was a victim of a ransomware attack that forced the company to shut down its IT infrastructure to contain the threat and disrupted store operations in the Netherlands and Germany. Media Markt is a German multinational chain of stores selling consumer electronics with over 1000 stores in Europe. MediaMarkt operates in 13 countries and…

Read More

Dallas Police Surveillance Footage Leaked

Dallas Police Surveillance Footage Leaked

Video apparently stolen from American law enforcement agencies in Texas and Georgia has been leaked online by transparency collective Distributed Denial of Secrets (DDoSecrets). The collective shared 1.9TB of data it says consists of 600 hours of aerial surveillance footage taken by police helicopters in and around Dallas, Texas, and Atlanta, Georgia. “The extensive footage reveals the capabilities of the ‘military-grade’ technology behind police surveillance,” states DDoSecrets on their website. “It also highlights the voyeurism inherent in…

Read More
1 2,164 2,165 2,166 2,167 2,168 2,763