PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

Nine critical vulnerabilities in a popular hospital pneumatic tube software could give attackers control of infrastructure and allow them to launch additional attacks that cripple healthcare operations. Image: ZDNet The software used to control pneumatic tubes in over 3,000 hospitals around the world has nine critical vulnerabilities that could halt hospital operations if exploited by a savvy attacker.  Discovered by researchers at security platform provider Armis and dubbed PwnedPiper, the vulnerabilities are in the Nexus…

Read More

4 reasons to prioritize developers’ infrastructure needs

4 reasons to prioritize developers’ infrastructure needs

As companies make digital transformation both an immediate priority and an ongoing process for the future, I see a worrying trend in many organizations. While organizations commit resources and priorities to delivering the best digital experience to both internal and external customers through their production infrastructures, they may not extend the same attention and support to the development teams and rapid development processes. The result is lost developer hours and lost dollars as their time…

Read More

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The anatomy of a tabletop exercise

The anatomy of a tabletop exercise

The anatomy of a tabletop exercise | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Calculating your worth during a security job search

Calculating your worth during a security job search

Calculating your worth during a security job search | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Tripwire Patch Priority Index for July 2021 | The State of Security

Tripwire Patch Priority Index for July 2021 | The State of Security

Tripwire’s July 2021 Patch Priority Index (PPI) brings together important vulnerabilities from VMware, Adobe, Oracle, and Microsoft. First on the patch priority list this month are patches for Microsoft Print Spooler (CVE-2021-34527, CVE-2021-1675) and vSphere Client (CVE-2021-21985). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible. Up next are patches for Adobe Reader and Acrobat that resolve 19 issues including memory leak,…

Read More

Taking a Look at AWS and Cloud Security Monitoring

Taking a Look at AWS and Cloud Security Monitoring

More and more companies understand the benefits of cloud computing, which is making their migration to the cloud more rapid. Per IDG’s 2020 Cloud Computing Study, 81% of organizations said that they’ve migrated either one application or a portion of their infrastructure to the cloud. The reasons why a company would shift its services towards the cloud depend on its business priorities, of course. General reasons for migrating include 1) cost-savings, 2) reliability, 3) scalability,…

Read More

This ethical hacking course could give your cybersecurity career a boost

This ethical hacking course could give your cybersecurity career a boost

Move up in the profitable field of cybersecurity by improving your ethical hacking skills. Image: Teera Konakan/Moment/Getty Images Cybersecurity experience was recently cited as one of the top three most scarce skills in the U.S., U.K. and several European countries. You can sharpen your ethical hacking skills with The Complete Pentesting & Privilege Escalation Course–while training from home at your own pace. The 27 lectures in this bundle cover Kernel Exploit, Linux/Windows Privilege Escalation, CTF…

Read More
1 2,226 2,227 2,228 2,229 2,230 2,649