Rethinking cybersecurity in the age of COVID: The Dos and Don’ts of protection

Rethinking cybersecurity in the age of COVID: The Dos and Don’ts of protection

Rethinking cybersecurity in the age of COVID: The “Dos and Don’ts” of protection | 2021-04-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

The inside threat posed by the transition of power

The inside threat posed by the transition of power

The inside threat posed by the transition of power | 2021-04-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

World Book Day: Cybersecurity’s Quietest Celebration

World Book Day: Cybersecurity’s Quietest Celebration

The last time you were in a library, or a bookstore, you probably noticed how quiet it was.  This doesn’t mean that people weren’t excited, or downright celebrating, they were engaged in a different method of celebration; the kind that takes place between the covers of a good book. April 23rd marks the celebration of World Book and Copyright Day. As eloquently stated on the UNESCO web page, “through reading . . . we can…

Read More

A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

Imagine an arc. Not just any arc. A rainbow. When we think of a rainbow, it conjures impressions of color, inspiration and even supernatural characteristics.  Does your cybersecurity program long for a magical pot of gold at the end of a rainbow? With all the moving parts of cybersecurity, sometimes it seems like we are merely chasing rainbows. However, it doesn’t have to be that way. Now, thanks to the innovative products in the Tripwire catalog, there is…

Read More

Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection | 2021-04-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Apple supplier Quanta hit with $50 million ransomware attack from REvil

Apple supplier Quanta hit with  million ransomware attack from REvil

Hackers claim to have infiltrated the networks of Quanta Computer Inc., which makes Macbooks and hardware for HP, Facebook and Google. Red binary computer code ransom screen background with stop symbol sign. Suebsiri, Getty Images/iStockphoto Ransomware group REvil claimed in a blog post published on Tuesday to have stolen blueprints for Apple’s latest products. On the same day, Apple CEO Tim Cook announced multiple new products at an online event.  Quanta Computer Inc. acknowledged the…

Read More

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle addresses over 250 CVEs in its second quarterly update of 2021 with 390 patches, including 34 critical updates. Background On April 20, Oracle released its Critical Patch Update (CPU) for April 2021, the second quarterly update of the year. This CPU update contains fixes for 257 CVEs in 390 security updates across 32 Oracle product families. Out of the 390 security updates published this quarter, over 50% were assigned a high severity. Critical vulnerabilities…

Read More

The award for the most popular movie used in leaked passwords goes to…

The award for the most popular movie used in leaked passwords goes to…

Ahead of Sunday’s Oscars awards ceremony, password management provider Specops rolls out the red carpet to reveal its list. Image: designer491, Getty Images/iStockPhoto “Rocky” might be your all-time favorite movie, but if you’re using it as a password, beware. This highly popular, feel-good boxing movie of the 1970s has the dubious distinction of showing up on breached password lists nearly 96,000 times, according to password management provider Specops. Just ahead of Sunday’s Oscars, the firm…

Read More

Stallone Classic a Password Favorite

Stallone Classic a Password Favorite

New analysis of leaked login data has revealed which movie titles most frequently feature in passwords. Specops trawled through more than 800 million breached passwords to determine which big-screen hits were favored by users. The selection was a subset of a list of 2 billion passwords that have appeared in breached lists. Topping the list was the sports drama Rocky, written by and starring Sylvester Stallone as a kind-hearted working class Italian-American boxer who dreams of fighting his…

Read More
1 2,302 2,303 2,304 2,305 2,306 2,567