Expel rolls out managed detection and response for Microsoft

Expel rolls out managed detection and response for Microsoft

Expel for Microsoft alerts and responds to the Microsoft-specific vulnerabilities attackers typically exploit. Image: iStockphoto/Igor Kutyaev On Thursday, managed detection and response provider Expel announced the launch of its Expel for Microsoft offering, which automatically analyzes and prioritizes alerts across a suite of Microsoft products including Active Directory, AD Identity Protection, Azure, Microsoft Cloud App Security, Microsoft Defender for Endpoint, Office 365 and Sentinel.  Expel APIs ingests security signals from Microsoft’s products along with any…

Read More

US to Treat Ransomware Like Terrorism

US to Treat Ransomware Like Terrorism

A senior official at the United States Department of Justice (DOJ) has said that ransomware attacks in America are to be investigated with a similar urgency as incidences of terrorism. The official told news agency Reuters that cyber-assaults using this particular type of malware are to be prioritized more highly now following a passel of ransomware attacks against entities in the US and elsewhere. Ransomware victims in recent weeks have included the Colonial Pipeline, meat supplier JBS, the Steamship…

Read More

More US Kids Warned About Internet Than Unsafe Sex

More US Kids Warned About Internet Than Unsafe Sex

More American parents are warning their children about the dangers of going online than about the importance of sexual safety, according to new research. A survey of over 1,000 parents in the United States conducted by InMyArea.com found that 89% of parents with children aged 12 or older have had an intentional talk about internet safety with their children. By contrast, only 66% of American parents with kids aged 12 or older had purposefully discussed sexual safety with their…

Read More

Ransomware: A cheat sheet for professionals

Ransomware: A cheat sheet for professionals

This guide covers the Colonial Pipeline attack, WannaCry, Petya and other ransomware attacks, the systems hackers target and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection. In the past, security threats typically involved scraping information from systems that attackers could use for other crimes such as identity theft. Now, cybercriminals have proceeded to directly demanding money from victims by holding their devices–and data–hostage. This type of…

Read More

Biden Expands Trump’s Investment Ban on Chinese Firms

Biden Expands Trump’s Investment Ban on Chinese Firms

President Joe Biden’s latest executive order has expanded a ban on investing in Chinese companies with alleged links to defense or surveillance technology sectors that was introduced by former president Donald Trump. The Trump administration issued an executive order on November 12, 2020, barring US entities from investing in a clutch of PRC companies including smartphone-maker Huawei, China Telecommunications Corp., China Unicom Ltd., and China Mobile Communications Group Co. On Thursday, Biden signed an order blocking Americans from investing…

Read More

CISOs Agree That Traditional Application Security Measures Don’t Work

CISOs Agree That Traditional Application Security Measures Don’t Work

Nearly three-quarters (71%) of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to new research from Dynatrace. The software intelligence firm polled 700 global security chiefs in large enterprises with over 1,000 employees to better understand their concerns over microservices, containers, and Kubernetes in development. Some 89% claimed their use had created dangerous application security blind spots. These challenges appear to be compounded by time-to-market…

Read More

White House asks private sector to take ransomware attacks more seriously

White House asks private sector to take ransomware attacks more seriously

White House asks private sector to take ransomware attacks more seriously | 2021-06-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

New: Promote Your PCI SSC Certification with a Digital Badge

New: Promote Your PCI SSC Certification with a Digital Badge

  The PCI SSC offers a range of  training and certification programs to support businesses in their payment security efforts. To help support the Council’s mission to educate and meet the needs of payment industry professionals, PCI SSC has recently launched a digital badging program. We talk with Travis Powell, Director of Training Programs, to learn more about this new program.

Read More

Apple Users: This macOS Malware Could Be Spying on You

Apple Users: This macOS Malware Could Be Spying on You

In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth when compared to Q1 2020, putting Apple in fourth place in the global PC market share. It is safe to say that Macs are well-loved and trusted devices by a significant portion of the population — but just how safe are they from a security perspective?  Many users have historically believed that Macs are untouchable by hackers,…

Read More

Apple Users: This macOS Malware Could Be Spying on You | McAfee Blogs

Apple Users: This macOS Malware Could Be Spying on You

In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth when compared to Q1 2020, putting Apple in fourth place in the global PC market share. It is safe to say that Macs are well-loved and trusted devices by a significant portion of the population — but just how safe are they from a security perspective?  Many users have historically believed that Macs are untouchable by hackers,…

Read More
1 2,304 2,305 2,306 2,307 2,308 2,643