HTML smuggling is the latest cybercrime tactic you need to worry about

HTML smuggling is the latest cybercrime tactic you need to worry about

It will be hard to catch these smugglers, as they’re abusing an essential element of web browsers that allow them to assemble code at endpoints, bypassing perimeter security. Image: oatawa, Getty Images/iStockphoto Cybersecurity company Menlo Labs, the research arm of Menlo Security, is warning of the resurgence of HTML smuggling, in which malicious actors bypass perimeter security to assemble malicious payloads directly on victims’ machines. Menlo shared the news along with its discovery of an…

Read More

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Docker Security Roundup: News, Articles, Sessions – Docker Blog

Docker Security Roundup: News, Articles, Sessions – Docker Blog

With the eyes of the security world converging on Black Hat USA next week, now is a good time to remember that building secure applications is paramount. In the latest chapter in Docker’s security story, Docker CTO Justin Cormack last month provided an important update on software supply chain security. He blogged about the publication of a white paper, “Software Supply Chain Best Practices,” by the security technical advisory group of the Cloud Native Computing…

Read More

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today the annual study “Cost of Data Breach,” conducted by Ponemon Institute and sponsored and analyzed by IBM, which is based on data related to data breaches suffered by over 500 organizations between May 2020 and March 2021. The study highlights the significant impact of the…

Read More

How to remove or update a single entry from the SSH known_hosts file

How to remove or update a single entry from the SSH known_hosts file

SSH holds fingerprints of your remote machines in the known_hosts file. Sometimes you might need to remove or update one of those entries. Jack Wallen shows you how. Image: Anawat Sudchanham/EyeEm/Getty Images The SSH known_hosts file contains fingerprints (generated from the remote machines SSH key) of the known machines you’ve logged into. If you SSH into a machine for the first time, you will be asked if you want to save that hosts’ fingerprint. Consider…

Read More

The evolution of spear phishing and who criminals are targeting

The evolution of spear phishing and who criminals are targeting

A report from Barracuda Networks also identifies attack risks associated with various roles throughout a company ranging from CEOs and IT departments to employees in sales. Image: GettyIMages/South_agency In recent months, a string of high-profile cyberattacks on critical aspects of the U.S. infrastructure has brought conversations surrounding cybersecurity front and center for companies around the globe. On Wednesday, Barracuda Networks published a report entitled “Spear Phishing: Top Threats and Trends” highlighting the latest security trends…

Read More

How to ensure your vendors are cybersecure to protect you from supply chain attacks

How to ensure your vendors are cybersecure to protect you from supply chain attacks

Right now supply-chain vendors are a prime target for cybercriminals. One expert offers ways to remove the bullseye from supply vendors. Image: Jaiz Anuar/Shutterstock There aren’t many sure things in life, and, sadly, one of them is how criminals—cyber or otherwise—always leverage the victim’s weakest link to ensure their success. TechRepublic’s Tom Merritt, in his article, video and podcast, Top 5 things to know about supply chain attacks, looked at one important weak link making…

Read More
1 2,310 2,311 2,312 2,313 2,314 2,731