5 minutes with Seth Rachlin – SolarWinds, cyberattacks and cyber insurance

5 minutes with Seth Rachlin – SolarWinds, cyberattacks and cyber insurance

5 minutes with Seth Rachlin – SolarWinds, cyberattacks and cyber insurance | 2021-03-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

3 tips for mitigating cloud-related cybersecurity risks

3 tips for mitigating cloud-related cybersecurity risks

Find out why cloud computing is leading IT security pros to reevaluate their in-house cybersecurity practices as well as resources provided by managed service providers. Image: Getty Images/iStockphoto Looking back, one might wonder how we ever got along without cloud computing. Cloud computing has, and will continue to be, a disruptive technology in how it transforms the way we use the internet.  Along with cloud computing, advances in microprocessor technology are altering our concept of…

Read More

ESET Exposes Malware Disguised as Clubhouse App

ESET Exposes Malware Disguised as Clubhouse App

ESET has uncovered malware designed to leverage the growing popularity of invite-only social media app Clubhouse. Revealing its findings in a blog post, the cybersecurity firm said the Trojan malware aims to steal users’ login information for a variety of online services. Disguised as an Android version of the audio chat app (which does not current exist), it is capable of taking credentials for over 450 apps and is also able to bypass SMS-based two…

Read More

New spear phishing emails target C-suite executives, assistants & financial departments

New spear phishing emails target C-suite executives, assistants & financial departments

New spear phishing emails target C-suite executives, assistants & financial departments | 2021-03-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Russian Man Pleads Guilty to Tesla Extortion Conspiracy

Russian Man Pleads Guilty to Tesla Extortion Conspiracy

A Russian national has pleaded guilty to his role in a conspiracy to extort motoring giant Tesla via data-stealing ransomware. Egor Igorevich Kriuchkov, 27, pleaded guilty to one count of conspiracy to intentionally cause damage to a protected computer and is expected to be sentenced on May 10. The case itself first broke last August, after Tesla boss Elon Musk cited a news report on the story, tweeting: “Much appreciated. This was a serious attack.”…

Read More

Website Builders Take Hands-Off Approach to Fake News Policing

Website Builders Take Hands-Off Approach to Fake News Policing

Fewer than a third of companies offering website creation tools took down potentially harmful misinformation about COVID-19, according to a new study from Website Planet. The web building resource deliberately created outlandish fake news in paid-for accounts with seven of the most popular CMS providers: Weebly, Jimdo, GoDaddy, Webnode, Squarespace, WordPress and Google Sites. This included deliberately eye-catching conspiracy theories such as that COVID-19 is a man-made virus or biological weapon, and others that claimed vaccination…

Read More

Want to be an ethical hacker? Take these cybersecurity courses

Want to be an ethical hacker? Take these cybersecurity courses

In these 18 online training courses on ethical hacking, cybersecurity pros will teach you about creating projects with Python, bug bounty hunting, Kali Linux hacker tools and much more. Image: iStock/iBrave Hackers have always gotten a bad rap due to the nature of their work (i.e., breaking into systems and exposing their vulnerabilities), but not all hackers have malicious intentions. The main job of ethical or white hat hackers is to study the ins and…

Read More

UK’s CEOs Commit to Cyber Spending After Pandemic

UK’s CEOs Commit to Cyber Spending After Pandemic

Over two-thirds of UK-based CEOs plan to increase long-term cybersecurity budgets, with many expressing increasing concerns over the risk of online threats to the business, according to PwC. The global consulting giant interviewed nearly 1800 business leaders in the UK as part of a global survey of CEOs. Its 24th annual UK CEO Survey revealed the major impact the pandemic has had on decision-making at the apex of the country’s private sector organizations. The number…

Read More

Your Vulnerabilities are Making You Miss Your Misconfigurations

Your Vulnerabilities are Making You Miss Your Misconfigurations

IT organizations regularly configure asset discovery tools in ways that leave them open to abuse by attackers; Vendor configuration documentation lacks details on the risk. By Evan Anderson, Director of Offense, Randori The security industry pays lots of attention to vulnerabilities and the need for patching. While there is a need for this, the industry has over-indexed on vulnerability management in the past couple decades. What doesn’t get as much attention, and is often more…

Read More

Modernizing your legacy ecosystem: Determining risks and readiness

Modernizing your legacy ecosystem: Determining risks and readiness

Modernizing your legacy ecosystem: Determining risks and readiness | 2021-03-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,348 2,349 2,350 2,351 2,352 2,558