Security firm releases free Purple Knight tool to spot weaknesses in Active Directory

Security firm releases free Purple Knight tool to spot weaknesses in Active Directory

The AD report card scores the security of Group Policies, Kerberos security and AD infrastructure. Image: iStock/iBrave Between weak passwords and stolen credentials, companies need all the help they can get to strengthen cyberdefenses against bad actors always looking for a new way in. Security firm Semperis built Purple Knight to make it easy for companies to patch holes in Active Directory security. The tool was announced on March 16. The free tool assesses permissions…

Read More

Ransomware and IoT Malware Detections Surge by Over 60%

Ransomware and IoT Malware Detections Surge by Over 60%

Last year saw a double-digit surge in ransomware, IoT threats, new malware and cryptojacking, in what SonicWall has described as a “tipping point” in the cyber-arms race. The security vendor’s 2021 SonicWall Cyber Threat Report is compiled from data taken from over one million global sensors and cross-vector threat information shared among SonicWall security systems. Ransomware threats spiked 62% globally and 158% in North America as more sophisticated variants like Ryuk targeted larger organizations with…

Read More

VMware Broadens Multi-Cloud Management Support to Address Customer Flexibility and Choice

VMware Broadens Multi-Cloud Management Support to Address Customer Flexibility and Choice

News Detail Updated VMware vRealize Cloud Management Portfolio and CloudHealth by VMware Deepen Multi-Cloud Support for Amazon Web Services, Google Cloud, Microsoft Azure and VMware Cloud on AWS PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced innovations across its cloud management portfolio spanning CloudHealth by VMware and VMware vRealize Cloud Management on-premises and … Tue, 16 Mar 2021 00:00:00 Updated VMware vRealize Cloud Management Portfolio and CloudHealth by VMware Deepen Multi-Cloud Support for…

Read More

Microsoft One-Click Tool Mitigates Exchange Server Attacks

Microsoft One-Click Tool Mitigates Exchange Server Attacks

Microsoft has released a “one-click” tool to help organizations with limited resources to temporarily mitigate the threat posed by recent global attacks on Exchange servers. The “Microsoft Exchange On-Premises Mitigation Tool” has been designed for customers without dedicated IT or cybersecurity resources to help them patch the four zero-days being exploited in the wild, now know as “ProxyLogon” attacks. “By downloading and running this tool, which includes the latest Microsoft Safety Scanner, customers will automatically mitigate CVE-2021-26855…

Read More

How to Stop Getting Those Pesky Car Extended Warranty Calls

How to Stop Getting Those Pesky Car Extended Warranty Calls

Robocalls about your car’s extended warranty are annoying and potentially dangerous. Here’s why you’re getting them in the first place—and how to stop them. “We’re calling about your car’s extended warranty…” Yep, there’s a good chance you’ve picked up the phone and heard that phrase. The robocall strikes again. If you’ve gotten that call before, you’re not alone. According to YouMail, Americans received more than 4.6 billion robocalls in February 2021 alone. That’s literally millions of…

Read More

Scammers Targeting Upcoming COVID Relief Checks, Tax Refunds

Scammers Targeting Upcoming COVID Relief Checks, Tax Refunds

People are receiving fake forms containing malware to attach to stimulus checks that can steal personal banking information. As millions of Americans await their COVID relief check, cybercriminals are already taking advantage of the situation to scam people out of their stimulus money. The security company Proofpoint describes one effort where scammers sent out thousands of emails to Americans, asking them to fill out a fake form to apply for stimulus checks from the Internal Revenue Service. …

Read More

MoD Contractor Security Incidents Double in a Year

MoD Contractor Security Incidents Double in a Year

Cybersecurity incidents at Ministry of Defence (MoD) contractors appear to have doubled over the past year, with email data leaks a particular cause for concern, according to a new report. Sky News was able to piece together some of the puzzle from Freedom of Information (FoI) requests sent to the ministry for 2020 and 2019. They relate to the Warning, Advice and Reporting Point (WARP) system, which requires all contractors that process MoD information to…

Read More

The evolution of the corporate VPN: How COVID-19 has redefined VPN security

The evolution of the corporate VPN: How COVID-19 has redefined VPN security

The evolution of the corporate VPN: How COVID-19 has redefined VPN security | 2021-03-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

How AI can help prevent active shooters and save lives

How AI can help prevent active shooters and save lives

How AI can help prevent active shooters and save lives | 2021-03-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Navigating Transformation with Managed Cybersecurity Services

Navigating Transformation with Managed Cybersecurity Services

The coronavirus pandemic has added new layers to the threat landscape facing corporate security leaders in 2020 and going into 2021, as well. As businesses and workforces sought to adapt rapidly to remote working at scale, malicious groups and other threat actors began exploiting opportunities to target stressed people and systems with malware. The malware – increasingly sophisticated and leveraging social engineering techniques to deceive users into providing access to systems and data – continues…

Read More
1 2,355 2,356 2,357 2,358 2,359 2,556