World Book Day: Cybersecurity’s Quietest Celebration

World Book Day: Cybersecurity’s Quietest Celebration

The last time you were in a library, or a bookstore, you probably noticed how quiet it was.  This doesn’t mean that people weren’t excited, or downright celebrating, they were engaged in a different method of celebration; the kind that takes place between the covers of a good book. April 23rd marks the celebration of World Book and Copyright Day. As eloquently stated on the UNESCO web page, “through reading . . . we can…

Read More

A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

Imagine an arc. Not just any arc. A rainbow. When we think of a rainbow, it conjures impressions of color, inspiration and even supernatural characteristics.  Does your cybersecurity program long for a magical pot of gold at the end of a rainbow? With all the moving parts of cybersecurity, sometimes it seems like we are merely chasing rainbows. However, it doesn’t have to be that way. Now, thanks to the innovative products in the Tripwire catalog, there is…

Read More

Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection | 2021-04-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Apple supplier Quanta hit with $50 million ransomware attack from REvil

Apple supplier Quanta hit with  million ransomware attack from REvil

Hackers claim to have infiltrated the networks of Quanta Computer Inc., which makes Macbooks and hardware for HP, Facebook and Google. Red binary computer code ransom screen background with stop symbol sign. Suebsiri, Getty Images/iStockphoto Ransomware group REvil claimed in a blog post published on Tuesday to have stolen blueprints for Apple’s latest products. On the same day, Apple CEO Tim Cook announced multiple new products at an online event.  Quanta Computer Inc. acknowledged the…

Read More

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle addresses over 250 CVEs in its second quarterly update of 2021 with 390 patches, including 34 critical updates. Background On April 20, Oracle released its Critical Patch Update (CPU) for April 2021, the second quarterly update of the year. This CPU update contains fixes for 257 CVEs in 390 security updates across 32 Oracle product families. Out of the 390 security updates published this quarter, over 50% were assigned a high severity. Critical vulnerabilities…

Read More

The award for the most popular movie used in leaked passwords goes to…

The award for the most popular movie used in leaked passwords goes to…

Ahead of Sunday’s Oscars awards ceremony, password management provider Specops rolls out the red carpet to reveal its list. Image: designer491, Getty Images/iStockPhoto “Rocky” might be your all-time favorite movie, but if you’re using it as a password, beware. This highly popular, feel-good boxing movie of the 1970s has the dubious distinction of showing up on breached password lists nearly 96,000 times, according to password management provider Specops. Just ahead of Sunday’s Oscars, the firm…

Read More

Stallone Classic a Password Favorite

Stallone Classic a Password Favorite

New analysis of leaked login data has revealed which movie titles most frequently feature in passwords. Specops trawled through more than 800 million breached passwords to determine which big-screen hits were favored by users. The selection was a subset of a list of 2 billion passwords that have appeared in breached lists. Topping the list was the sports drama Rocky, written by and starring Sylvester Stallone as a kind-hearted working class Italian-American boxer who dreams of fighting his…

Read More

Q&A on the Optional P2PE Solution Inventory Template

Q&A on the Optional P2PE Solution Inventory Template

  Point-to-Point Encryption (P2PE) technology makes data unreadable so it has no value to criminals even if stolen in a breach. Merchants can take advantage of this technology with a P2PE solution, a combination of secure devices, applications, and processes that encrypt payment card data from the point it is used at a payment terminal until it reaches a secure point of decryption. PCI P2PE Solutions are those that have been validated as meeting the…

Read More

Data Breach at New England’s Largest Energy Provider

Data Breach at New England’s Largest Energy Provider

A misconfiguration error has exposed personal data belonging to customers of New England’s largest energy provider. On March 16, Eversource discovered that one of its cloud data storage folders had erroneously been set to open access rather than to restricted access.  The company serves more than 3.6 million electric and natural gas customers in Connecticut, Massachusetts, and New Hampshire. An investigation into the data breach launched by Eversource’s security team found that the unsecured folder…

Read More
1 2,393 2,394 2,395 2,396 2,397 2,658