Bring on 2021! | McAfee Blogs

Bring on 2021! | McAfee Blogs

With 2021 approaching, it is a time to both reflect on the outstanding progress we have each made – personally and professionally, and warmly welcome a new chapter in 2021!   2020 has been one of the most unexpected years in our history. However, despite COVID-19, we had some amazing successes.  January brought McAfee our new CEO – Peter Leav. It’s hard to believe it has only been a year under his leadership. What an impact! And, McAfee is back on the stock…

Read More

Actionable Threat Intelligence Available for Sunburst Cyber Attacks on SolarWinds

Actionable Threat Intelligence Available for Sunburst Cyber Attacks on SolarWinds

Background On Dec. 13, FireEye published a detailed analysis about the attack carried out against SolarWinds, which appears to have compromised its Orion IT monitoring and management platform to spread the Sunburst Backdoor malware. As part of the attack, which started in March, the Orion platform started sending out the digitally-signed trojanized malware via regular updates. According to SolarWinds, the compromised update may have been installed by fewer than 18,000 of its customers, including many…

Read More

Anomali ThreatStream Sunburst Backdoor Custom Dashboard Provides Machine Readable IOCs Related To SolarWinds Supply Chain Attack

Anomali ThreatStream Sunburst Backdoor Custom Dashboard Provides Machine Readable IOCs Related To SolarWinds Supply Chain Attack

SolarWinds, a provider of IT management and monitoring software deployed by thousands of global customers, was breached between March and June of 2020 by an Advanced Persistent Threat (APT) that cybersecurity company FireEye is tracking as UNC2452. As part of the supply chain attack, the APT compromised the company’s Orion business software with trojanized malware known as Sunburst, which opens a backdoor into the networks of customers who executed Orion updates. Immediately following news of…

Read More

5 minutes with Brian Soby – Understanding Software as a Service (SaaS)

5 minutes with Brian Soby – Understanding Software as a Service (SaaS)

5 minutes with Brian Soby – Understanding Software as a Service (SaaS) | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

How companies can use automation to secure cloud data

How companies can use automation to secure cloud data

Data automation allows companies to conduct operations more consistently, securely, and reliably. Learn how one company tackled the challenges. Image: iStock/ADragan Data automation is going to be a major focus for my team of system administrators in 2021. Since I work for a financial organization, security is a paramount concern, so this is an area in which we intend to hit the ground running in the New Year. SEE: Managing the multicloud (ZDNet/TechRepublic special feature)…

Read More

Why stateful machine learning could help cybersecurity efforts

Why stateful machine learning could help cybersecurity efforts

AI and machine learning have the potential to take a bite out of cybercrime, but let’s not forget the human factor. Image: iStockphoto/AndreyPopov Artificial Intelligence (AI) is being touted as a technology that will reduce cybercrime. Ed Bishop, cofounder and CTO at Tessian, agrees that AI will help but only if it is configured to protect people. “Despite thousands of cybersecurity products, data breaches are at an all-time high,” writes Bishop in his sponsored VentureBeat…

Read More

Hacking Christmas Gifts: Remote Control Cars

Hacking Christmas Gifts: Remote Control Cars

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications. Some of the risks discussed in this series may be over the top and even…

Read More

A Different Kind of Virus – A Review of Ransomware in 2020

A Different Kind of Virus – A Review of Ransomware in 2020

As if dealing with COVID-19 were not enough, 2020 turned out to be a banner year for another troublesome strain of virus— ransomware. Malicious actors grew more sophisticated, daring and brutal. They also hit a number of high-profile targets. For those of you who didn’t keep up with all of the developments in the ransomware space, we’ve broken down some of the most important events and trends of the year here. Growing in Scale and…

Read More

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,451 2,452 2,453 2,454 2,455 2,541