Why NDR? See the Entire Elephant in the Room

Why NDR? See the Entire Elephant in the Room

By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern attacks leveraging more complex approaches, the definition is much broader now….

Read More

Sinclair TV stations downtime allegedly caused by a ransomware attack

Sinclair TV stations downtime allegedly caused by a ransomware attack

A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group broadcast television company. TV stations owned by the Sinclair Broadcast Group went down over the weekend officially due to technical issues, but some media [1,2] reported that it was a victim of a ransomware attack. The alleged attack compromised the Sinclair internal corporate network, the broadcasting systems of TV stations, email servers, and phone services…

Read More

Prison for UPMC Data Thief

Prison for UPMC Data Thief

A hacker from Michigan who stole and sold the sensitive data of tens of thousands of University of Pittsburgh Medical Center (UPMC) employees has been sent to prison.  Former Federal Emergency Management Agency (FEMA) IT specialist Justin Sean Johnson pleaded guilty on May 20 to counts 1 and 39 of a 43-count indictment. The court heard that the 30-year-old former resident of Detroit admitted infiltrating and hacking into the UPMC’s human resources server database in 2013 and…

Read More

Forensic Collections From a Mac: CHALLENG ES & SOLUTIONS

Forensic Collections From a Mac: CHALLENG  ES & SOLUTIONS

INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS and Windows file systems). With digital forensic professionals seeing more Mac laptops and other Apple devices more often, we created this guide to identify a few challenges that law enforcement and digital investigators may encounter and provide solutions and best practices for tackling these obstacles both…

Read More

Gartner: 8 security trends facing the enterprise

Gartner: 8 security trends facing the enterprise

As organizations become less centralized they face new security challenges that require new ways of addressing threats that will change the basic fabric of network security, according to Gartner analysts. A persistent challenge adapting to these changes is the skills gap–finding IT pros with the technical know-how to meet evolving security issues, Peter Firstbrook, Gartner vice president and anayst told attendees at Gartner IT Symposium/Xpo 2021 Americas. “Cybersecurity teams are being asked to secure countless…

Read More

Threat Trends: Firewall – Cisco Blogs

Threat Trends: Firewall – Cisco Blogs

These days, protecting the network perimeter is a foregone conclusion. However, there is no longer a monolithic perimeter—there are often multiple perimeters to protect. Unauthorized attempts to cross perimeters are frequent, and the need to defend against threats is critical to protect your assets. In any perimeter defense a key component is firewalls—the proverbial guard towers in your fortifications. They are chiefly responsible for controlling and inspecting the traffic coming into, and going out of,…

Read More

[Re-]Introducing the Cisco Certified DevNet Expert – Cisco Blogs

[Re-]Introducing the Cisco Certified DevNet Expert – Cisco Blogs

On a typically cool June 10, 2019, in San Diego, CA, we introduced a transformation in our network engineering certifications, with software, automation, and security woven throughout. We also announced a brand-new set of DevNet certifications that focused on a software-first approach to Cisco’s products and technologies. We had an Associate-level certification, various Specialist-level certifications, and a Professional-level certification. But something was missing. There was this little emblem over the Expert certification: Coming Soon. Well,…

Read More

Data Breach Hits US Dental Patients

Data Breach Hits US Dental Patients

A cyber-attack on the vendor of a network of dental practices may have exposed the data of tens of thousands of patients.  A cyber-criminal used a phishing attack to gain access to the computer systems of North American Dental Management between March 31 and April 1, 2021. Pittsburgh-based North American Dental Management provides administrative and technology support services for Professional Dental Alliance (PDA) offices. Following the security breach, PDA notified patients that an unauthorized individual may have…

Read More

Cisco UCS X-Series achieves 35 million IOPS performance in a single chassis – Cisco Blogs

Cisco UCS X-Series achieves 35 million IOPS performance in a single chassis – Cisco Blogs

I know what you’re thinking. Bill, it’s Tuesday, your next blog is supposed to be tomorrow. You’re correct. But when Tushar reached out to me with this amazing performance story on Cisco UCS X-Series, I didn’t think the news could wait. Let me introduce Tushar Patel, Principal Engineer, to give you all the details in his own words. I’ll be back tomorrow with a blog on X-Series & applications. By Tushar Patel   Adapting, Evolving,…

Read More

Trickbot spreads malware through new distribution channels

Trickbot spreads malware through new distribution channels

TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the infamous TrickBot (ITG23 and Wizard Spider) malware have resurfaced with new distribution channels to deliver malicious payloads, such as Conti ransomware. The gang support other cybercrime groups such as known Hive0105, Hive0106 (aka TA551 or Shathak), and Hive0107, supporting them in expanding their malware campaigns. “As of mid-2021, X-Force observed ITG23 partner with two additional malware distribution…

Read More
1 3,422 3,423 3,424 3,425 3,426 4,239