The anatomy of a tabletop exercise

The anatomy of a tabletop exercise

The anatomy of a tabletop exercise | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders

Top de-escalation strategies and training for security leaders | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing

Emerging technology, evolving threats — Part I: Quantum computing | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does

Nominate a deserving colleague: That’s what a leader does | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Tripwire Patch Priority Index for July 2021 | The State of Security

Tripwire Patch Priority Index for July 2021 | The State of Security

Tripwire’s July 2021 Patch Priority Index (PPI) brings together important vulnerabilities from VMware, Adobe, Oracle, and Microsoft. First on the patch priority list this month are patches for Microsoft Print Spooler (CVE-2021-34527, CVE-2021-1675) and vSphere Client (CVE-2021-21985). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible. Up next are patches for Adobe Reader and Acrobat that resolve 19 issues including memory leak,…

Read More

Taking a Look at AWS and Cloud Security Monitoring

Taking a Look at AWS and Cloud Security Monitoring

More and more companies understand the benefits of cloud computing, which is making their migration to the cloud more rapid. Per IDG’s 2020 Cloud Computing Study, 81% of organizations said that they’ve migrated either one application or a portion of their infrastructure to the cloud. The reasons why a company would shift its services towards the cloud depend on its business priorities, of course. General reasons for migrating include 1) cost-savings, 2) reliability, 3) scalability,…

Read More

This ethical hacking course could give your cybersecurity career a boost

This ethical hacking course could give your cybersecurity career a boost

Move up in the profitable field of cybersecurity by improving your ethical hacking skills. Image: Teera Konakan/Moment/Getty Images Cybersecurity experience was recently cited as one of the top three most scarce skills in the U.S., U.K. and several European countries. You can sharpen your ethical hacking skills with The Complete Pentesting & Privilege Escalation Course–while training from home at your own pace. The 27 lectures in this bundle cover Kernel Exploit, Linux/Windows Privilege Escalation, CTF…

Read More

The Silver Bullet for Ransomware’s Golden Goose

The Silver Bullet for Ransomware’s Golden Goose

Ransomware is a hugely profitable business. The only way to end it is to stop criminals from making money off your data. By Elliot Lewis, Co-founder, and CEO of Keyavi Data Corp. It’s every CEO’s worst nightmare: You report to work early one morning only to find your computers frozen, your essential data locked and an ominous message from cybercriminals demanding an outlandish ransom to restore them. In the meantime, your employees can’t work, your customers can’t buy your products and you’re bleeding revenue by the minute. Could…

Read More

LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains

LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains

A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez reported spotted a new version of the LockBit 2.0 ransomware that encrypts Windows domains by using Active Directory group policies. Kramez explained that this is the first ransomware that automates this process. A look at LockBit 2.0’s payment site / support chat. Basically after the new…

Read More
1 3,474 3,475 3,476 3,477 3,478 4,104