Moving to Active Defense: What It Means, How It Works and What You Can Do Now

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move from a passive approach to one that’s more active. And MITRE’s introduction of Shield addresses this directly. MITRE, the federally funded not-for-profit, has made it clear that active defense, rather than the standard whack-a-mole responsive defense, is paramount in the fight against cybercrime. With the…

Read More

Overview of Azure VMware Solution Next Evolution – VMware Cloud Community

Overview of Azure VMware Solution Next Evolution – VMware Cloud Community

Originally posted on emadyounis.com  This post provides an overview of Azure VMware Solution, its components, and resources to help customers get started. The general availability (GA) for the next evolution of Azure VMware Solution (AVS) was announced yesterday during the Microsoft Ignite 2020 virtual conference. This is a joint partnership between Microsoft and VMware, where Azure VMware Solution is a Microsoft managed service built on Azure bare metal infrastructure and cloud verified by VMware. The initial launch of the Azure…

Read More

China-linked APT31 group was behind the attack on Finnish Parliament

China-linked APT31 group was behind the attack on Finnish Parliament

China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. According to the government experts, the hackers breached some parliament email accounts in December 2020. “Last year, the Security Police has identified a state cyber espionage operation against Parliament, which tried…

Read More

PS5 phishing scam baits gamers with promise of free console

PS5 phishing scam baits gamers with promise of free console

Scammers are taking advantage of a shortage of Sony PlayStation 5 consoles to try to hoodwink people eager to snag one, says Kaspersky. Image: Sony Cybercriminals behind phishing campaigns have a knack for knowing which trends and topics will catch the eye of potential victims. Sony’s new PS5 is one topic ripe for exploitation, especially since the new console is in short supply due to a scarcity of semiconductor chips. A Friday report from security…

Read More

Threat Roundup for March 12 to March 19 – Cisco Blogs

Threat Roundup for March 12 to March 19 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 12 and March 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

US Indicts Software Engineer

US Indicts Software Engineer

A Swiss software developer has been indicted by the US government for allegedly stealing source code and proprietary data and publishing it online. On March 18, a grand jury indicted 21-year-old Till Kottman for identity and data theft and computer-intrusion crimes spanning 2019 to the present.   Lucerne resident Kottman, also known as “deletescape” and “tillie crimew,” allegedly conspired with others to hack into multiple companies and government entities and publish the private data of more than 100 entities on…

Read More

Shaking up the SD-WAN Market and Propelling Partner Success – Cisco Blogs

Shaking up the SD-WAN Market and Propelling Partner Success – Cisco Blogs

Cisco is shaking up the market and doubling down on SD-WAN while doing all we can to help our partners propel to the next level. Why? Because the market is crazy dynamic, SD-WAN is the connective tissue for network digital transformation and customer demands change seemingly by the hour. I am thrilled about the hyper-focus that our partners have demonstrated not only around loyalty to Cisco but also showing true agility in the market being…

Read More

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack from novel and unexpected angles, while defenders are forced into a reactive role. The asymmetric nature of cybersecurity isn’t the sole reason data breaches continue to rise every year, of course. The popularity of cloud computing and constant expansion of the attack surface also present…

Read More

How to use semanage and avoid disabling SELinux

How to use semanage and avoid disabling SELinux

Jack Wallen introduces you to three semanage commands that will help make dealing with SELinux considerably easier. Image: iStock/iBrave I get it–SELinux is challenging, and when your applications or services are prevented by the security layer, your first inclination is to set it to either Disabled or Permissive. In a time when security is at a premium, you can’t afford to make that change, else you risk the security of your entire system or your…

Read More

APT31 Fingered for Cyber-Attack on Finnish Parliament

APT31 Fingered for Cyber-Attack on Finnish Parliament

An advanced persistent threat group (APT) with links to the Chinese government has been blamed for a cyber-espionage attack on Finland’s parliament.  The Finnish Security and Intelligence Service (Supo) announced on Thursday that APT31 was behind a cyber-espionage campaign that targeted the Finnish parliament last fall.  Security companies including Checkpoint and FireEye have linked APT31’s activities with the state cyber-operations of the People’s Republic of China.  “Supo identified a state-run cyber espionage operation targeted last year against the parliament with the…

Read More
1 3,546 3,547 3,548 3,549 3,550 3,870