Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

We urge organizations to patch Proxylogon (CVE-2021-26855) and related vulnerabilities (CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) in Microsoft Exchange Server and investigate for potential compromise within their networks. Here’s how Tenable products can help. Background Following Microsoft’s out-of-band advisory for four zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild by a nation-state threat actor known as HAFNIUM, multiple reports have emerged that over 30,000 organizations may have been compromised as a result of these…

Read More

Driving Impact with Strong Leadership – Cisco Blogs

Driving Impact with Strong Leadership – Cisco Blogs

Cisco’s purpose is to power an inclusive future for all, and that purpose infuses all that we do, whether it’s our deep focus on delivering the best results for our customers, partners, and employees, or our commitment to making a difference in communities across the world. That purpose also guides our strategy for driving innovation – we are committed to helping our customers connect, secure and automate their digital agility in a cloud-first world, and…

Read More

How the Microsoft Exchange hack could impact your organization

How the Microsoft Exchange hack could impact your organization

Cybercriminals are racing to exploit four zero-day bugs in Exchange before more organizations can patch them. Image: Microsoft Organizations that run Microsoft Exchange Server are being urged to apply several bug fixes to the program in response to a hack from a Chinese cybercriminal group. The attack has sparked concern among everyone from security experts to the White House. Early last week, Microsoft revealed that a China-based group called Hafnium has been launching cyberattacks against…

Read More

Outsourcing Security Operations with Cisco Secure Endpoint

Outsourcing Security Operations with Cisco Secure Endpoint

Companies and organizations in our modern world have a big problem — there are not enough people with the right skill set. What kind of people? Cyber security experts that can handle their company’s security incidents. This is not a new problem. As a result of this, more and more organizations are outsourcing their security operations to Managed Security Services Providers (MSSP). A MSSP has a goal to prove their ongoing value to customers by…

Read More

Virginia Passes New Data Protection Law

Virginia Passes New Data Protection Law

Virginia governor Ralph Northam has signed a new state data protection act into law.  The Virginia Consumer Data Protection Act (CDPA) requires people conducting business in the Commonwealth of Virginia to comply with a novel set of data security and privacy requirements.  The CDPA, which mirrors some of the provisions laid out in the EU’s General Data Protection Regulation (GDPR), comes into effect on January 1, 2023.  Businesses found to have violated the CDPA will…

Read More

Hackers Target Texas University

Hackers Target Texas University

An ongoing network outage at a university in Texas is believed to have been caused by a malicious hack. The computer network of the University of Texas at El Paso was turned off out of caution after a “potentially malicious intrusion” was detected in the early hours of Friday morning. Email and the server hosting the university’s website were affected by the incident, forcing faculty and students to communicate via Blackboard. The cyber-attack has also…

Read More

TiG Acquires ThirdSpace

TiG Acquires ThirdSpace

British tech company TiG Data Intelligence has successfully completed the acquisition of identity and security company ThirdSpace.  ThirdSpace began life in 2002 as Oxford Computer Group UK. The company’s first ever client, University West of England, is still working with them today. Operating as a specialist arm of TiG, ThirdSpace will retain its independent capability and expertise and its current management structure.  “We are delighted to be realising one of ThirdSpace’s strategic goals in expanding our security capabilities…

Read More

How IOS XE Developers at Cisco Work Remotely and Cohesively on a 190-million-line Code Base – Cisco Blogs

How IOS XE Developers at Cisco Work Remotely and Cohesively on a 190-million-line Code Base – Cisco Blogs

The option to work remotely predated the pandemic at Cisco. I’ve worked at least partially as a remote worker most of my 20+ years as an IOS developer. As a major vendor of VPN, teleconferencing, and messaging solutions, we already had the infrastructure, expertise, and experience to work remotely. When the company officially closed its offices in March of last year to 75,900 employees, IOS XE  developers were well prepared. The development environment within Enterprise…

Read More

REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims

REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims

The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business partners to force victims to pay the ransom. The REvil/Sodinokibi ransomware operators announced that they are using DDoS attacks and voice calls to victim’s business partners and journalists to force the victims into pay the ransom. The announcement shows an improvement in the double-extortion tactic, which doesn’t limit to threatening the victims to leak the stolen files in case…

Read More
1 3,567 3,568 3,569 3,570 3,571 3,860