Tripwire Patch Priority Index for November 2020 – VERT

Tripwire Patch Priority Index for November 2020 – VERT

Tripwire‘s November 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, and Oracle. First on the patch priority list this month are three vulnerabilities in Oracle WebLogic Server that have recently been included within the Metasploit exploit framework. Supported versions of Oracle WebLogic Server that are affected include 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Up next on the patch priority list this month are patches for Microsoft Scripting Engine, Browser, and Microsoft…

Read More

BTC-e Founder Gets Five Years for Money Laundering

BTC-e Founder Gets Five Years for Money Laundering

A Russian national has been sentenced to five years after being found guilty by a French court of large-scale money laundering, although charges relating to his alleged involvement in ransomware development were dropped. Alexander Vinnik was extradited at the start of 2020 to France from Greece, where he had been since his arrest there in 2017. The US authorities indicted him that year for laundering over $4bn in funds via his Bitcoin exchange, BTC-e. They…

Read More

Nutanix expands hybrid-cloud features to support unstructured data

Nutanix expands hybrid-cloud features to support unstructured data

Nutanix has expanded the capabilities of its Objects and Files unstructured-data storage offerings with new hybrid-cloud capabilities for deploying a scale-out storage fabric across their various cloud environments. These new storage services are built on the recently launched Nutanix Clusters, which support Nutanix’s hyperconverged infrastructure (HCI) software running in AWS and, eventually, Microsoft Azure. New features include cloud tiering for object storage, hybrid-cloud file storage, and simplified disaster recovery. “IT teams around the world are…

Read More

Using pidof and pgrep to list process IDs

Using pidof and pgrep to list process IDs

The pidof and pgrep commands provide listings of process IDs (PIDs) for process names that you provide as arguments. This post shows how to use these commands and illustrates the differences between them with a series of examples. pidof There are a number of ways to determine the PID of a process running on a Linux system, but the easiest is probably a command called pidof. Read this as “PID of” and you’ll have an…

Read More

The election’s over, but threats to government and critical infrastructure don’t stop

The election’s over, but threats to government and critical infrastructure don’t stop

The election’s over, but threats to government and critical infrastructure don’t stop | 2020-12-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Consider these credentials when hiring a ransomware negotiator

Consider these credentials when hiring a ransomware negotiator

Consider these credentials when hiring a ransomware negotiator | 2020-12-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Supporting your security team remotely

Supporting your security team remotely

Supporting your security team remotely | 2020-12-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Ghidra 101: How to Use the Cursor Text Highlighting Feature

Ghidra 101: How to Use the Cursor Text Highlighting Feature

In this blog series, I will be putting the spotlight on useful Ghidra features that you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective while reverse engineering. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively. What is Cursor Text Highlighting? In this post, I will be discussing the Cursor…

Read More

4 Things a Good Vulnerability Management Policy Should Include

4 Things a Good Vulnerability Management Policy Should Include

Organizations face an ever-evolving threat landscape. With this in mind, it is imperative that organizations keep an up-to-date vulnerability management policy for remediating and controlling security vulnerabilities that may lead to a breach. A good vulnerability management policy should contain the following: An Overview of what the policy is intended to do. The Scope of the policy. Roles and Responsibilities under the organization. Vulnerability Remediation/Risk Mitigation. Overview Taking the time to give a short summary…

Read More

Protecting Workloads Across Any Cloud and Application…Anywhere!

Protecting Workloads Across Any Cloud and Application…Anywhere!

Register to attend the December 14 webinar: Protecting your Cloud-Native Applications with Cisco Secure Workload This blog is authored by Ed McNicholas, Cybersecurity Technical Solutions Architect for the Cisco Global Security Sales Organization Automating and implementing a secure, zero-trust model for micro-segmentation based on application behavior and telemetry is easy to do using Cisco Secure Workload (formerly known as Tetration). See how your business can seamlessly achieve workload protection by providing: Reduced attack surface –…

Read More
1 3,709 3,710 3,711 3,712 3,713 3,817