Why We Care About Cybersecurity Hygiene

Why We Care About Cybersecurity Hygiene

By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as important as maintaining good personal hygiene habits. We must maintain high cybersecurity standards to protect our digital health from some common cyber threats. Common threats to our digital health Malicious software (malwares) designed to steal information and or cause damage to our connected devices. Viruses that infect connected devices and then spread to others while giving cybercriminals…

Read More

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as UNC2465, has conducted a supply chain attack against a CCTV vendor, Mandiant researchers discovered. UNC2465 is considered one of the main affiliated of the DARKSIDE group, along with other affiliates gangs tracked by FireEye/Mandiant as UNC2628 and UNC2659. The crooks compromised the website of the…

Read More

Texan Admits Data Center Bomb Plot

Texan Admits Data Center Bomb Plot

A man from Texas could be facing up to 20 years in prison after pleading guilty to plotting to blow up a data center in Virginia. Seth Aaron Pendley, of Wichita Falls, was arrested in April after trying to purchase what he believed to be an explosive device from an undercover FBI employee in Fort Worth. The 28-year-old admitted that he had planned to use the device to destroy servers in an Amazon-owned data center located on…

Read More

New Jersey Councilor Charged with Cyber-harassment

New Jersey Councilor Charged with Cyber-harassment

A councilor from New Jersey has been arrested and charged with waging a campaign of cyber-harassment against a former girlfriend.  Detectives from the Cape May County Prosecutor’s Office, with the assistance of detectives from the Middle Township Police Department, launched an investigation into the activities of 43-year-old realtor and Cape May councilman Christopher Bezaire in May 2021 after allegations of cyber-abuse were made.  Bezaire, who is the president of the Cape May County Board of Realtors, was…

Read More

Colorado Passes New Privacy Act

Colorado Passes New Privacy Act

The Centennial State has unanimously passed a new data privacy act to safeguard Coloradoans’ personal information. On June 8, the state Senate approved the Colorado Privacy Act after a series of revisions were made. The Act is due to take effect on July 1, 2023, and now awaits the signature of state governor Jared Polis.  Should the Act become law, Colorado will follow California and Virginia by enacting comprehensive privacy legislation. The Act gives consumers who reside in Colorado five…

Read More

Cisco Secure: Supporting NIST Cybersecurity Framework

Cisco Secure: Supporting NIST Cybersecurity Framework

Extending the alignment to include more Cisco products Why should you care? With so many security frameworks, it can be difficult to know where to start from. While many organizations are challenged with managing and improving their cybersecurity programs against the dynamic threat landscape, it’s not easy to pick one framework over another. So where do they start from – ISACA COBIT 5? ISO27000 series? CIS CSC? NIST CSF? SABSA? Or something else? National Institute…

Read More

Announcing SecureX Academy – Cisco Blogs

Announcing SecureX Academy – Cisco Blogs

SecureX has changed the way our customers do the work of securing their environments. We have been able to bring together the Cisco Secure portfolio, 3rd party tools and data sources, and a robust platform architecture into which these technologies can be plugged, in a way that saves organizations time and money and increases their security, using just the free SecureX architecture and the tools and people they already have. Along the way, we have…

Read More

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape | 2021-06-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Inon Shkedy – API security risks

5 minutes with Inon Shkedy – API security risks

5 minutes with Inon Shkedy – API security risks | 2021-06-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Microsoft’s new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Microsoft’s new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Devices have multiple OSs and firmware running, and most organisations don’t know what they have or if it’s secure. Microsoft will use ReFirm to make it easier to find out without being an expert. ReFirm fits in with Azure services to scan and update IoT devices.  Image: Microsoft As operating systems become more secure, attackers are increasingly shifting their attention to firmware, which is less visible, more fundamental and rarely well protected.  Vulnerabilities in firmware…

Read More
1 3,746 3,747 3,748 3,749 3,750 4,291