Analysis | The Cybersecurity 202: Scammers are already targeting the next round of coronavirus relief checks

Analysis | The Cybersecurity 202: Scammers are already targeting the next round of coronavirus relief checks

The emails encouraged recipients to download an Excel sheet which, once downloaded, launched a malicious software known as a Dridex that steals personal banking information and other login credentials. In reality, the payments are calculated and sent by the government automatically based on your taxes.  This is just the latest example of how the global coronavirus crisis has spawned more scams than any other event in the past decade.  “Pandemic-themed attacks remain ever-present, and we’ve…

Read More

How to optimize critical communications in the age of COVID-19 (and beyond)

How to optimize critical communications in the age of COVID-19 (and beyond)

How to optimize critical communications in the age of COVID-19 (and beyond) | 2021-03-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

5 top Linux server distros: How to choose the right one

5 top Linux server distros: How to choose the right one

More and more networking pros need to familiarize themselves with Linux because the operating system underpins so many enterprise tools and platforms including software-defined networking and SD-WANs, cloud networking, network automation, and configuration management. And in the decades since it was first introduced, the number of distributions of Linux has blossomed as developers create versions that meet the needs of specific interest groups. While all the versions share a common core, they each have distinguishing…

Read More

NCSC: Don’t Fall for Mother’s Day Scams This Week

NCSC: Don’t Fall for Mother’s Day Scams This Week

UK security experts have warned online shoppers to be aware of scams ahead of Mothering Sunday this weekend. The National Cyber Security Center (NCSC), an offshoot of spy agency GCHQ, issued the notice yesterday, claiming that the mass shift to e-commerce during the pandemic has exposed more consumers to fraud. It gave no specific details of current campaigns to look out for, although cyber-criminals will usually tailor their efforts according to current events. Unsolicited emails and…

Read More

The evolution of workplace data privacy best practices

The evolution of workplace data privacy best practices

The Evolution of Workplace Data Privacy Best Practices | 2021-03-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Saving time and effort during lockdowns with mass notification

Saving time and effort during lockdowns with mass notification

Saving time and effort during lockdowns with mass notification | 2021-03-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Ghidra 101: Loading Windows Symbols (PDB files)

Ghidra 101: Loading Windows Symbols (PDB files)

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively. The process of transforming source code into application binaries is a lossy process, but at least some…

Read More

Compliance – The Invisible Hand Guiding Cybersecurity

Compliance – The Invisible Hand Guiding Cybersecurity

Have you ever worked with a company that operates as “close to broken” as reasonably possible? Companies that follow that mindset usually do not have the most robust security practice, and they certainly will walk very close to the edge of compliance. Even if you don’t work in such a dysfunctional enterprise as described above, many companies still do not appreciate the interconnection of security and compliance. Both are often considered cost centers, and that paints a…

Read More

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

We urge organizations to patch Proxylogon (CVE-2021-26855) and related vulnerabilities (CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) in Microsoft Exchange Server and investigate for potential compromise within their networks. Here’s how Tenable products can help. Background Following Microsoft’s out-of-band advisory for four zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild by a nation-state threat actor known as HAFNIUM, multiple reports have emerged that over 30,000 organizations may have been compromised as a result of these…

Read More
1 3,794 3,795 3,796 3,797 3,798 4,088