Managing risks in an evolving cybersecurity environment

Managing risks in an evolving cybersecurity environment

In today’s digital landscape, the rise of mobile device usage has made enterprises increasingly vulnerable to fraud. Recent research indicates that 76% of enterprises lack sufficient protection against voice and messaging fraud. This gap in security has become a critical vulnerability as smishing (SMS phishing) and vishing (voice phishing) surge following the recent developments in AI technology, which allows fraudsters to target more victims with increased sophistication. With 61% of enterprises reporting significant financial losses…

Read More

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments. Enterprise security company Proofpoint said it observed campaigns using HTTP clients Axios and Node Fetch to send HTTP requests and receive HTTP responses from web servers with the goal of conducting ATO attacks. “Originally sourced from public repositories like GitHub, these tools are increasingly used in attacks like Adversary-in-the-Middle (AitM)…

Read More

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

Dec 17, 2024Ravie LakshmananCyber Espionage / Malware A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down further payloads,” Proofpoint researchers Nick Attfield, Konstantin Klinger, Pim…

Read More

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

This blog is continuation of the previous blog on using Cisco Secure Network Analytics. In this part, we cover leveraging public Cisco Talos blogs and third-party threat intelligence data with Cisco Secure Network Analytics. Be sure to read the first part as this part makes references back to Host Group and Custom Security Event instructions covered in the original blog. Cisco Talos Blogs The talented researchers at Cisco Talos regularly publish blogs on threats and…

Read More

Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

Exploring AAA and TACACS Configuration with Cisco Modeling Labs

Exploring AAA and TACACS Configuration with Cisco Modeling Labs

I’ll admit to not having done a thorough verification. However, I’d still bet money that AAA/RBAC services are more frequently mentioned on Cisco certification blueprints than any other networking topic. From the CCNA to the Expert level, you’ll find AAA, TACACS+, RADIUS, and RBAC listed on the exam topics. Here is a handful of examples if you’d like to check it out yourself: 200-301 CCNA 2.8 Describe AP and WLC management access connections (Telnet, SSH,…

Read More

Enter the World of Ethical Hacking with Confidence

Enter the World of Ethical Hacking with Confidence

TL;DR: Get lifetime access to The 2024 All-in-One Ethical Hacking Course Bundle for just $44.99 and start mastering ethical hacking techniques to protect and secure networks. The 2024 All-in-One Ethical Hacking Course Bundle is a must-have for professionals and aspiring cybersecurity experts looking to enhance their skills in a rapidly evolving field. With 18 comprehensive courses totaling 92 hours of self-paced content, this bundle provides everything you need to dive deep into ethical hacking, penetration…

Read More

Learn Cybersecurity Essentials for Just $40 from Home

Learn Cybersecurity Essentials for Just  from Home

TL;DR: Get The 2024 Cybersecurity Essentials Bundle while it’s on sale for just $39.99 (reg. $1,000). Cybersecurity is a growing field with no signs of slowing down. According to an article in Forbes, the U.S. Bureau of Labor and Statistics estimates that it will grow by 32% through 2032. If you want to get in on this action or elevate your skills, the 2024 Cybersecurity Essentials Bundle is currently on sale for just $39.99. What’s…

Read More

Setting Up Your Network Security? Avoid These 4 Mistakes

Setting Up Your Network Security? Avoid These 4 Mistakes

Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like: Weak passwords. Outdated software. Poor training. Excessive privileges. If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through…

Read More

Navigating Change: The Power of Digital Resilience to Transform Networks

Navigating Change: The Power of Digital Resilience to Transform Networks

Users don’t want excuses when it comes to digital experiences. They expect their devices, apps, and services to work―period. And these experiences matter; when they don’t meet expectations, the success, reputation, and brand identity of every modern organization is at risk. But as the scope of IT teams grows to encompass truly global area networks, consistently great experiences are harder than ever to achieve. In today’s hyper-distributed environment, it’s impossible to build and operate secure,…

Read More
1 2 3 10