Latest Posts
Privilege Escalation Flaws Impact Wacom Update Helper
May 17, 2019 Added by:Ionut Arghire
Talos’ security researchers have discovered two security flaws in the Wacom update helper that could be exploited to elevate privileges on a vulnerable system.
Comments (0)
Answering Tough Questions About Network Metadata and Zeek
May 08, 2019 Added by:Kevin Sheu
As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.
Comments (0)
Qakbot Trojan Updates Persistence, Evasion Mechanism
May 06, 2019 Added by:Ionut Arghire
The Qakbot banking Trojan has updated its persistence mechanism in recent attacks and also received changes that potentially allow it to evade detection, Talos’ security researchers say. Also known as Qbot and Quakbot, the Trojan has been around for nearly a decade, and has received a variety of changes over time to remain a persistent threat, although its functionality remained largely unalte...
Comments (0)
Flaws in D-Link Cloud Camera Expose Video Streams
May 06, 2019 Added by:Ionut Arghire
Vulnerabilities in the D-Link DCS-2132L cloud camera can be exploited by attackers to tap into video or audio streams, but could also potentially provide full access to the device.
Comments (0)
SOAR: Doing More with Less
April 26, 2019 Added by:Michele Zambelli
Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.
Comments (0)
Gaining Control of Security and Privacy to Protect IoT Data
April 24, 2019 Added by:Mike Nelson
It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.
Comments (0)
Growing Reliance on Digital Connectivity Amplifies Existing Risks, Creates New Ones
April 24, 2019 Added by:Steve Durbin
Major threats to information security emerging over the next two years could impact businesses operating in cyberspace at break-neck speeds.
Comments (0)
How Microsegmentation Helps to Keep Your Network Security Watertight
April 24, 2019 Added by:Avishai Wool
Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.
Comments (0)
Through the Executive Lens: Prioritizing Application Security Vulnerabilities
March 28, 2019 Added by:Neal Goldman
By focusing on specific AppSec initiatives and applying well-tested strategies and tools, you can prioritize the most important issues to focus on.
Comments (0)
Next Generation Firewalls are Old News in the Cloud
March 27, 2019 Added by:Sanjay Kalra
As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.
Comments (0)
Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging
March 27, 2019 Added by:Perry Carpenter
Let’s talk about another Trojan Horse for the Mind -- visuals.
Comments (0)
Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
March 21, 2019 Added by:Ionut Arghire
Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.
Comments (0)
1 Million Apps Patched in Android Security Improvement Program
March 01, 2019 Added by:Ionut Arghire
Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says.
Comments (0)
The Role of Analytics in Protecting Healthcare Data Privacy and Security
February 27, 2019 Added by:Nilesh Dherange
Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.
Comments (0)
WINDSHIFT Hackers Target Government Agency in the Middle East
February 26, 2019 Added by:Ionut Arghire
A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.
Comments (0)
The Rise of Ransomware and the Consequences for SMBs
February 21, 2019 Added by:Timur Kovalev
Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.
Comments (0)
Trump Administration Starts the Ball Rolling with the National Cyber Strategy
February 19, 2019 Added by:Sam Bocetta
The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around
Comments (0)
A Call to Structure
February 15, 2019 Added by:Chris O'Brien
One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.
Comments (0)
What CEOs Need to Know About the Future of Cybersecurity
February 14, 2019 Added by:Steve Durbin
CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.
Comments (0)
Who’s Responsible for Your Cyber-Security?
February 12, 2019 Added by:Matt Johnson
Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.