Home Blog Page 19
The perimeter disappeared when remote working came along, and all the security mechanisms for protecting information assets behind a firewall, were no longer adequate. The attack surface has broadened to include home networks, and the attack vectors are directed...
Microsoft’s security experts identified a novel malware campaign targeting several IT, non-profit, and government organizations based in Ukraine. Tracked as WhisperGate, the activities of the destructive malware campaign were first spotted on January 13.  As per a report from...
Several organizations started the New Year globally with hacker intrusions and data breaches, but few cybercriminal groups benefitted from their malicious activities. A recent analysis from blockchain firm Chainalysis revealed that North Korean threat actors stole over $400 million...
IT experts rise to the rank of chief information security officer (CISO) because they have mastered the science and engineering involved in that discipline. But for a CISO to thrive, leadership skills are critical. And leadership is an art. By...
Ransomware in a triad is the title of a recent cybersecurity article that caught my attention. The same repetitiveness can be found in aviation and dates back to poor radio communications where it was necessary to repeat a message....
State-sponsored hackers from Russia continue to prevail in the cyberthreat landscape. Government authorities and organizations globally are warning about frequent cyberespionage campaigns from Russian actors. Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), FBI, and National Security Agency...
Since digitalization began, there has been a significant increase in organizations turning to cloud computing. Most companies leverage multiple cloud environments to host their critical IT infrastructures,  a primary target to cybercriminals. Cybersecurity experts from Cisco Talos recently uncovered...
In security, you always need to be thinking ahead about what might come down the pipeline. As we wrapped up the year 2021, I saw several areas across security where CISOs and other security leaders will likely concentrate their...
Security experts from SentinelLabs uncovered a high severity vulnerability in the KCodes NetUSB component used manufacturing of Wi-Fi routers from EDiMAX, Netgear, TP-Link, Tenda, D-Link, and Western Digital. NetUSB is a product developed by KCodes. It is designed to allow...
Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security vulnerabilities to break into organizations’ critical network systems. The U.S. Cybersecurity and Infrastructure Security Agency...