PuTTY SSH Client Vulnerability Allows Private Key Recovery
The recent discovery of a critical vulnerability in the PuTTY SSH and Telnet client, identified as CVE-2024-31497, has raised significant concerns among IT professionals and developers. Read on to get the details. Tell me more about the PuTTY SSH client vulnerability This vulnerability affects versions 0.68 to 0.80 of PuTTY, ... Read More
MDR and EDR – Why One Doesn’t Cancel Out The Other
Strong detection and response capabilities are pivotal for identifying and mitigating threats before they can cause significant damage. As attackers employ advanced tactics that often bypass perimeter defenses, the focus shifts to not only preventing breaches but also quickly detecting and responding to incidents that do occur. Managed detection and ... Read More
Microsoft’s April 2024 Patch Tuesday: Updates for 150 Vulnerabilities and Two Zero-Days
In a significant security update, Microsoft has released its April 2024 Patch Tuesday updates, which address a hefty 150 vulnerabilities across its suite of products. This update is particularly noteworthy not only for the sheer volume of vulnerabilities it covers but also because it includes fixes for two zero-day vulnerabilities ... Read More
MDR for Better Office 365 Security
Microsoft Office 365 is a stalwart suite of apps that powers collaboration, communication and productivity for companies of all sizes. Companies gravitate toward tools like Exchange Online for email communications, SharePoint for document management and collaboration, Power BI for analytics, and Teams for unified communication and teamwork. Despite the many ... Read More
Mastering MITRE: Enhancing Cybersecurity with Device Log Mapping
In the dynamic realm of cybersecurity, the MITRE ATT&CK framework has become a pivotal tool for organizations striving to fortify their defenses against the myriad of cyber threats that loom in the digital age. The webinar, “The MITRE Touch: Practical Strategies for Mapping Device Logs to MITRE ATT&CK,” hosted by ... Read More
A Primer on SaaS Security Risks
The SaaS (software as a service) model facilitates new, innovative solutions by reducing the need for heavy upfront investments in infrastructure and software development. The model also provides companies that subscribe to SaaS solutions with lower-cost, scalable apps. It’s important to remember, though, that the convenience and overall benefits of ... Read More
Event Recap: Highlights from Nuspire’s Time at FutureCon Baltimore
The Nuspire team recently attended FutureCon Baltimore, an event that yielded a myriad of meaningful discussions that not only covered the sharing of cybersecurity knowledge, but also delved into the key challenges and pain points cybersecurity professionals face. The one-day conference provided a platform for attendees to discuss and strategize on ... Read More
CISA, NSA, FBI and Five Eyes Issue New Alert on Chinese APT Volt Typhoon
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA) and their international partners from the Five Eyes alliance have issued a new advisory concerning the activities of the Chinese state-sponsored hacking group known as Volt Typhoon. This group has been implicated ... Read More
Transportation Cybersecurity Threats: An Overview
The transportation sector moves people, goods and services across different parts of the economy and generally keeps things ticking. Like the human circulatory system, its role often gets taken for granted until there’s a problem with it. And an increasingly common cause of transportation system issues is cyberattacks. When ... Read More
Microsoft’s February 2024 Patch Tuesday Addresses 2 Zero-Days and 73 Vulnerabilities
Microsoft’s Patch Tuesday for March 2024 has once again highlighted the importance of regular updates in maintaining the security of digital environments. This month, Microsoft addressed a significant number of vulnerabilities, including two critical flaws that demand immediate attention. Read on to learn more. What are the zero-days mentioned in ... Read More