Security Bloggers Network

Weekly Top 10

Latest Posts

Consider Cybersecurity topics, authors and tags that you are interested in when trying to search. You can also enter your own custom search criteria. You can also select a topic or syndication source below to filter all the blog posts.

Malware obfuscation comes in all shapes and sizes — and it’s sometimes hard to recognize the difference between malicious and legitimate code when you see it. Recently, we came across an interesting case where attackers went a few extra miles to make it more difficult to notice the site infection. Mysterious wp-config.php Inclusion During the ...
Read More
|
Idaptive's Senior Vice President of Global Sales and Channels Jeff Newlin was honored recently as one of the 2020 Top 100 Global Sales Leaders (GSL100) by The Modern Sale and Collective[i]. Roll out the red carpet – It’s award season at Idaptive! This holiday season at Idaptive, we’re especially proud of and grateful for our ...
Read More
|
In a world where development is conducted on a variety of operating systems and hosted on the cloud, having a well-structured development system with integrated security is vital to ensuring that customer solutions are functioning optimally and are secure. This is achieved through DevOps ...
Read More
|
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...
Read More
|
Open source is transforming software development. No longer do individual businesses need to purchase or build everything they need in-house. Instead, they can rely on a modern, interdependent ecosystem in which developers work together on ...
Read More
|
Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware that targets companies with revenues between $500 million and $1 billion—attacked Pemex’s system and brought administrative operations to a halt. This isn’t an ...
Read More
|
via the comic delivery system monikered Randall Munroe at XKCD! ...
Read More
|
Fresh off raising an additional $13 million in financing, Cyberhaven has launched a tool that enables cybersecurity teams to track how data is being moved across an extended enterprise. Cyberhaven CEO Volodymyr Kuznetsov said the Data Behavior Analytics (DaBA) service developed by the startup makes it possible to record and analyze the flow of data ...
Read More
|
Security Boulevard
Consider investing in emerging tech tools that can add a deeper layer of data privacy protection. Artificial intelligence technology, in particular, holds a great deal of promise when it comes to complying with the CCPA and improving the way companies handle data in general ...
Read More
|
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...
Read More
|
When molten steel is immersed in water it transforms into one of the world’s strongest materials. A resilient software supply chain is no different. Hardened steel requires combining alloys; a hardened software supply chain requires combining specialized tools “to examine both internally and externally sourced code” that reinforce, remediate, and strengthen the individual pieces of ...
Read More
|
Keeping your eCommerce store secure is a must. Not only is it an important source of income for your business, but it also contains sensitive customer information, such as billing details and credit card numbers. Strong passwords can prevent many cyber attacks, but you’ll need a way to enforce them without deterring customers. By creating ...
Read More
|
With 2020 just weeks away, here at Bitdefender we wanted to share our forecast for the year to come. That said, here are our top predictions for the cybersecurity space in 2020 and what we should be looking out for ...
Read More
|
Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival instinct. In business, saving money could get you promoted ...
Read More
|
The City of Waco has warned residents that their online payments for water services may have been intercepted by hackers who stole credit card details. The heart of the problem lies in the third-party online payment software that Waco and several other cities and municipalities use to let residents pay their bills, pay parking fines, ...
Read More
|
What does email security have to do with credit cards? A lot, especially when you consider that their information system implementations share the same structural vulnerabilities. And this time of year, when we are all using our credit cards a lot, that should give us all a pause for both reflection and concern. Just … ...
Read More
|
The number of companies that have publicly announced they have fallen victim to a cyber attack is only a small sample size compared to the actual number of attacks. There are essentially three categories of companies that have experienced a cyber attack ...
Read More
|
Attackers need to target only 20 specific maintainer accounts to reach more than half of the entire JavaScript npm ecosystem, security researchers warn. What's the cybersecurity impact for the digital supply chain? ...
Read More
|
The city of Pensacola, Florida, was hit by a ransomware attack, and authorities are still trying to determine if the hackers stole data from the affected systems. Early reports from Pensacola mentioned that the city administration fell prey to a cyberattack, but no specifics were released. Now, the city officials say that Pensacola was hit ...
Read More
|
Today we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Nibbles. HTB is an excellent platform that... Go on to the site to read the full article ...
Read More
|
Introduction This article will explore some interesting details from an episode of Infosec’s information security career podcast, Cyber Work. This episode, with guest Jonathan Butler, covers how to... Go on to the site to read the full article ...
Read More
|
Introduction In this article, we will discuss the various ways that attackers are able to abuse external remote services to gain unauthorized access into internal networks. We will also discuss some... Go on to the site to read the full article ...
Read More
|
New data shows that good work-from-home cybersecurity habits have never been a more relevant topic than right now, in the 2019 holiday season ...
Read More
|
Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks ...
Read More
|
Newest release reduces privileged attack surface associated with endpoints ...
Read More
|
Law enforcement arrested three men for their participation in a cryptomining scheme that defrauded investors of $722 million. On December 10, 2019, the U.S. Attorney’s Office for the District of New Jersey announced the arrests of Matthew Brent Goettsche, 37, of Lafayette, Colorado, and Jobadiah Sinclair Weeks, 38, of Arvada, Colorado, on suspicion of conspiracy ...
Read More
|
Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly differently. This is me from 2005: Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public ...
Read More
|
Why your next gen firewall is not sufficient to protect data stored in G Suite and Office 365 Firewalls have been around for decades now, and IT teams are very familiar with working with them to protect against cyber-attacks that target network entry points. The introduction of next-generation firewalls, or next gen firewalls (NGFWs), offers ...
Read More
|
Automation is valuable in detecting and eliminating manipulated media, and fighting against dis- and misinformation campaigns. The post The Quest To Automate The Business Of Fake News appeared first on Radware Blog ...
Read More
|
Security best practices for encryption key storage, management and protection is critical to protecting valuable data wherever it is located,... The post Land Securely on Regulatory Compliance with Thales Luna HSMs appeared first on Data Security Blog | Thales eSecurity ...
Read More
|
We are elated to announce that Scalefusion has been featured in the 2019’s Best Software Companies in India list published by G2.com! G2.com is one of the largest and most popular marketplaces for business software. It revealed its annual rankings based on reviews by more than one million users from diverse businesses on the 10th ...
Read More
|
Node Package Manager (npm) was a revolutionary addition to web application programming. It allowed developers to create small, reusable pieces of code and share them with the developer community. npm gives developers massive flexibility and makes developing applications incredibly simple, but there are also potential pitfalls when it comes to npm security. Here are three ...
Read More
|
Microsoft says it doesn’t plan to provide security updates for the Microsoft Security Essentials component integrated into Windows 7 after the operating system reaches its end of life in a little over five weeks. The life of Windows 7 is set to end on January 14th, 2020, and security updates for the operating system will ...
Read More
|
With cybercriminals increasing their ambitions, constantly evolving hacking techniques year over year, and with emerging technologies providing more attack surface for hackers, executives and IT leaders must plan for the inevitable. They must know how to respond when a security breach happens because it will happen. As we head into 2020, every organization should be ...
Read More
|
Security Boulevard
The shift to services-oriented business models has created opportunities for partners to transition to MSSPs. Learn how Fortinet facilitates this change with the SOC Lifecycle Strategy ...
Read More
|
Fortinet today announced it has acquired CyberSponse. Learn more about how this will empower security operations teams to achieve higher efficiencies and accelerate incident response ...
Read More
|
2019 proved to be a hectic year in the cybersecurity landscape. With 3,813 data breaches occurring in the first six months alone, (exposing over 4.1 billion records,) and 12174 new vulnerabilities discovered in commercial and open source software, this year has certainly been one for the memory books. With all signs pointing to 2020 beingRead ...
Read More
|
Will AG Barr succeed in his fight to empower the U.S. government with the ability to break strong encryption against tech companies? U.S. Attorney General Bill Barr once again is decrying the fact that tech companies are proposing strong security standards for data at rest and data in transmission. By using encryption to protect data, ...
Read More
|
Security Boulevard
Finding a security vendor that is the best fit for your company’s business objectives, culture, risk profile, and budget is challenging today. The purpose of this blog is to suggest that working with a “vendor partner” is more than working with a standard technology vendor in that a partner aligns not only with “Technology” concerns ...
Read More
|
Qualys Research Labs discovered a local privilege escalation vulnerability in OpenBSD’s dynamic loader. The vulnerability could allow local users or malicious software to gain full root privileges. OpenBSD developers have confirmed the vulnerability and released security patches in less than 3 hours. Qualys Research Labs also provided proof-of-concept exploits in the security advisory. Vulnerability Details ...
Read More
|
A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a ...
Read More
|
Salesforce Commerce Cloud, also known as Demandware, is used by some of the worlds largest brands for marketing, customer interaction, and to process online shopping transactions. Given the importance of the platform, and the sensitivity of the data it handles, it is a popular target for criminals, such as Magecart groups ...
Read More
|
The end-of-year online buying season is a bank fraud frenzy. This used to be done by criminals using stolen or cloned payment cards in person, via card-present (CP) fraudulent transactions. The introduction of chip-based Europay, Mastercard, and Visa (EMV) cards has changed this. CP fraud is now much more difficult ...
Read More
|
I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve. We’ll continue to be hounded by greater volumes of the attacks that have threatened us for years and, as businesses adopt new innovations, new vulnerabilities to threats will surface. You and your security team will ...
Read More
|
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...
Read More
|
With the final weeks of 2019 upon us, here are some predictions for what 2020 holds for identity and access management. As we reach the final few weeks of 2019, many of you will be thinking of the projects which you will be planning or embarking on in 2020. Maybe you will be looking to ...
Read More
|
Sucuri provides security for websites with the protection of our Web Application Firewall (WAF). We also have our proprietary Anycast content delivery network (CDN) that adds the performance benefits of a CDN to all our WAF users. We been adding data centers in key regions of the world: San Jose – US Dallas – US ...
Read More
|
via the comic delivery system monikered Randall Munroe at XKCD! Permalink ...
Read More
|
Loading...