Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they ...

3 Ways to Prepare Your Enterprise’s Data Security for a Future of Advanced Attacks

One significant negative implication of technology’s continual evolution is proportional advancement in nefarious internet activities, particularly cyber attacks. The past few years have seen a rising sophistication in cyber attacks at levels ...

SEC’s Office of Compliance Inspection and Examinations Warns of a Sudden Increase in Credential Stuffing Hack

Recently, the Securities and Exchange Commission’s exam division issued a Risk Alert (the “Alert”) where it carried out several targeted cybersecurity investigations. The agency is now concerned with how there’s been an ...
Password spray attack on Active Directory users

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the ...
Protecting the healthcare industry from cyber threats

Protecting the healthcare industry from cyber threats

2020 has been an inflex point for the healthcare industry. How can we help protect this critical sector from a growing number of cyberattacks? ...

A Closer Look at the Attempted Ransomware Attack on Tesla

Cybersecurity is in the news again with the disclosure that Tesla, working in conjunction with the FBI, prevented a ransomware attack from being launched at its Gigafactory in Nevada. The cybercriminals targeted ...

Five Cloud Security Considerations for CISOs

Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower ...

Let’s Celebrate by Bringing Security and DevOps Together!

If you connect it, protect it. According to National Cybersecurity Awareness Month (NCSAM), “If everyone does their… The post Let’s Celebrate by Bringing Security and DevOps Together! appeared first on ZeroNorth ...

Don’t Look Now but National Cybersecurity Awareness Month (NCSAM) is Here

This month marks the 17th anniversary of National Cybersecurity Awareness Month (NCSAM), a joint effort between industry,… The post Don’t Look Now but National Cybersecurity Awareness Month (NCSAM) is Here appeared first ...
Bad Actors Could Exploit US Mail-In Voting System, FBI and CISA Warn

Bad Actors Could Exploit US Mail-In Voting System, FBI and CISA Warn

A joint statement released by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday warns that foreign actors and cybercriminals are likely to exploit this year’s US mail-in voting ...