zerotrust
Lazarus Cryptocurrency Hacks Estimated To Be $3 Billion
Wajahat Raja | | BlockchainSecurity, CryptoAssets, CryptocurrencyHacks, CryptoHeists, cybercrime, Cybersecurity, Cybersecurity News, DeFi, endpointsecurity, HackerNews, LazarusGroup, northkorea, PhishingAttacks, SocialEngineering, threatactors, zerotrust
Threat actors from North Korea have been increasingly targeting the cryptocurrency sector since 2017 as a source of generating revenue. Reports have claimed that the country’s ruling elite and computer science professionals ...
Zero Trust Should Not Give IT a Bad Name
Maybe you've just found out that your company's IT organization is implementing Zero Trust. Does that mean they don't trust you? "Zero Trust" sure sounds that way. Maybe you've read about it ...
All Access Is (or Should Be) Remote Access
With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work ...
Zero Trust Network Access Is an Oxymoron
Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same ...
Zero Trust: Not As Scary As It Sounds
If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked ...
Zero Trust: The Protection Model for the Post-Pandemic World
One year and a half following the start of the COVID-19 pandemic, we're seeing most companies either maintaining their remote work policies or slowly moving to a hybrid model. In fact, an ...
The Countdown Has Started — The Move Toward Zero Trust and MFA
In early May 2021, the President of the United States issued an executive order on cybersecurity, and though it will take some time for executive branch agencies to develop formal rules, the ...
Trusting Locations Bites Us Yet Again
Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020 ...
CISA Emergency Directive 21-03: VPN Vulnerabilities Actively Exploited
On April 20, 2021, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) released an alert on the exploitation of Pulse Connect Secure Vulnerabilities with Alert AA21-110A: Exploitation of Pulse ...
Observed Changes to the Threat Landscape in 2020
Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the ...