Blog
Your Guide to the Latest Email Fraud and Identity Deception Trends
By Guest Authors on Tue, 09/27/2022
There’s a high chance that you or someone you know has been impacted by email fraud or identity theft. At the very least, you’ve likely received a variety of spam emails and text messages asking to provide a payment or confirm your identity.
The good news is that cybersecurity protection is constantly evolving and improving, with cybersecurity...
Blog
Quantifying the Social Impact of Ransomware and ESG Disclosure Implication
By Guest Authors on Mon, 09/26/2022
2022 began with successful ransomware attacks against global IT and digital transformation providers, no thanks to the notorious LAPSUS$ ransomware gang. Often, any discussion about ransomware impact has mostly centered on affected organizations. Rightly so, as victimized organizations usually suffer significant disruption to their operations. In...
Datasheet
The Egypt Financial Cybersecurity Framework
Central Bank of Egypt (CBE) identified key areas of focus to tailor a cybersecurity framework to the unique requirements of the Egyptian financial sector. This framework will serve as the foundational guidance for cybersecurity capability development within this critical sector. This is the kick-off of a larger-scale effort by the CBE to build a robust and sustainable cybersecurity ecosystem...
Blog
How to Leverage NIST Cybersecurity Framework for Data Integrity
By Lane Thames on Mon, 09/26/2022
Together with the National Cybersecurity Center of Excellence (NCCoE), the National Institute of Standards and Technology (NIST) has released a series of practice guides that focuses on data integrity. Data integrity is the property that records have not been altered in an unauthorized manner. Tripwire is very proud to have contributed and...
Blog
The State of Cybersecurity has improved but is hardly flawless
By Guest Authors on Sun, 09/25/2022
For the record, it should be acknowledged from the start that there is no question that the cybersecurity landscape has improved over time, mostly courtesy of persistent increases in cyber spending year after year. Gartner estimates that the U.S. and the rest of the world will invest $172 billion in cybersecurity this year, up from $150 billion last...
Blog
Overheard at the SANS Security Awareness Summit 2022
By Anastasios Arampatzis on Thu, 09/22/2022
People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals...
Blog
SecTor 2022: The IoT Hack Lab is Back!
By Tyler Reguly on Wed, 09/21/2022
Last year, it was great to be back at SecTor after everything was canceled in 2020. The capacity was reduced, but the Hack Lab was still plenty busy and we loved having everyone come by and visit our table and play with the gear. Even more than that, we were excited to meet up with so many friends that we hadn’t seen since 2019. We’re looking...
Blog
Tripwire Patch Priority Index for August 2022
By Lane Thames on Wed, 09/21/2022
Tripwire's August 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.First on the patch priority list this month are patches for Microsoft Office, Outlook, and Excel that resolve 4 vulnerabilities, including denial of service, remote code execution, and security feature bypass.Up next are patches that affect...
Blog
What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide
By Guest Authors on Tue, 09/20/2022
Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications.
...
Blog
Defense in Depth: 4 Essential Layers of ICS Security
By Editorial Staff on Tue, 09/20/2022
It is always said that security is never a one-size-fits-all solution. This is true not only because of the apparent infinite varieties of equipment in each individual organization, but also, and perhaps more importantly, the different ways that every organization views security. Some spend lots of time focusing on physical security, especially those...
Blog
SecTor 2022: The Power of the Pico
By Tyler Reguly on Mon, 09/19/2022
I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks....
Blog
A Traveller’s Guide to Staying Cyber safe
By Guest Authors on Mon, 09/19/2022
With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers can take to protect...
Blog
Top Phishing and Social Media Threats: Key Findings from the Quarterly Threat Trends & Intelligence Report
By Guest Authors on Sun, 09/18/2022
In today’s online landscape, it is crucial for organizations to stay on top of the threats that put their enterprises at risk. Agari and PhishLabs have put together their Quarterly Threat Trends & Intelligence Report detailing their analysis of phishing and social media attacks this quarter. The report presents statistics regarding the volume of...
Blog
FBI warns of criminals attacking healthcare payment processors
By Graham Cluley on Thu, 09/15/2022
Millions of dollars have been stolen from healthcare companies after fraudsters gained access to customer accounts and redirected payments.
In a newly-published advisory directed at the healthcare payment industry, the FBI warns that cybercriminals are using a cocktail of publicly-available Personally Identifiable Information (PII) and social...
Blog
Strong Authentication Considerations for Digital, Cloud-First Businesses
By Guest Authors on Wed, 09/14/2022
Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.
In this climate of advanced cyber threats and motivated...
Blog
Cybersecurity Threats to the US Water Industry
By Guest Authors on Tue, 09/13/2022
In an increasingly digital world, cybersecurity is a significant - and relevant - threat to individuals and companies alike. Cybercriminals are constantly devising new ways to steal information for personal gain through exploitation or ransom demands.
It’s become unfortunately commonplace to hear tales of drained checking accounts, leaked photos,...
Blog
VERT Threat Alert: September 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 09/13/2022
Today’s VERT Alert addresses Microsoft’s September 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1021 on Wednesday, September 14th.
In-The-Wild & Disclosed CVEs
CVE-2022-23960
The first disclosed vulnerability this month is Spectre-BHB that is discussed in great detail on arm...
Blog
Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise?
By David Bruce on Mon, 09/12/2022
Common Criteria for Information Technology Security Evaluation (CC) is an international agreement that provides a set of standards, testing processes, and documentation standards that is widely recognized as the leading standard for defined software security standards. The Canadian Centre for Cyber Security performs evaluations on common IT products...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 5, 2022
By Andrew Swoboda on Mon, 09/12/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 5th, 2022. I’ve also included some comments on these stories.
Critical RCE Vulnerability Affects Zyxel NAS...