Blog
Sextortion Scams – How They Persuade and What to Watch for
By Martina Dove on Wed, 07/10/2024
"Sextortion" scams represent some of cybercriminals' most brazen attempts to extract money from unwitting victims. These extortion techniques rely on fear and shame to get targets to pay up. Similar to individualized ransomware attacks, if the party refuses to pay the demand, public exposure will follow.As these attacks target individuals rather than companies, it is important for all employees to...
Blog
Navigating Compliance: A Guide to the U.S. Government Configuration Baseline
By Dan Jamison on Wed, 07/10/2024
For cybersecurity professionals tasked with defending the public sector, tackling the U.S. Government Configuration Baseline (USGCB) is just another hurdle to a safer federal tomorrow. Part of a wide collection of necessary federal government compliance requirements, it hones in on which baseline security configurations are necessary for federally deployed IT products.
While not a standalone...
Blog
VERT Threat Alert: July 2024 Patch Tuesday Analysis
By Tyler Reguly on Tue, 07/09/2024
Today’s VERT Alert addresses Microsoft’s July 2024 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1114 as soon as coverage is completed. In-The-Wild & Disclosed CVEsCVE-2024-38112A vulnerability in the Windows MSHTML Platform could allow spoofing to occur. Successful exploitation of this vulnerability requires that the attacker convince...
Blog
A Deeper Dive into DISA's Cybersecurity Initiatives
By David Henderson on Tue, 07/09/2024
The Defense Information Systems Agency (DISA) is a Department of Defense (DoD) service provider that supplies a global information-sharing architecture for all DoD members "from the President on down."Their cybersecurity measures are among the best in the world. As Amy Probst, Lead Customer Management Specialist at DISA, explains, DISA’s Cybersecurity Service Provider (CSSP) program "monitors for...
Blog
GAO Urges Stronger Federal Cybersecurity Measures Amid Rising Threats
By PJ Bradley on Mon, 07/08/2024
The IT and OT systems that support not only federal governmental agencies but also national critical infrastructure must be protected, but developing a security strategy effective against threats is no easy feat. It can be difficult to cover all of the necessary areas, given that these systems are “complex and dynamic, technologically diverse, and often geographically dispersed,” according to a...
Blog
Guarding Health: Errol Weiss on Protecting the Healthcare Sector from Cyber Threats
By Joe Pettit on Mon, 07/08/2024
Each day, it seems that we hear of another healthcare organization being compromised by a cyber attack. It is clear that the healthcare industry is the new favorite target amongst cybercriminals. Fortunately, vigorous efforts are available to combat these threats. We recently spoke to Errol Weiss, Chief Security Officer at Health-ISAC. Errol spearheads the information sharing and analysis center,...
Blog
Volcano Demon Ransomware Group Rings Its Victims To Extort Money
By Graham Cluley on Thu, 07/04/2024
What's happening?Security researchers have warned that a new ransomware group has taken an unusual twist on the traditional method of extorting money from its corporate victims.So what's different this time?Whereas many ransomware attacks see a company's company's data exfiltrated by attackers, and the threat made that stolen data will be sold to other cybercriminals or released to the public, the...
Blog
Cybersecurity Best Practices for SOX Compliance
By Anthony Israel-Davis on Wed, 07/03/2024
The Sarbanes-Oxley Act (SOX), enacted by the United States Congress in 2002, is a landmark piece of legislation that aims to improve transparency, accountability, and integrity in financial reporting and corporate governance. The act was a response to high-profile corporate scandals, such as those involving Enron, WorldCom, and Tyco International, which shook investor confidence and underscored...
Blog
IoT Security Regulations: A Compliance Checklist – Part 2
By Gilad David Maayan on Wed, 07/03/2024
In Part 1, the existing global regulations around IoT were introduced. In this part, the challenge of complying with these rules is examined.The IoT Security ChallengeSecuring the Internet of Things (IoT) presents complex challenges that stem primarily from the scale, heterogeneity, and distributed nature of IoT networks:Inconsistent security standards: One of the most pressing issues is the...
Blog
Tripwire Patch Priority Index for June 2024
By Lane Thames on Tue, 07/02/2024
Tripwire's June 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.First on the list are patches for Microsoft Edge (Chromium-based) and Chromium that resolve use after free, heap buffer overflow, and out of bounds write vulnerabilitiesNext on the patch priority list this month are patches for Microsoft Office and Outlook that resolve 4 remote code execution...
Blog
Superior Integrity Monitoring: Getting Beyond Checkbox FIM
By Fortra Staff on Tue, 07/02/2024
Contrary to what one might expect, creating a File Integrity Monitoring (FIM) system is pretty easy. Practically anyone with a modicum of Python, Perl, or development skills can write an app or script to gather a file's checksum, compare it to a list or baseline, and tell you whether or not said file has changed.But creating a good FIM solution is hard. Many inadequate checkbox File Integrity...
Blog
A Look at Container Security Through the Lens of DevOps
By Guest Authors on Mon, 07/01/2024
Containerization has revolutionized application development, deployment, and management – and for good reason. The ability to automatically wrap an application and its dependencies into a single, easily deployable package helps developers focus on what they do best: writing code.
Widely recognized as the go-to method to boost productivity and simplify the process, containerization keeps gaining...
Blog
Cybersecurity Frameworks: What Do the Experts Have to Say?
By Josh Breaker-Rolfe on Mon, 07/01/2024
Cybersecurity frameworks are blueprints for security programs. Typically developed by governmental organizations, industry groups, or international bodies, they take the guesswork out of developing defense strategies, providing organizations with standards, guidelines, and best practices to help them manage and reduce their cybersecurity risks.
While cybersecurity frameworks such as the Center...
Blog
Better Resilience Sees More Extorted Companies Refuse To Pay Their Ransomware Attackers
By Graham Cluley on Fri, 06/28/2024
There's some possibly good news on the ransomware front.Companies are becoming more resilient to attacks, and the ransom payments extorted from businesses by hackers are on a downward trend.That's one of the findings of insurance broker Marsh, which conducted an analysis of the more than 1800 cyber claims it received during 2023 from its clients in the United States and Canada.According to Marsh,...
Blog
The 5 Industries Most Vulnerable to Data Breaches in 2024
By Guest Authors on Wed, 06/26/2024
As we pass the halfway mark of 2024, data breaches remain on the rise. Cybercriminals are finding more and more inventive ways to infiltrate organizations, exploiting vulnerabilities in networks, software, and human behavior.
From phishing schemes and ransomware attacks to insider threats and supply chain compromises, the threat of cyber attacks continues. This is bad news, especially for certain...
Blog
Defending Gold: Protecting the 2024 Olympics from Cyber Threats
By Kirsten Doyle on Wed, 06/26/2024
As the 2024 Olympic Games in Paris approach, organizers are intensifying cybersecurity measures in response to warnings from experts and law enforcement agencies about a likely surge in cyberattacks. The Games, set to start on 26 July this year, are projected to sell over 13 million tickets and attract more than 15 million visitors to Paris, generating around 11 billion euros in economic activity...
Blog
How Artificial General Intelligence Will Redefine Cybersecurity
By Dilki Rathnayake on Tue, 06/25/2024
Artificial Intelligence (AI) is now integrated into almost every available technology. It powers numerous real-world applications, from facial recognition to language translators and virtual assistants. AI offers significant benefits for businesses and economies by boosting productivity and creativity. However, it still faces practical challenges. Machine learning often requires substantial human...
Blog
Zero Trust Maturity: How to Know When You’re Getting Close
By Katrina Thompson on Tue, 06/25/2024
Zero Trust maturity might be one of the least understood security buzzwords of our era. The term “Zero Trust” was originally coined over a decade ago and described the principle of not assigning digital trust to any entity, ever, for free. It represented a fundamental paradigm shift from the trust-happy early internet days to the threat-filled cyber landscape we now know.Since then, companies have...
Blog
7 Challenges in Scaling SOC Operations and How to Overcome Them
By Josh Breaker-Rolfe on Mon, 06/24/2024
In the past four years, cyberattacks have more than doubled. Cybercriminals are leveraging emerging technologies like artificial intelligence (AI) to facilitate more sophisticated attacks. Geopolitical tumult has increased cyber risk. Couple these factors with a near-ubiquitous desire for businesses to expand their operations, and it’s easy to understand the need for scaling Security Operations...