Blog
Defense in Depth: 4 Essential Layers of ICS Security
By Editorial Staff on Tue, 09/20/2022
It is always said that security is never a one-size-fits-all solution. This is true not only because of the apparent infinite varieties of equipment in each individual organization, but also, and perhaps more importantly, the different ways that every organization views security. Some spend lots of time focusing on physical security, especially those...
Blog
VERT Threat Alert: September 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 09/13/2022
Today’s VERT Alert addresses Microsoft’s September 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1021 on Wednesday, September 14th.
In-The-Wild & Disclosed CVEs
CVE-2022-23960
The first disclosed vulnerability this month is Spectre-BHB that is discussed in great detail on arm Developer....
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 5, 2022
By Andrew Swoboda on Mon, 09/12/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 5th, 2022. I’ve also included some comments on these stories.
Critical RCE Vulnerability Affects Zyxel NAS Devices —...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 29, 2022
By Andrew Swoboda on Mon, 09/05/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 29th, 2022. I’ve also included some comments on these stories.
WordPress 6.0.2 Patches Vulnerability That Could Impact...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
By Andrew Swoboda on Mon, 08/29/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine.
VMware fixed a privilege escalation issue in VMware Tools
VMware this...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022
By Andrew Swoboda on Mon, 08/22/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 15th, 2022. I’ve also included some comments on these stories.
Newly Uncovered PyPI Package Drops Fileless Cryptominer...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022
By Andrew Swoboda on Tue, 08/16/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 8st, 2022. I’ve also included some comments on these stories.
Slack leaked hashed passwords from its servers for years
...
Product Video
Tripwire and Check Point for Unprecedented Protection Against Zero-Day Threats
Mon, 08/15/2022
Tripwire Enterprise for Check Point ThreatCloud Emulation Service delivers advanced and zero day malware detection with threat intelligence to help reduce the time to accurately detect and protect your entire enterprise against advanced threats.
Industrial Cybersecurity Attacks & Assessments
Table of Contents:
Popular ICS Assessment Services
Phase 1: ICS/SCADA Architecture Review, Asset Inventory and ICS/Isolation Review
Phase 2: Network Vulnerability Analysis
Phase 3: ICS/SCADA Security Assessment and Controls GAP Analysis
Phase 4: Documentation of Findings and Recommendations
...
On-Demand Webinar
Industrial Cybersecurity - What You Don't Know Might Hurt You
Mon, 08/15/2022
Getting a clear assessment of your assets is the first step toward developing a mature OT network or control system. A well maintained asset inventory allows your organization to quickly manage risk affecting your operations availability, reliability and safety. Industrial environments often need to map assets to NIST, ITIL, ISO, COBIT or process automation standards like ANSI/ISA99-IEC-62443. You can achieve significant efficiency improvement and save time within industrial environments by automating asset management instead of following manual spreadsheet processes. Cyber security experts David Meltzer, Chief Research Officer at Tripwire, Tony Gore, CEO at Red Trident Inc., and John Powell, Senior Critical Infrastructure Engineer at Red Trident Inc., will discuss the practical 1-2-3 basics of industrial cyber security and how to get started automating asset management. Attendees will also learn how to build an effective strategy for protecting industrial assets - networks, endpoints and controllers. Key Takeaways: Learn how to automate and simplify the inventory process and secure your assets Understand what cyber security standards may apply to your unique environment Hear real-world tips on how to prioritize and work across functional silos within your company Receive an industrial cyber security assessment checklist to help gauge your starting point
Product Video
Malware Analysis with Tripwire Enterprise and Lastline
Mon, 08/15/2022
If you are a user of Security tools, you will be interested in this short (4 minutes) demo. You’ll discover the power of the solution: Tripwire Enterprise endpoint and server monitoring and detection, integrated with Lastline Breach Detection Platform. See how you can greatly reduce the time needed to accurately detect and protect against advanced and persistent threats, from the network edge, to...
On-Demand Webinar
How to Protect Against the Ransomware Epidemic
Mon, 08/15/2022
Ransomware has developed from a niche attack to a booming criminal market over the last year because the simple, turn-key business model behind ransomware infections doesn’t require any real technical skill to execute. As a result ransomware will continue to evolve and will continue to escalate for the foreseeable future.
The good news is that there are simple steps you can take today using...
Guide
Verizon 2021 DBIR Response Checklist
The Verizon 2021 Data Breach Investigations Report (DBIR), which takes a deep dive into data-driven findings on the state of global cybersecurity across a number of industries, including manufacturing, healthcare, financial and public administration. This year’s report revealed trends behind 79,635 cybersecurity incidents and 5,258 confirmed data breaches across 88 countries.
To help security...