Blog
US Government warns of new malware attacks on ICS/SCADA systems
By Graham Cluley on Thu, 04/14/2022
Agencies of the US Government have issued a joint warning that hackers have revealed their capability to gain full system access to industrial control systems that might help enemy states sabotage critical infrastructure.
In a joint cybersecurity advisory issued by the Department of Energy, the Cybersecurity and Infrastructure Security Agency (CISA...
Blog
Why Privacy Matters in Cybersecurity
By Former Tripwire Employee on Mon, 04/11/2022
In this episode, Jarell Oshodi, Deputy Chief Privacy Officer for the Centers for Disease Control and Prevention, discusses the role of privacy in the cybersecurity field. As an attorney, she brings a unique perspective to the conversation on how we can work better with our privacy officers.
https://open.spotify.com/episode/6I9ixrw6IDnWdnHKiNU3e7...
Blog
Legacy systems still in use: making a cybersecurity case for modernisation
By Guest Authors on Tue, 04/05/2022
What does the term “Legacy Systems” mean to you? What image does it conjure up?Well, the word “legacy” can mean “something transmitted by or received from an ancestor or predecessor or from the past.” For example, the “legacy of the ancient philosophers”, or perhaps “legacy of ancient IT professionals.” A legacy is something that is passed from one...
Blog
Your Guide to the NIST Cybersecurity Framework
By Guest Authors on Sun, 04/03/2022
To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers:
Data breach costs increased from $3.86 million to $4.24 million in 2021.
Every 39 seconds, there is an attack.
About 90% of healthcare organizations have fallen victim to at least one breach within the past three years.
The bottom line?...
Blog
How Tripwire ExpertOps Can Help Solve the UK’s Cybersecurity Challenges
By Emanuel Ghebreyesus on Sun, 03/27/2022
Many UK business and technology executives aren’t hopeful about their digital security going into 2022. In a survey of 3,600 business and technology executives, of which 257 were from the UK, PwC learned that a majority (61%) of respondents expected to see an increase in reportable ransomware attacks next year. An even greater proportion (64%) of UK...
Blog
AvosLocker ransomware - what you need to know
By Graham Cluley on Wed, 03/23/2022
What is this AvosLocker thing I’ve heard about?
AvosLocker is a ransomware-as-a-service (RaaS) gang that first appeared in mid-2021. It has since become notorious for its attacks targeting critical infrastructure in the United States, including the sectors of financial services, critical manufacturing, and government facilities.
In March 2022, the...
Blog
EDoS: The Next Big Threat to Your Cloud
By Guest Authors on Tue, 03/22/2022
What is EDoS?
Economic Denial of Sustainability (EDoS) is a cybersecurity threat targeting cloud environments. EDoS attacks exploit the elasticity of clouds, particularly auto-scaling capabilities, to inflate the billing of a cloud user until the account reaches bankruptcy or large-scale service withdrawal.
EDoS attacks exploit the cloud’s...
Blog
The Obsession with Faster Cybersecurity Incident Reporting
By Editorial Staff on Tue, 03/22/2022
Requirements for reporting cybersecurity incidents to some regulatory or government authority are not new, but there has always been a large amount of inconsistency, globally, in exactly what the requirements are. More recently, there’s been a growing trend across government and regulatory bodies in the United States towards shorter timeframes for...
Blog
EPP/EDR: What Is It and How Can It Help to Keep Your Organization Safe?
By Editorial Staff on Sun, 03/20/2022
Endpoint devices played a big part in malware and ransomware attacks in 2021. According to a study covered by Help Net Security, security researchers detected more malware and ransomware endpoint infections in the first nine months of the year than they did for all of 2020. Attack scripts leveraging PowerSploit, PowerWare, and other tools were...
Blog
Ragnar Locker ransomware - what you need to know
By Graham Cluley on Thu, 03/10/2022
What is this Ragnar Locker thing I’ve heard about?
Ragnar Locker is a family of ransomware, which first came to prominence in early 2020 when it became notorious for hitting large organisations, attempting to extort large amounts of cryptocurrency from its victims.
So just your bunch of cybercriminals then?
Yes, although on their underground...
Blog
Building Cyber Resilience in a heightened alert environment
By Guest Authors on Wed, 03/09/2022
There has been a lot of talk about cyber weapons and the cyber dimension of global politics after the NotPetya and WannaCry attacks of 2017 and the Stuxnet worm, first discovered in 2010, when it was used to attack the control mechanisms of Iran’s uranium enriching centrifuges.
Professor Ciaran Martin CB, former CEO of the UK National Cyber...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 28, 2022
By Editorial Staff on Mon, 03/07/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of February 28, 2022. I’ve also included some comments on these stories.
High-Severity Flaws Discovered in Schneider, GE...
Guide
File Integrity Monitoring (FIM) Software Buyer's Guide
There’s a lot more to file integrity monitoring than simply detecting change. Although FIM is a common policy requirement, there are many FIM capabilities and processes you can elect to implement or not. These can vary from a simple “checkbox” compliance tool to the option to build effective security and operational controls. These decisions directly affect the value your organization gains from...
Guide
The Value of True File Integrity Monitoring
File Integrity Monitoring (FIM) is a technology that monitors for changes in files that may indicate a cyberattack. In many organizations, however, FIM mostly means noise: too many changes, no context around these changes, and little insight into whether a detected change actually poses a risk.
What does file integrity monitoring do? FIM, and often referred to as “change audit” was around long...
Guide
Getting Up to Speed on GDPR
Search online for the phrase “data is the new oil” and you’ll see it’s used by (and attributed to) many people. Data is a precious and highly valuable commodity. Data is the fuel pumping through today’s digital business, powering communications and commerce. Organizations the world over are mining data to turn raw information into real insight—to drive sales and grow their business.
...
Guide
Governance, Risk, and Compliance
Governance, Risk & Compliance, or Generating Real Capability! How do we use GRC as a business enabler, and focus on the benefits it brings?
Guide
Industrial Cybersecurity is Essential
Don’t believe there are real cyberthreats to your operations network and control systems? Data shows otherwise. Better foundational industrial cybersecurity practices can help prevent disruption to your operations and financial risk to your bottom line.
...