Blog
The State of Cybersecurity has improved but is hardly flawless
By Guest Authors on Sun, 09/25/2022
For the record, it should be acknowledged from the start that there is no question that the cybersecurity landscape has improved over time, mostly courtesy of persistent increases in cyber spending year after year. Gartner estimates that the U.S. and the rest of the world will invest $172 billion in cybersecurity this year, up from $150 billion last...
Blog
What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide
By Guest Authors on Tue, 09/20/2022
Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications.
...
Blog
SecTor 2022: The Power of the Pico
By Tyler Reguly on Mon, 09/19/2022
I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks....
Blog
A Traveller’s Guide to Staying Cyber safe
By Guest Authors on Mon, 09/19/2022
With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers can take to protect...
Blog
Strong Authentication Considerations for Digital, Cloud-First Businesses
By Guest Authors on Wed, 09/14/2022
Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.
In this climate of advanced cyber threats and motivated...
Blog
Cybersecurity Threats to the US Water Industry
By Guest Authors on Tue, 09/13/2022
In an increasingly digital world, cybersecurity is a significant - and relevant - threat to individuals and companies alike. Cybercriminals are constantly devising new ways to steal information for personal gain through exploitation or ransom demands.
It’s become unfortunately commonplace to hear tales of drained checking accounts, leaked photos,...
Blog
How to Correctly Classify Your Data in 2022
By Guest Authors on Sun, 09/11/2022
Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of...
Blog
How Penetration Testing can help prevent Ransomware Attacks
By Guest Authors on Wed, 09/07/2022
It is hard to believe, but ransomware is more than three decades old. While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the most publicized example. Since then, dozens of ransomware strains have been utilized in a variety of cyberattacks.
According to a PhishLabs report, by Fortra,...
Blog
Working Abroad as a Cybersecurity Professional: What You Need to Know
By Guest Authors on Wed, 09/07/2022
The world is becoming a smaller place. The prospect of working in another country becomes increasingly realistic and even promising as businesses migrate toward the cloud and collaborate more closely with international partners. Amid this shift, cybersecurity professionals may wonder if they can work abroad.
Cybersecurity is a worldwide concern,...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 29, 2022
By Andrew Swoboda on Mon, 09/05/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 29th, 2022. I’ve also included some comments on these stories.
WordPress 6.0.2 Patches Vulnerability That Could...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
By Andrew Swoboda on Mon, 08/29/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine.
VMware fixed a privilege escalation issue in VMware Tools
VMware...
Blog
Black Hat USA 2022: Key Highlights
By Steve Cumings on Mon, 08/22/2022
Arriving at the keynote hall for Black Hat 2022, I was immediately struck by the size of the crowd - after the seemingly endless pandemic hiatus, the cyber industry had come out in force. The mood was one of enthusiasm, and the entire place reverberated with the vibrancy of reunion. It was a great event for the industry - and for Fortra - and a few...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022
By Andrew Swoboda on Mon, 08/22/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 15th, 2022. I’ve also included some comments on these stories.
Newly Uncovered PyPI Package Drops Fileless...
Blog
The State of Security: SIEM in 2022
By Adam Parlett on Wed, 08/17/2022
The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event...
Blog
What is Configuration Drift?
By Taha Dharsi on Tue, 08/22/2023
While the phrase sounds like the stuff of textbook jargon, the term "configuration drift" hides an extremely crucial caution.Configuration drift is important because it can lead to compliance drift. Compliance drift means that the state of compliance has changed as a result of a configuration that has been changed, which has caused your system to fall...
Blog
A 5 Step Checklist for Complying with PCI DSS 4.0
By Guest Authors on Mon, 08/15/2022
In March 2022, the Payment Card Industry Data Security Standard (PCI DSS) was updated with a number of new and modified requirements. Since their last update in 2018, there has been a rapid increase in the use of cloud technologies, contactless payments have become the norm, and the COVID-19 pandemic spurred a massive growth in e-commerce and online...
Blog
5 Tips for Spotting and Avoiding Pig Butchering Scams
By Martina Dove on Mon, 07/15/2024
Pig butchering scams came onto the scene a few years ago and have been gaining momentum ever since. A unique take on an old classic, pig butchering is a typical investment scam with a romantic or relationship-based twist. The large sums of "invested" money are typically funneled into fake crypto apps where they are promptly lost. Those who have fallen victim to pig butchering scams have taken out...
Blog
Cyber Threats – The New Norm in Data Security
By Guest Authors on Tue, 08/09/2022
“Data: We have never had so much of it, and it has never been so challenging to protect.”
These are some of the opening words in the new survey published by ISMG and Fortra in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security.
It is an important study because it recognises...
Blog
VERT Threat Alert: August 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 08/09/2022
Today’s Patch Tuesday VERT Alert addresses Microsoft’s August 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1015 on Wednesday, August 10th.
In-The-Wild & Disclosed CVEs
CVE-2022-34713
According to Microsoft, CVE-2022-34713 is a variant of the Dogwalk vulnerability. There has been a...