Posts

Managing Privileged Access to Secure the Post-COVID Perimeter

Joseph Carson, chief security scientist & advisory CISO at ThycoticCentrify, discusses how to implement advanced privileged-access practices. from Threatpost Managing Privileged Access to Secure the Post-COVID Perimeter https://ift.tt/3Bj1GuL

Attackers Actively Exploiting Realtek SDK Flaws

Multiple vulnerabilities in software used by 65 vendors under active attack. from Threatpost Attackers Actively Exploiting Realtek SDK Flaws https://ift.tt/3yaCB2Q

Week in security with Tony Anscombe

Image
Who is actually paying the ransom demand? – Be careful about what you throw away – Records from a terrorist watchlist exposed online The post Week in security with Tony Anscombe appeared first on WeLiveSecurity source https://www.welivesecurity.com/videos/week-security-tony-anscombe-138/

Hackers swipe almost $100 million from major cryptocurrency exchange

Image
Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage The post Hackers swipe almost $100 million from major cryptocurrency exchange appeared first on WeLiveSecurity source https://www.welivesecurity.com/2021/08/20/hackers-swipe-100million-cryptocurrency-exchange/

Web Censorship Systems Can Facilitate Massive DDoS Attacks

Systems are ripe for abuse by attackers who can abuse systems to launch DDoS attacks. from Threatpost Web Censorship Systems Can Facilitate Massive DDoS Attacks https://ift.tt/3y3iaVB

Nigerian Threat Actors Solicits Employees to Deploy Ransomware for Cut of Profits

Campaign emails company insiders and initially offers 1 million in Bitcoin if they install DemonWare on an organization’s network. from Threatpost Nigerian Threat Actors Solicits Employees to Deploy Ransomware for Cut of Profits https://ift.tt/37ZxQi7

Are you, the customer, the one paying the ransomware demand?

Image
Ransomware payments may have greater implications than you thought – and not just for the company that gave in to the attackers’ demands The post Are you, the customer, the one paying the ransomware demand? appeared first on WeLiveSecurity source https://www.welivesecurity.com/2021/08/19/are-you-customer-one-paying-ransomware-demand/

What’s Next for T-Mobile and Its Customers? – Podcast

Hopefully not a hacked-up hairball of a “no can do” message when customers rush to change their PINs. In this episode: Corporate resilience vs. the opposite. from Threatpost What’s Next for T-Mobile and Its Customers? – Podcast https://ift.tt/3k7NTQC

How Ready Are You for a Ransomware Attack?

Oliver Tavakoli, CTO at Vectra, lays out the different layers of ransomware defense all companies should implement. from Threatpost How Ready Are You for a Ransomware Attack? https://ift.tt/3gidB3M

Critical Cisco Bug in Small Business Routers to Remain Unpatched

The issue affects a range of Cisco Wireless-N and Wireless-AC VPN routers that have reached end-of-life. from Threatpost Critical Cisco Bug in Small Business Routers to Remain Unpatched https://ift.tt/2W9I8tF