The History of Common Vulnerabilities and Exposures (CVE)

During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible. There’s just one problem – each security v… Continue reading The History of Common Vulnerabilities and Exposures (CVE)

Report: No Organization’s Security Culture Has Received ‘Excellent’ Score

Security culture matters to executives, but these individuals are struggling to implement it. In a November 2019 study commissioned by KnowBe4, 94% of individuals with managerial duties or higher in security or risk management said that security cultur… Continue reading Report: No Organization’s Security Culture Has Received ‘Excellent’ Score

Cryptocurrency exchange Eterbase hacked, $5.4 million worth of funds stolen

European cryptocurrency exchange platform Eterbase has announced that it has suffered a security breach which saw malicious hackers access its network and steal funds worth US $5.4 million. In a message posted on Telegram, the Slovakian cryptocurrency … Continue reading Cryptocurrency exchange Eterbase hacked, $5.4 million worth of funds stolen

VERT Threat Alert: September 2020 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s September 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-903 on Wednesday, September 9th. In-The-Wild & Disclosed CVEs There were no in-the-wil… Continue reading VERT Threat Alert: September 2020 Patch Tuesday Analysis

Identifying the Most Dangerous Common Software and Hardware Weaknesses and Vulnerabilities – The CWE Top 25 (2020 Edition)

So far, there has not been a perfect solution to ridding the world of software and hardware weaknesses. Keeping up-to-date with which weaknesses have are most common and impactful can be a daunting task. Thankfully, a list has been made to do just that… Continue reading Identifying the Most Dangerous Common Software and Hardware Weaknesses and Vulnerabilities – The CWE Top 25 (2020 Edition)

Podcast Episode 9 – Cloud Misconfigurations: Simple Mistakes, Big Consequences

Tripwire’s Brent Holder and Stephen Wood discuss recent study findings that provide a snapshot of what organizations are doing (and not doing) to secure their cloud. Spotify: https://open.spotify.com/episode/5wXKv9DiQjfsZNf6heXg67 Stitcher: https://www… Continue reading Podcast Episode 9 – Cloud Misconfigurations: Simple Mistakes, Big Consequences

Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018

Security researchers at Slovak security firm ESET have discovered a new family of malware that they say has been using a variety of techniques to steal cryptocurrency from unsuspecting users since at least December 2018.
The post Newly-discovered Krypt… Continue reading Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018

Covid-19 Exposure Logging: Key Privacy Considerations

Recently, both Apple and Google released new updates for iPhone and Android devices. One feature that was added was “Covid-19 Exposure Logging.” The feature is off (for now), and according to the text that accompanies the app, when turned on, it is set… Continue reading Covid-19 Exposure Logging: Key Privacy Considerations

Dashboards: An Effective Cybersecurity Tool

Data is only as good as what you are able to do with it.  Not only does the cybersecurity universe collect data, but individual enterprises also collect cybersecurity data from within their organization as well as from external sources in order to add … Continue reading Dashboards: An Effective Cybersecurity Tool