S3 Ep42: Viruses, Nightmares, patches, rewards and scammers [Podcast]
Latest episode – listen now! Continue reading S3 Ep42: Viruses, Nightmares, patches, rewards and scammers [Podcast]
Collaborate Disseminate
Latest episode – listen now! Continue reading S3 Ep42: Viruses, Nightmares, patches, rewards and scammers [Podcast]
Trend Micro released a research urging organizations to focus patching efforts on the vulnerabilities that pose the greatest risk to their organization, even if they are years old. Older exploits for sale more popular with criminals The research found … Continue reading 22% of exploits for sale in underground forums are more than three years old
There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step underpinning technology infrastructure in every industry. Yet, staff resources to de… Continue reading Dealing with security vulnerabilities on data center servers requires more skilled staff
More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. The report highlights current and emerging threats, the impact these have on th… Continue reading The impact of current and emerging threats on the day-to-day lives of SecOps teams
Often it is impossible at first sight to understand if a package in a repository is up-to-date with security fixes, because the maintainers use a different naming when applying the patches to old branches. So for example, while Foo version… Continue reading Is VLC from the Ubuntu LTS official repository insecure?
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2021.
UK Smarties Cities Cybersecurity Warning
The UK National Cyber Security Centre (NCSC) publ… Continue reading Cyber Security Roundup for June 2021
Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of compromised security controls in expanding an already wide attack surface for toda… Continue reading Endpoint complexities leaving sensitive data at risk
Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that is stored inside such as your places visited, emails and cont… Continue reading How Hidden Vulnerabilities will Lead to Mobile Device Compromises
This question has plagued IT and security departments for years. Each month these teams struggle to keep up with the number of patches issued by the myriad of vendors in their technology stack. And it’s not a small problem. According to a Ponemon… Continue reading Why is patch management so difficult to master?
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks and recover from them if they … Continue reading How to deal with ransomware attacks