One Step Ahead: Using Threat Hunting to Anticipate the Unknown

Threat-hunting is a way to stay one step ahead of cybercriminals, spotting unusual activity before damage occurs A cyberthreat could be lurking in any corner of an organization’s infrastructure. The complex networks encompassing numerous smart and int… Continue reading One Step Ahead: Using Threat Hunting to Anticipate the Unknown

Dark Data Is Hurting Your Cyber Security

Dark data doesn’t just cost organizations money; it also damages their cybersecurity and compliance postures Server rooms filled with digital files may look neater than the paper file rooms of old, but they’re not necessarily more organized… Continue reading Dark Data Is Hurting Your Cyber Security

SMB Cyber Security Threatened by Human Hacking

A new Ponemon report on SMB cyber security reveals the top challenges and threats facing global small and medium-sized businesses If you think your company is too small to be hacked, think again. According to a new report on SMB cyber security by the P… Continue reading SMB Cyber Security Threatened by Human Hacking

NIST Proposes Secure Software Development Framework

NIST proposes a Secure Software Development Framework to address software supply chain attacks Applying software updates and patches as soon as possible is a cyber security best practice, but what if an update contains malicious code inserted by a hack… Continue reading NIST Proposes Secure Software Development Framework

How to Protect Your Business Website from Formjacking

Formjacking allows hackers to steal payment card data and other information submitted through online forms As individuals become more savvy about avoiding phishing emails, and enterprises get better at filtering them out before they ever reach employee… Continue reading How to Protect Your Business Website from Formjacking

Hackers Can Use DICOM Bug to Hide Malware in Medical Images

Hackers Can Use DICOM Bug to Hide Malware in Medical Images  DICOM bug enables hackers to insert fully functioning executable code into medical images A newly discovered design flaw in DICOM, a three-decade-old medical imaging standard, could be u… Continue reading Hackers Can Use DICOM Bug to Hide Malware in Medical Images

Dragonblood Vulnerabilities Discovered in WPA3 WiFi Standard

Dragonblood flaws in WPA3 impact the very technology that was supposed to make it safer than WPA2. Last year, the Wi-Fi Alliance announced the launch of the WPA3 WiFi security standard, which was developed to eliminate a number of security problems wit… Continue reading Dragonblood Vulnerabilities Discovered in WPA3 WiFi Standard

Arizona Beverages Ransomware Attack Halts Sales for Days

Poor cybersecurity practices complicated recovery from the Arizona Beverages ransomware attack. What appears to have been a targeted ransomware attack knocked over 200 networked computers and servers offline at Arizona Beverages, one of the largest bev… Continue reading Arizona Beverages Ransomware Attack Halts Sales for Days

Kubernetes Security Best Practices to Protect Your Cloud Containers

Seal up your cloud containers with these Kubernetes security best practices. Lightweight cloud containers are fast replacing resource-sucking virtual machines, and Kubernetes is fast becoming the de facto standard for container orchestration. Kubernete… Continue reading Kubernetes Security Best Practices to Protect Your Cloud Containers