Oracle Provides Workaround for Critical Flaw in Identity Manager

Oracle has warned customers about a critical vulnerability in the Oracle Identity Manager (OIM) that could allow an attacker to gain complete control over the user management system. OIM is part of Oracle’s Fusion Middleware suite of business applications and provides user provisioning and management. Companies use this application to add new accounts for employees..

The post Oracle Provides Workaround for Critical Flaw in Identity Manager appeared first on Security Boulevard.

Continue reading Oracle Provides Workaround for Critical Flaw in Identity Manager

Kaspersky Says Its Hand Was in the Cookie Jar, But …

Kaspersky Lab has been bombarded with an unending stream of claims that its Russian roots equate to being part of the Russian national team when it comes to national security interests. We previously discussed the rationale behind the ban of Kaspersky Lab security products in any U.S. government device, and how the company is believed..

The post Kaspersky Says Its Hand Was in the Cookie Jar, But … appeared first on Security Boulevard.

Continue reading Kaspersky Says Its Hand Was in the Cookie Jar, But …

IoT Reaper Botnet Is Much Smaller Than Initially Believed

Security researchers warned last week that attackers are building a massive botnet of more than a million routers and wireless cameras. However, additional research has revealed that the number of devices actually enslaved by the botnet is only around 20,000, for now. “Over a million organizations have already been affected worldwide, including [in] the U.S.,..

The post IoT Reaper Botnet Is Much Smaller Than Initially Believed appeared first on Security Boulevard.

Continue reading IoT Reaper Botnet Is Much Smaller Than Initially Believed

Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach

Equifax reportedly took six months to take down a publicly exposed web application that could have allowed anyone on the internet to search and download sensitive personal consumer data. VICE Motherboard reported Thursday that an unnamed security researcher alerted Equifax about the exposed application in December 2016, but the company didn’t take steps to secure..

The post Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach appeared first on Security Boulevard.

Continue reading Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach

Bad Rabbit Ransomware Highlights Perils of Poor Network Management

Companies in Russia and Eastern Europe have been battling a new ransomware outbreak since Tuesday that security researchers have dubbed Bad Rabbit. The malware can spread to Windows systems over local networks by using weak or stolen credentials for SM… Continue reading Bad Rabbit Ransomware Highlights Perils of Poor Network Management

Proposed Active Cyber-Defense Bill Channels Mao Zedong

When an intruder is discovered in your network, every incident response team’s response is similar: What are they doing? What have they done? How long have they been here? Whose data has been compromised? How do we expunge them from our network? And the million-dollar question: Who are these miscreants in our network? All deserving..

The post Proposed Active Cyber-Defense Bill Channels Mao Zedong appeared first on Security Boulevard.

Continue reading Proposed Active Cyber-Defense Bill Channels Mao Zedong

7 Strategies to Secure Enterprise IoT

The internet of things (IoT) is opening a whole new world of possibilities. Unfortunately, it also is creating a whole new world of threats too, such as ransomware of things (RoT). Here are seven things enterprises can do to better secure their IoT. Kn… Continue reading 7 Strategies to Secure Enterprise IoT

Make Security a Business Partner to Avoid Job Burnout

Take a high-pressure job, add in high-performance expectations, season with continual threats from hackers looking to steal your company’s electronic assets, and you have a sure-fire recipe for burnout. The list of things that keep chief information security officers awake at night—and some of them still in the office with their sleeves rolled up—are legion…

The post Make Security a Business Partner to Avoid Job Burnout appeared first on Security Boulevard.

Continue reading Make Security a Business Partner to Avoid Job Burnout

Cybersecurity and Machine Learning/AI: What’s the Real Impact?

Will AI render human analysts obsolete, or be an extension that helps them be more effective? How about bad guys? Are we headed for an AI showdown? Here’s the lay of the land in AI territory now. The buzz on artificial intelligence (AI) is deafening. Depending on who is hawking what, AI is either vastly..

The post Cybersecurity and Machine Learning/AI: What’s the Real Impact? appeared first on Security Boulevard.

Continue reading Cybersecurity and Machine Learning/AI: What’s the Real Impact?

Supply Chain Attack Hits Maker of Popular MacOS Apps

Eltima Software, a maker of popular applications for macOS, had its website compromised by hackers who replaced the installers for two of its applications with trojanized versions. This is the latest in a string of software supply chain attacks that ha… Continue reading Supply Chain Attack Hits Maker of Popular MacOS Apps