U.S., UK and Australia Issue Joint Cybersecurity Advisory

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a per… Continue reading U.S., UK and Australia Issue Joint Cybersecurity Advisory

Fourth Record Year in a Row for Vulnerabilities

On December 15, 2020 we just hit another milestone with the number of vulnerabilities recorded in the US CERT Vulnerability Database (so far in 2020) exceeding the total count in 2019, marking a fourth record year of vulnerabilities discovered in produ… Continue reading Fourth Record Year in a Row for Vulnerabilities

US offers up to $5m reward for information on North Korean hackers

UN experts believe the DPRK cyber-steals and launders money, extorts companies and funnels the cash into its nuclear program. Continue reading US offers up to $5m reward for information on North Korean hackers

APTs are targeting IT service providers

Managed service providers (MSPs) and cloud service providers (CSPs) are under attack by advanced persistent threat (APT) groups, the U.S. Department of Homeland Security warns. “MSPs provide remote management of customer IT and end-user systems. … Continue reading APTs are targeting IT service providers

ERP applications under attack: How criminals target the crown jewels

Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise in cyberattacks on widely-used enterprise resource planning (ERP) applicatio… Continue reading ERP applications under attack: How criminals target the crown jewels

US legislators put industrial control system security on the map

After a spate of attacks on industrial control systems (ICS), the US this week officially recognized the need to secure them with a new bill. Continue reading US legislators put industrial control system security on the map