Category: Cyber Defense Magazine

The Public Cloud. Is It Secure?

GTB Technologies, Inc. The Data Protection Company In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store their vital information. Offloading data storage and management has worked…

Protect Yourself from Threats and Fraud With XTN

By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also employ behavioral biometric analysis, both to guarantee complete user profiling,…

The Secret to Winning IT Security Roulette

By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely you are to go home a loser. IT security is…

Threat Modeling High Value Assets

By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware and misclassification of malware as the threat is so commonplace,…

New Raccoon Stealer uses Google Cloud Services to evade detection

Researchers found a piece of Raccoon Stealer that abuse of Google Cloud Services and leverages multiple delivery techniques. Racoon malware (aka Legion, Mohazo, and Racealer) is an info-stealer that recently appeared in the threat landscape that is advertised in hacking forums. The malware…

TEHTRIS XDR Platform, A Holistic Cybersecurity Solution

By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries within heterogeneous, international and distributed infrastructures. In 2019, TEHTRIS captured…

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

The China-linked group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and ManageEngine in a campaign on a global scale. The China-linked cyberespionage group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and Zoho ManageEngine in a campaign on a…

Hackers target zero-day flaws in enterprise Draytek network devices

Experts from Qihoo 360’s NetLab recently spotted two zero-day campaigns targeting DrayTek enterprise-grade networking devices. Since December 2019, researchers from Qihoo 360 observed two different attack groups that are employing two zero-days exploits to take over DrayTek enterprise routers to eavesdrop…

Coronavirus scams, found and explained

By David Ruiz Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this global pandemic is expanding their horizons. In the past week,…

Cross Domain Solutions – Quo Vadis

By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly referenced as an air gap. While isolation significantly increases the…

Demystifying Network Investigations with Packet Data

By Michael Morris, Director of Global Technologies Alliances and Business Development, Endace A common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot security or performance issues quickly and conclusively. Typically, analysts are…

Securing the Next Generation Data Center

By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks                                                                                                         Securing Cloud-Generation Data Centers As many firms transition their data centers into the cloud and/or heavily virtualized environments, the old practice of securing…

Is Data Loss Prevention (DLP) Really Dead?

By Uzi Yair, Co-founder GTB Technologies, Inc. I recently came across several digital security vendor sites that describe themselves as a “DLP alternative.” Perusing through their pages, I came across comments such as “DLP is hard to deploy”, “DLP is…

A Green Database

By Chris Jordan, CEO, Fluency Security Datacenters are basically toxic computer equipment in a constantly cooled warehouse. Their footprint is growing across the globe in places like Loudoun County, Virginia, a place not known for its cold weather. Much of…

The Power of Purple

A Proactive Cybersecurity Paradigm By Daniel DeCloss, CEO, PlexTrac, Inc. Cybersecurity is hard, and attackers are relentless.  The job of protecting an organization from cyber threats can feel overwhelming and stressful.  The industry is short on talent and inundated with…

GDPR stand aside — meet CCPA!

The interactions between CCPA compliance and Security solutions. By Oren T. Dvoskin, Global Marketing Director, Sasa Software Introduction                                                 The California Consumer Privacy Act, AB 375 (”CCPA”) was enacted in June 2018, and became effective on January 20th 2020.  CCPA’s provisions…

Most organizations have yet to fix CVE-2020-0688 Microsoft Exchange flaw

Organizations are delaying in patching Microsoft Exchange Server flaw (CVE-2020-0688) that Microsoft fixed with February 2020 Patch Day updates. Organizations are delaying in patching Microsoft Exchange Server flaw (CVE-2020-0688) that Microsoft fixed with February 2020 Patch Day updates. The CVE-2020-0688 flaw resides in the…

5 Ways Hackers Can Bypass Your MFA

Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on Everything! Passwords are no longer enough to validate the identity…

Stopping Fraud and Threats with XTN

By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also employ behavioral biometric analysis, both to guarantee complete…

AttackIQ 2020 Predictions

By Christopher Kennedy, CISO and VP of Customer Success, AttackIQ 2020 Election Security Insecurity: Election security will be an open wound that can’t be healed in time for the 2020 election. There is still bad blood from the 2016 election…

Protect Yourself From Threats and Fraud With XTN

XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive,using proprietary AI algorithms. We also employ behavioral biometric analysis, both to guarantee complete user profiling, and to evaluate and block anomalies and…

RSA Conference Reveals RSAC Launch Pad 2020 Participants

Bedford, MA – Feb 05, 2020 Three Emerging Cybersecurity Startups Take the Stage to Launch Game-Changing Industry Solutions RSA® Conference, the world’s leading information security conferences and expositions, today revealed the three cybersecurity startups selected to participate in the second…

2020 Industry Predictions

By Peter Goldstein, CTO, and co-founder, Valimail  Email security will prove to be the weakest link in election security. Email is implicated in more than 90 percent of all cybersecurity attacks, and election infrastructure is also vulnerable to email-based attacks.…

Seven Security Predictions for 2020

By Corey Nachreiner  Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year. Even though the threats coming at you won’t be any…

Jeff Bezos phone was hacked by Saudi crown prince

  The phone of the Amazon billionaire Jeff Bezos was hacked in 2018 after receiving a WhatsApp message from the personal account of the crown prince of Saudi Arabia. In April 2019, Gavin de Becker, the investigator hired by Amazon chief…

Moving Network Security to The Cloud

What Is Secure Access Service Edge (Sase) And Why It Matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only a few years ago. The cloud has changed everything. Mobile…

The Decade Ahead for Cybersecurity

By Matthew Gyde, CEO, Security, NTT Ltd. The Dawn of a New Era As 2020 dawns, we stand at the threshold of a new decade that’s certain to reveal challenges to the security landscape we could scarcely have imagined in…

US Military Veterans Targeted By Online Scams

After Years of Vigilant Service, US Veterans must remain Vigilant Online and Guard their Home like US Marines Guard the President of the United States (POTUS) US Veterans are twice as likely as non-Veterans to be targets of online scams. …

Anomaly Detection Is the Next Cybersecurity Paradigm

It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart of cybersecurity. Today, virtually every cybersecurity practice currently depends on…

How To Build A Career In Cyber Security

By Pedro Tavares Nowadays, cybersecurity is seen as an attractive landscape for ambitious people and a truly great opportunity to fight cybercrime. During the past few months, many cyberattacks have targeted companies around the world. The reason being, there’s a…

Seven Security Predictions For 2020

By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year. Even though the threats coming at…

Getting PKI Right

Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view PKI as a vital layer within the security framework, helping…

Iot Security and Privacy

Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age of IoT”. What makes it an “Age of IoT”? The…

Encryption Is Key to Guarantee Data Is Anonymous

By Julian Weinberger, CISSP, Director of Systems Engineering at NCP engineering Regulatory initiatives such as the EU General Data Protection Regulation (GDPR) have granted consumers powerful rights to determine how organizations collect and use personally identifiable information. Companies that hold on…

Encryption Is Key to Guarantee Data Is Anonymous

By Julian Weinberger, CISSP, Director of Systems Engineering at NCP engineering Regulatory initiatives such as the EU General Data Protection Regulation (GDPR) have granted consumers powerful rights to determine how organizations collect and use personally identifiable information. Companies that hold on…

The Ultimate Guide to SSL/TLS Decryption

Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. While the adoption of Secure Sockets Layer (SSL), and its…

8 Common Types of Small Business Cyber Attacks

By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report released by Verizon showed that approximately 43% of cyber-attacks targeted…

How to Know If Someone Is Watching You on Your Camera

In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist,  SEOforX In this era of video chatting and social media live streaming, your computer’s webcam can…

How To Mitigate The Risks Of Remote Desktop Protocol

By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling all its computer assets no matter how far away or…

TikTok security flaws allowed hijacking any account

A flaw in the popular TikTok app could allow attackers to hijack any user account just by knowing the mobile number of the victim. Security experts from CheckPoint have discovered a critical vulnerability in the popular TikTok app that could…

What’s the Security Misconfiguration Antidote? Automation.

By Joshua Williams, Senior Cloud and Automations Solutions Engineer, FireMon The collective security community is spending too time much worrying about vulnerabilities. They need to shift some of those resources and take a good hard look at misconfigurations, especially in…

The Dark Truth of Insider Threat

By Richard Menear, CEO, Burning Tree In any business, we inherently want to trust the people we work with. By and large, we can. However, the reality is that insiders remain one of the main threats to your organization’s information…

Firewall Sandwich: A Hacker’s Delight, Unless…

No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls by regarding them not merely as a first line of…

Really, Imagine a Day Without Water

By Michael Yehoshua On October 23, toothpaste maker Colgate and world champion swimmer, Michael Phelps, the ambassador for the company’s Save Water initiative, headed over 1,100 organizations across the United States for the fifth annual ‘Imagine a Day without Water’.…

It’s Time for A Tough Conversation About Trust

By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, and the like. In reality, computer and network security are…