Cybersecurity career mistakes
Being there, done that Continue reading on The CISO Den »
Cyber News, Cyber Threat TrendsBeing there, done that Continue reading on The CISO Den »
Cyber News, Cyber Threat TrendsThe report highlighted the enormous business costs of supply chain software attacks
Cyber News, Cyber Threat TrendsToday we’re examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report. This document is an anonymized look at of all the engagements that the Cisco Talos Incident Response team have been involved in over the previous three months. It also features threat intelligence from our team of researchers and analysts. […]
Cyber News, Cyber Threat TrendsAfter suffering two large, and embarrassing, data breaches in recent weeks, the Australian government increased the fine for serious data breaches from $2.2 million to a minimum of $50 million. (That’s $50 million AUD, or $32 million USD.) This is a welcome change. The problem is one of incentives, and Australia has now increased the […]
Cyber News, Cyber Threat TrendsThis blog was written by an independent guest blogger. The banking and financial sector is known for its dependence on third-party vendors that help provide customers with quality financial products and services. It is one of the most interconnected sectors, making it one of the most vulnerable to cyberattacks. And because third parties operate through […]
Cyber News, Cyber Threat TrendsFor many years, attackers have used and abused various ways to get on our systems. From phishing to tricking us to click on websites, if an attacker can get their code on our systems they are no longer our systems. Attackers will even invest the time, energy, and expense to get their malicious drivers approved […]
Cyber News, Cyber Threat TrendsCisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect Secure Mobility Client for Windows. Tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), the vulnerabilities could enable local authenticated attackers to perform DLL hijacking and copy arbitrary files to system directories with elevated privileges.
Cyber News, Cyber Threat TrendsSonicWall figures show overall attacks trending down
Cyber News, Cyber Threat TrendsUnspecified number of customers impacted over 2.5 years
Cyber News, Cyber Threat Trends