Category: Uncategorized

Security Vulnerability Found In Wyze Security Cameras

Do you have a Wyze Cam?  If you’re not sure what that is, it’s an internet camera that offers a low-cost solution to those who are interested in playing around with video …http://dlvr.it/SNhjLL

Russia-Ukraine Crisis: What’s the Threat to Energy Sector?

ICYMI: The latest edition of the ISMG Security Report analyses the latest cyber threats to the energy sector as Russia’s invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.http://dlvr.it/SNfc2t

African Bank Malware Campaign Shows Actor’s Persistence

ICYMI: Aite-Novarica’s Schreider Breaks Down What Makes This Scam ‘Interesting’ Researchers discovered a new social engineering-heavy malware campaign focused on defrauding employees in West Africa’s banking sector. Although this campaign is not exactly new, it shows a detailed account of what social engineering looks like, according to cybersecurity veteran Tari Schreider.http://dlvr.it/SNfDhB

APTs Using New Tools to Target ICS/SCADA

ICYMI: Joint Advisory Issued by U.S. Govt. Agencies, Mandiant, Dragos, Schneider Electric U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.http://dlvr.it/SNfDdm

Why New Incident Reporting Mandates are ‘Ground Breaking’

New legislation mandating cyber incident reporting for critical infrastructure providers within 72 hours, and the reporting of ransom payments within 24 hours, is “ground-breaking,” says former National Security Agency deputy commander Tim Kosiba, CEO of security firm Bracket f Inc.http://dlvr.it/SNf7T3

Strategies to Modernize Ransomware Response

ICYMI: Accenture’s Robert Boyce on Adopting an Effective Communications Plan Accenture’s new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren’t enough and offers practical steps for managing a ransomware response.http://dlvr.it/SNcscp

Russia-Ukraine Crisis: What’s the Threat to Energy Sector?

The latest edition of the ISMG Security Report analyses the latest cyber threats to the energy sector as Russia’s invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.http://dlvr.it/SNbWYM

APTs Using New Tools to Target ICS/SCADA

Joint Advisory Issued by U.S. Govt. Agencies, Mandiant, Dragos, Schneider Electric U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.http://dlvr.it/SNb5vl

African Bank Malware Campaign Shows Actor’s Persistence

Aite-Novarica’s Schreider Breaks Down What Makes This Scam ‘Interesting’ Researchers discovered a new social engineering-heavy malware campaign focused on defrauding employees in West Africa’s banking sector. Although this campaign is not exactly new, it shows a detailed account of what social engineering looks like, according to cybersecurity veteran Tari Schreider.http://dlvr.it/SNb5n2

Chromebook Users Will Get New Tools And Features Soon

Do you own a Chromebook?  If so, be aware that version 100 of the Chrome OS and Chrome Browser boasts a new launcher.  Simply press the “Everything” button which is located on …http://dlvr.it/SNZw56