CyberSecurity Blog

When Cybercriminals Go Phishing, Emails Get the Most Bites

Developing a Multilayered Defense Strategy for the Most Common Attack Techniques Despite the significant advances technology has made over the past few years, email remains one of the best tools for cybercriminals. Training is just one piece of the puzzle. The best defense against today’s cybercrime landscape is a multilayered security strategy.http://dlvr.it/SsV1PV

How to Shop for an API Security Platform

ICYMI: Consider Domains, Features, Ease of Integration, Scalability and Vendor Support API security platforms have become an essential part of any organization’s cybersecurity strategy, but with so many options available, it can be difficult to know how to choose the right one. In this article, we’ll discuss how to evaluate API security platforms and what…
Read more

Microsoft Expands Logging Access After Chinese Hack Blowback

E3 Licensees Unlock Access to More Cloud Logs After Only E5 Clients Could Spot Hack Microsoft customers will gain access to expanded cloud logging capabilities at no additional cost just days after lower-level customers were unable to detect a Chinese cyberattack. CISA has identified several security logs – critical to detect and prevent threat activity…
Read more

Security Agencies Urge Users to Patch Citrix Zero-Day Flaw

Vulnerable Citrix Appliances Used in Healthcare Sector; Exploits Seen in the Wild Top U.S. and Australian cybersecurity agencies strongly urged users to patch a critical zero-day flaw in Citrix ADC and Gateway appliances being exploited by unnamed threat actors in the wild. The bug, which is tracked as CVE-2023-3519, gives unauthenticated attackers RCE privileges.http://dlvr.it/SsRHtH

Reporting Cyber Incidents Within 72 Hours: Challenges Ahead

Many critical infrastructure sector organizations, especially smaller entities, will likely struggle to comply with an upcoming requirement to report cyber incidents to federal regulators within 72 hours – due to an assortment of reasons, said Stanley Mierzwa of Kean University.http://dlvr.it/SsRHTY

How to Create an Effective Disaster Recovery Plan for Your Business

A solid disaster recovery plan for businesses is essential in today’s tech-focused world. Without one, companies risk their reputation, customers’ personal information, and profits in the wake of an unpredictable event that …http://dlvr.it/SsR2Hx

How to Shop for an API Security Platform

Consider Domains, Features, Ease of Integration, Scalability and Vendor Support API security platforms have become an essential part of any organization’s cybersecurity strategy, but with so many options available, it can be difficult to know how to choose the right one. In this article, we’ll discuss how to evaluate API security platforms and what factors…
Read more

The Surveillance Society and Digital Freedom

ICYMI: We live in a surveillance society, but even though citizens are concerned about the lack of privacy, they don’t know what to do about it, said David Sinclair, founder of 4Freedom Mobile, a mobile service provider that helps subscribers secure their phones and stop tracking, hacking and data theft.http://dlvr.it/SsNN8m

Using Digital Whiteboards for Teamwork

Collaborating with a team that’s spread out can be a challenge. One way to address it is by using digital whiteboards. These are virtual platforms where teams can work together, brainstorm, and …http://dlvr.it/SsNHNB

Hacker Stole Signing Key, Hit US Government’s Microsoft 365

ICYMI: Monitor Logs to Spot Zero-Day Attack, US Cybersecurity Officials Advise Suspected Chinese hackers gained access to senior U.S. officials’ emails by exploiting a zero-day vulnerability in Microsoft’s cloud environment. While Microsoft said customers couldn’t have prevented the attack, the U.S. government says logging was key to spotting it.http://dlvr.it/SsNBb8