Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

[INFOGRAPHIC] How Advanced Attacks are Transforming MSP Endpoint Security

Sep 17 by Cristian Iordache

Most analysts predict managed cyber-security will grow at a CAGR of over 15% in coming years. This trend is no surprise, considering the global shortage of security talent and the increasing sophistication of attacks on data and business productivity.

Read More

52% of UK Businesses Risk Hefty Fines under GDPR

Sep 16 by Filip Truta

More than a year after the European Union enacted the General Data Protection Regulation (GDPR), half of businesses in the United Kingdom are still not fully compliant. Around 52% stand to incur big penalties from the Information Commissioner’s Office (ICO), in case they misuse personally identifiable information of EU residents.

Read More

Financial Services Data Breaches: More Pain Ahead?

Sep 13 by George V. Hulme

Banks, like most industries, are undergoing profound digital transformations. They’re trying to compete, lower business risk, and cut costs from their business operations.

Read More

Patch Management a Key Area for Improvement at Most SMBs, Study Shows

Sep 12 by Filip Truta

Cybercriminals often exploit flaws in unpatched systems to breach an organization, as in the 2017 WannaCry contagion and the massive 2018 Equifax incident. Perhaps it’s no surprise, then, that businesses big and small list patch management as a key pain point. And, according to a recent survey, small and medium-sized businesses are particularly susceptible to data breaches that use this attack avenue.

Read More

FBI Shows You How to Spot a Business Email Compromise Scam, Cuffs 281 BEC Operators

Sep 11 by Filip Truta

The US Federal Bureau of Investigation (FBI) and federal partners have arrested 281 alleged cybercriminals across nine countries, dismantling one of the biggest international business email compromise (BEC) operations.

Read More

Cybersecurity Takes Center Stage in Board Rooms across US, Europe, Australia and New Zealand

Sep 11 by Filip Truta

Cybersecurity has become a board room imperative, with almost half of corporate boards across the US, Europe, Australia and New Zealand now actively discussing cybersecurity strategy, new research shows.

Read More

Politicians Don’t Understand Cybersecurity, Say 82% of IT Security Professionals

Sep 10 by Filip Truta

Legislators need to impose stricter cybersecurity laws as cyber-attacks continue to increase. However, the vast majority of cybersecurity professionals attending this year’s Black Hat conference in Las Vegas agreed that elected officials aren’t capable of crafting effective security regulation.

Read More

BlueKeep Exploit Code Released, Blocked by Hypervisor Introspection

Sep 09 by Andrei Florescu
  • BlueKeep is a wormable security flaw in Microsoft Remote Desktop Services that allows attackers to take control remotely of vulnerable systems.
  • Metasploit developers released the first functional prototype of exploit code with payload execution capabilities.
  • Bitdefender tested the newly released exploit code and Hypervisor Introspection prevents this attack (demo included).

Last Friday, security researchers working on the Metasploit project released the first functional exploit code to successfully achieve code execution against systems vulnerable to BlueKeep. This high impact vulnerability affecting Microsoft Remote Desktop Services was first reported as CVE-2019-0708 in May 2019. On May 14th, Microsoft started releasing patches for affected Windows OSes (including the end of life XP and 2003)  

Read More

US Government Institutions Become Hot Target for Ransomware Operators in 2019

Sep 09 by Filip Truta

Ransomware operators have developed a taste for state and local governments across the United States this year, with almost two thirds of ransomware attacks in 2019 directed at government organizations.

Read More

Top Inherent Risks with Cloud Security

Sep 09 by Bob Violino

The Cloud Security Alliance (CSA), an organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, recently unveiled its “Top Threats to Cloud Computing: The Egregious Eleven,” a report that examines the risks inherent with cloud security.

Read More

Moving to the Cloud? Be Ready to Embrace Complexity

Sep 03 by Bob Violino

The Cloud Security Alliance (CSA), an organization that works to raise awareness about best practices for secure cloud computing environments, has been especially busy of late—churning out findings related to cyber security and the cloud.

Read More

Every Hour SOCs Run, 15 Minutes Are Wasted on False Positives

Sep 02 by Ericka Chickowski

New research out in the past few weeks show that false positives and alert fatigue continue to plague security operations centers (SOCs) worldwide. And, according to the research, it's killing the SOC's ability to keep teams intact and to respond quickly to threats.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets