Attacks targeting healthcare organizations just won’t let up. In early June, the University of California San Francisco (UCSF) announced that their IT team identified a limited security breach within a part of the UCSF School of Medicine’s IT environment.
All about Virtualization and Cloud Security | Recent Articles:
Employees typically access 59 risky URLs per week, or 8.5 per day, according to new data. That’s more than once per hour in an eight-hour workday. Depending on their knowledge of the threat landscape, corporate employees can be as dangerous as an external cyber-attack on the company – especially if those employees are working remotely.
Sensitive data, like personally identifiable information (PII) and credit card information, has never been more at risk, while security is becoming less effective, new research shows.
A patchwork of tools, the presence of misconfigured services, and confusion around data security ownership in the cloud has created a crisis of confidence among IT security professionals that will only be fixed by organizations making security part of their business culture.
The media industry is a prime target for credential stuffing attacks, with more than 17 billion incidents reported from January 2018 to December 2019, according to a report from Akamai.
Over a third of organizations are seeing email-based attacks hit their inbox daily, new data shows. IT professionals now say they need to remediate an email-based attack every day –including suspending compromised email accounts.
- Windows DNS server remote code execution vulnerability permits full takeover of infected systems
- Wormable exploits can spread via malware between vulnerable computers without user interaction
- SIGRed vulnerability impacts nearly all versions of DNS in Windows Server dating back over 17 years
- Hypervisor Introspection (HVI) prevents zero-day code execution from suspicious memory regions
On July 14, Microsoft published Security Vulnerability CVE-2020-1350 describing a longstanding, broad-based Windows DNS server remote code execution vulnerability whereby Windows Domain Name servers fail to properly handle malformed DNS requests, allowing an attacker to corrupt memory and run arbitrary code in the context of the Local System Account. All Windows servers that are configured as DNS servers are at risk from this critical (CVSS 10) vulnerability—which Microsoft acknowledges dates back at least 17 years—putting directly at risk multiple versions of Windows Server 2008, 2012, 2016, and 2019 in widespread production worldwide.
- Managed Detection and Response is one of the fastest growing areas of cybersecurity with a 30.4% CAGR
- Huge revenue opportunity with MDR for MSPs to help customers that lack security extended teams
- Opportunities involving MDR tend to be larger, stickier, and foster deeper customer relationships than tools
- MDR solves key customer gaps in alert response management, technical skills, and overall security outcomes
MSPs, are you thinking about jumping into managed security services?
Security operations center (SOC) performance is getting worse, and the human element continues to battle stress, causing employees to search for new jobs in higher numbers, according to a study from Devo Technology and the Ponemon Institute.
A study using data from the Center for Strategic and International Studies (CSIS) looked at how cyberattacks are distributed across the globe and the most common techniques used in cyberattacks.
Bring your own device (BYOD) policies are changing around the world, and the latest report by Bitglass shows that companies are now much more permissive in this regard, although the shift is likely caused by necessity and not choice.
Half of infosec professionals in a recent Bitdefender study revealed that their organization doesn’t have a contingency plan in place, or didn’t know if they did, for a situation like COVID-19 or a similar scenario.