Tag: Security

  • The numeric Tech Support Scam campaign

    There are many different tech support scam (TSS) campaigns active at any given moment, the majority of them are fueled by malicious adverts (the browser lockers), or bundled software (the screen lockers). Something interesting happened recently, where legitimate – but hacked – websites would redirect to a tech support scam page, not only via malvertising but also…

  • Heartbleed still hurting hard. UK council fined £100,000 after data breach

    A UK city council has been hit by a £100,000 fine after it suffered an embarrassing data breach as a result of not patching against the infamous Heartbleed vulnerability in a timely fashion. As regular readers will recall, the Heartbleed bug in OpenSSL was discovered in 2014, giving malicious hackers, security researchers and snoopers a…

  • The Changing World of Service Provider CPE (Part 2)

    For Service Providers, Universal Customer Premise Equipment (uCPE) is getting more interesting every day.  IHS Market analyst, Michael Howard, said in a recent SDxCentral article that “the uCPE [universal customer premises equipment] phenomenon is an almost perfect storm of five trends, whether it is white box, grey box, or more proprietary. This new uCPE market is…

  • Who’s Afraid of the Big, Bad Robot?

    Tired of hearing about IoT? Me too. Read full news article on Fortinet Blog  

  • Yin and Yang: Two Views on IAM – Active Directory Automation, Success or Failure?

    By Steve Mowll and Chris Williams Point: Effective identity management strategies are business-based, and should rise above technical limitations. Read full news article on The RSA Blog  

  • Cybercrime At Your Service, Mac

    There is a pervasive belief, even among security professionals, that Apple Mac devices are immune to security breaches. And while there is some truth behind that belief, it’s time that we take this particular attack vector more seriously. Read full news article on Fortinet Blog  

  • Word exploits weaponised in quick time

    The bad guys were especially efficient at turning the CVE-2017-0199 Word exploit into a potent attack, according to a SophosLabs analysis. Principal Researcher Gábor Szappanos outlined the sequence of events in “CVE-2017-0199: Read full news article on Naked Security  

  • Behind the CARBANAK Backdoor

    In this blog, we will take a closer look at the powerful, versatile backdoor known as CARBANAK (aka Anunak). Specifically, we will focus on the operational details of its use over the past few years, including its configuration, the minor variations observed from sample to sample, and its evolution. Read full news article on FireEye…

  • Byline: Securing Your Enterprise’s Expansion into the Cloud

    For enterprises, the very real benefits of moving applications to the cloud also come with significant challenges. Whether their using the public cloud, a private cloud or, as is often the case, a hybrid of the two, it’s necessary to optimize application performance to get the full benefits of cloud technology and enable a better…

  • Completing the Puzzle

    In a previous blog I reviewed the real world pay back for being a risk leader.  Let’s say your company gets it, they know that good risk management increases the likelihood objectives will be fulfilled and profits improved, and now you’ve been given the assignment to start the risk management program to make your organization a…

  • SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

    Linux Machine’s are Hijacked by unknown Vulnerability by using SambaCry Flow and it has cryptocurrency mining utility. This Vulnerability Exploit by using unauthorized Write Permission in Network Drive in Linux Machines. Read full news article on GBHackers  

  • The ‘SambaCry’ Samba Vulnerability in Containers

    There’s a new vulnerability which could affect containerized apps; this time it’s the Samba vulnerability affecting Linux networking. Samba allows non-Windows operating systems to share network shared folders, files, and printers with a Windows operating system. Read full news article on DABCC