Network July 20, 2017 The Living Dead: How to Protect Legacy Systems 2 min read - When patching legacy systems is simply not an option, security teams must take steps to minimize the risks associated with outdated software.
July 17, 2017 Everlasting Issue? EternalBlue Scanning Apps Find 50,000 Susceptible Systems 2 min read - A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
July 14, 2017 IT Managers Must Patch Security Vulnerabilities in Microsoft Windows 2 min read - Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
July 10, 2017 Google Patches Critical Android Vulnerabilities 2 min read - Google recently disclosed 138 Android vulnerabilities, including media framework issues that could enable attackers to execute arbitrary code remotely.
July 10, 2017 NotPetya Operators Installed Three Backdoors on M.E.Doc Software Server Before Activating Malware 2 min read - New research revealed that the threat actors behind the recent NotPetya wiperware attacks had established three backdoors in the M.E.Doc servers.
Application Security July 10, 2017 A Primer on Cross-Site Scripting (XSS) 2 min read - XSS is a prevalent web-based exploit in which threat actors inject malicious code into webpages to compromise data or facilitate phishing scams.
Endpoint July 3, 2017 Going Through a Rough Patch in Your Security Program? Consistent Software Patching Can Solve Security Woes 2 min read - Effective and consistent software patching can solve the majority of common security challenges, yet many organizations struggle with patch management.
June 14, 2017 Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner 2 min read - Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
Energy & Utility June 13, 2017 Addressing Security Gaps in the Energy Industry 2 min read - To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
June 8, 2017 Application Security Report Calls Out Problems in Mobile, IoT Devices and DevOps 2 min read - High-Tech Bridge released a report at InfoSecurity Europe 2017 highlighting some of the fastest growing application security threats to developers.