According to the Cybersecurity and Infrastructure Security Agency (CISA), malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-3447, CVE-2021-3452, and CVE-2021-3120. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine.
Every organization must prepare for a ransomware attack. The question is how best to do it. Surprisingly, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves.
With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing on one of the most common attack vectors: Active Directory.
HP Wolf Security released the findings of a global survey of 1,100 IT Decision Makers (ITDMs), examining their concerns around rising Nation State attacks: 72% of respondents said they worry that nation-state tools, techniques, and procedures (TTP) could filter through to the dark net and be used to attack their business.
Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.
As the vaccine rollout continues and organizations are planning their hybrid work plans, they must ensure this return to a physical office, even if it’s partial, doesn’t open them up to cybersecurity threats. Here, Rick McElroy, Principal Cybersecurity Strategist at VMware, discusses what chief information security officers should keep in mind as we get closer to returning to physical offices.
A recent International Data Corporation (IDC) survey found that more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months.
U.S. Secret Service agents and agency task force of partners have been named in multiple categories of awards as announced by the International Association of Financial Crimes Investigators.
Over the course of these games, it’s become increasingly clear that the organizers did indeed exercise preventative measures and that despite the challenges and limitations of holding an Olympics during a pandemic, the Tokyo Olympics have been a real success story from a cybersecurity perspective. Organizers of all large-scale, televised sporting events—and indeed just all organizations in general—should look to this year’s games as a model to emulate.