KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where global leaders were asked about their 3-year outlook. CEOs of the world’s most influential companies are planning what a return to ‘normal’ will look like. Nearly half (45 percent) expect normality to resume in 2022, with only one-third (31 percent) anticipating a […]
Unraveling open port threats and enhancing security with port scanning tools
From exposing your network vulnerabilities to becoming a passageway for intruders, open ports can pose several risk vectors that threaten your network’s confidentiality, integrity, and availability. This is why it’s a best practice to close your open ports. To tackle the risks introduced by open ports, network admins rely on port scanning tools to identify, […]
Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security
A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and non-domain devices that require access to corporate assets to carry out everyday operations. To facilitate easy access and secure information exchanges between the mobile devices and corporate assets, IT teams […]
Microsoft Exchange Server hacks ‘doubling’ every two hours | ZDNet
Cyberattackers are taking full advantage of slow patch or mitigation processes on Microsoft Exchange Server with attack rates doubling every few hours. According to Check Point Research (CPR), threat actors are actively exploiting four zero-day vulnerabilities tackled with emergency fixes issued by Microsoft on March 2 — and attack attempts continue to rise. In the […]
Five worthy reads: Understanding quantum computing and its impact on cybersecurity
Five worthy reads is a regular column on five noteworthy items we discovered while researching trending and timeless topics. In this week’s edition, let’s explore how quantum computing works and how it impacts cybersecurity. Quantum physics describes the behavior of atoms, and fundamental particles like electrons and photons. A quantum computer operates by controlling the […]
[Heads Up] Has Your Exchange Been Hacked And Is Now A Ticking Time Bomb?
Brian Krebs wrote: “Globally, hundreds of thousand of organizations running Exchange email servers from Microsoft just got mass-hacked, including at least 30,000 victims in the United States.” UPDATE: ESET has just published a new report saying that unpatched Exchange servers are currently hunted down by “at least 10 APT groups.” Each hacked server has been […]
Credential Harvesting Attacks Targeting the U.S. Federal Government Nearly Double as Malware Declines
Shifts to a remote workforce in 2020 gave cybercriminals an opportunity to change tactics, focusing on credentialed access to systems accessed from outside government networks. New data from mobile security vendor, Lookout highlights new problems arising from increased mobile use by government employees in their new U.S. Government Threat Report. The change to using a […]
Five worthy reads: Are we ready for a passwordless future?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the possibilities and challenges of a passwordless era. This past year has been difficult for organizations globally, from having to deal with multiple cybersecurity issues due to evolving workforce models. But simple […]
5 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently
ESG research on cyber risk management, which involved 340 cybersecurity professionals, revealed that 40 percent felt tracking patch and vulnerability management over time was their biggest challenge. The traditional approach to patch and vulnerability management Traditionally, these processes involve dedicated tools operated by different teams. The security team employs vulnerability scanners to identify vulnerabilities in […]
Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks
New data from phishing detection vendor Inky highlights which brands are most often used by cybercriminals in phishing attacks that will give them the edge needed for a successful phish. If you were to analyze nearly 657 million emails, you’d probably have a good grasp on exactly what the bad guys are doing to phish […]