Security News

Menacing Malware: Exposing Threats Lurking in your Linux-Based Multi-Cloud
2022-12-19 11:00

We and our store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning.

Advanced Threat Prevention with VMware NSX Distributed Firewall
2022-12-19 11:00

We and our store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning.

Iranian state-aligned threat actor targets new victims in cyberespionage and kinetic campaigns
2022-12-14 17:13

The threat actor targets high-profile and high-security accounts for cyberespionage purposes. Their favorite method to approach and attack their targets consists of using web beacons in emails before eventually attempting to harvest the target's credentials.

NSA shares tips on mitigating 5G network slicing threats
2022-12-14 16:02

The National Security Agency, the Cybersecurity and Infrastructure Security Agency, and the Office of the Director of National Intelligence, have published a joint report that highlights the most likely risks and potential threats in 5G network slicing implementations. The 5G network slicing report builds upon Potential Threat Vectors to 5G Infrastructure, a paper published last year by the Enduring Security Framework cross-sector working group focused on addressing risks and threats to the security and stability of U.S. national security systems.

3 major threat detection methods explained
2022-12-14 05:30

As attacks continue to evolve in methods and sophistication, security teams need to prioritize threat detection so they can identify suspicious activity before a breach can occur. Major blind spots exist unless threat detection visibility extends to the network and cloud as well.

Using threat modeling to get your priorities right
2022-12-12 17:01

Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the "Your Consent Options" link on the site's footer.

Top 4 SaaS Security Threats for 2023
2022-12-12 15:24

Security teams should onboard a SaaS Security Posture Management solution, like Adaptive Shield, that provides full visibility and control across a critical mass of SaaS apps in the SaaS stack. Security teams should be able to use the solution to gain context into security alerts and gain answers to questions like: Which users are subject to a certain misconfiguration? Are they admins? Is their MFA enabled? By having these answers at their fingertips, security teams can enforce company and industry policies to remediate potential risks from any misconfiguration.

Royal Ransomware Threat Takes Aim at U.S. Healthcare System
2022-12-12 07:57

The U.S. Department of Health and Human Services has cautioned of ongoing Royal ransomware attacks targeting healthcare entities in the country. "While most of the known ransomware operators have performed Ransomware-as-a-Service, Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal," the agency's Health Sector Cybersecurity Coordination Center said [PDF].

Healthcare systems face a “royal” cybersecurity threat from new hacker group
2022-12-09 21:18

U.S. healthcare organizations could be in the crosshairs of a new cyberthreat collective dubbed Royal. The warning from HHS's Health Sector Cybersecurity Coordination Center identified the relatively new group as perps behind several attacks first appearing in September 2022 against Healthcare and Public Healthcare targets.

McAfee 2023 Threat Predictions
2022-12-09 15:40

One scam for example used an old video of Elon Musk talking with other specialists about cryptocurrencies as a lure to have users click a fake website promising to double the users' crypto money. Figure A. Another scam sent to legitimate Trezor users asked users to install a fake application and disclose their crypto wallet seed, allowing fraudsters to steal their cryptocurrencies.