Category: Security

  • CISA Launching Zero Trust Initiative Office Previewed in March 2023

    The Cybersecurity and Infrastructure Security Agency (CISA) is taking a strategic step forward by integrating its various zero trust security initiatives under one roof, according to Sean Connelly, CISA’s senior cybersecurity architect and trusted internet connections program manager, last Thursday at CyberScoop’s Zero Trust Summit. Connelly has been instrumental in shaping the agency’s zero trust…

  • LockBit Ransomware Network Compromised by NCA in International Cyber Operation

    The UK’s National Crime Agency (NCA) successfully thwarted LockBit, a notorious global cybercrime syndicate known for ransomware attacks. The operation, named Cronos, involved seizing control of LockBit’s network and was a collaborative effort with international law enforcement. This highlights the evolving capabilities of law enforcement against cyber threats and emphasizes the commitment to supporting recovery…

  • Understanding Data Disposal: A Key to Data Privacy

    Data disposal, a critical component of information lifecycle management, involves the processes and methods used to permanently remove or delete data from digital storage devices. This practice is essential in managing data securely, ensuring that once data is no longer required, it cannot be recovered or misused. Data disposal works by overwriting the original data…

  • Choosing the Right CompTIA Security+ Certification: What’s new in SY0-701?

    As you embark on the path to bolstering your cybersecurity skills through obtaining certifications, choosing between the CompTIA Security+ SY0-601 and SY0-701 exams can be a pivotal decision in your professional development. Both exams serve as a gateway to demonstrating your cybersecurity expertise but differ in their focus and the recency of the content they…

  • FortiSIEM’s Critical OS Command Injection Vulnerabilities: CVE-2024-23108 and CVE-2024-23109

    Fortinet has recently issued a warning about two critical-severity vulnerabilities within its FortiSIEM platform. These vulnerabilities, identified as CVE-2024-23108 and CVE-2024-23109, both received the highest level of concern with a provisional Common Vulnerability Scoring System (CVSS) score of 10. These vulnerabilities have a high potential to be exploited without any form of authentication, a prospect…

  • Clorox’s August 2023 Cyberattack: A $49 Million Update

    In a recent SEC filing, Clorox, the American manufacturing giant known for its consumer and professional cleaning products, has disclosed the financial aftermath of a cyberattack that struck the company in August 2023. This cyber incident, which commenced on August 11, led to the company identifying unauthorized activities within its systems, prompting immediate action to…

  • Analyzing the DirtyMoe and STEADY#URSA Attack on Ukrainian Infrastructure

    Ukraine has found itself at the center of a sophisticated cyber-attack campaign, where over 2,000 computers have been compromised by the malware strain known as DirtyMoe. This malicious software, active since 2016, is notorious for its capabilities in executing cryptojacking and distributed denial-of-service (DDoS) attacks. The Computer Emergency Response Team of Ukraine (CERT-UA) attributes these…

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Netflix and informing you that action needs to be taken regarding your payment method on your account. The message politely explains that our account…

  • Netizen: January 2024 Vulnerability Review

    Netizen’s Security Operations Center (SOC) has identified and detailed five critical vulnerabilities from January that should be promptly patched. These include issues in NetScaler ADC, NetScaler Gateway, Google Chrome, vCenter Server, and Apache ActiveMQ. Netizen offers advanced security solutions and services, including compliance support, vulnerability assessments, and an automated assessment tool.

  • AI-Powered SIEM: The Future of Threat Detection and Monitoring

    In an era where data volumes are skyrocketing and cyber threats are becoming more sophisticated, the integration of AI into SIEM tools is not just an enhancement; it’s a strategic imperative. This evolution from traditional to AI-enhanced SIEM systems represents a significant leap in cybersecurity, transforming these tools into more efficient, accurate, and proactive components…