Category: Security

  • Netizen Threat Brief: 7 March 2018 Edition

    Threats Listed below is information regarding three of this week’s most critical threats and preventative measures to lessen the chances of a breach: Adobe Acrobat Reader DC Remote Code Execution Misconfigured Memcached Servers WordPress ionCube Malware 1. Adobe Acrobat Reader DC Remote Code Execution Overview A remote code execution vulnerability has been discovered in Adobe…

  • Netizen Threat Brief: 28 February 2018 Edition

    Threats Listed below is information regarding two of this week’s most critical threats, and preventative measures to lessen the chances of a breach. Also contained in this brief, is an update to a previous vulnerability: Spike in W-2 Phishing Campaigns Single Sign-On Vulnerability Intel Spectre Firmware Fixes 1. Spike in W-2 Phishing Campaigns Overview The…

  • Netizen Case Study: 2018 Allentown City Government Breach

    Overview: Allentown’s city government has been breached and invaded by a serious computer virus known as Emotet, or possibly a new variant of the Emotet malware that adds functionality to make it more dangerous and less easy to detect and remove. Variants of this malware have been a known threat globally since at least 2014,…

  • Threats Listed below is information regarding three of this week’s most critical threats, and preventative measures to lessen the chances of a breach: Severe Skype Vulnerability Domain Hijacking Windows 10 Null Character Flaw 1. Severe Skype Vulnerability Overview A serious vulnerability has been discovered in one of the most popular free web messaging and voice…

  • AI a threat to cyber security, warns report

    Artificial intelligence is being incorporated into a range of cyber security products, but the technology may also introduce new threats, a report warns Artificial intelligence (AI) poses a range of threats to cyber, physical and political security, according to a report by 26 UK and US experts and researchers. The Malicious use of artificial intelligence report examines the…

  • Who should be responsible for cybersecurity?

    Clearly, cybersecurity is everybody’s problem. It’s high time this truth was recognized, starting with the executive suite on down.   The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined…

  • Conferences, Certifications or College: Which Is the Best Path toward a Cybersecurity Career?

    Cybersecurity and cyber defense experience are buzzwords that enhance a resume. They are also jobs that are needed now and far into the future. In January 2017, cybersecurity expert and CSO Steve Morgan wrote about the need for more cybersecurity talent. On the the CSO website, which serves enterprise security decision-makers, Morgan stated that “there…

  • Former U.S. Security Expert: 5 Ways the Insurance Industry Can Improve Cybersecurity

    The insurance industry has a great record of solving problems where government regulation didn’t because the government either didn’t know how to regulate, or the government wouldn’t regulate,” Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-Terrorism for the United States, told attendees at a recent cybersecurity insurance forum in Santa Clara,…

  • Regulation Can’t Solve Cybersecurity Problems, Fed Official Says

    More rules may not be the best answer to protecting the financial system against cyber attacks, a Federal Reserve official said. “I don’t think the solution to the cybersecurity problem rests in regulation,” Arthur Lindo, senior associate director of the Fed’s division of supervision and regulation, said Monday at a banking conference in New York.…

  • The interdependency of people, policy and products amid a cybersecurity talent shortage

    As the shortage of skilled security staff widens, the effects on policy and products in overall security organization must be factored into the choice to pursue alternative sources of talent. Several CISOs I’ve spoken recently have lamented, while cybersecurity assurance stands on three legs – people, policy and products – the industry is weighted down…