Category Archives: Threat Intelligence

Netizen Cybersecurity Bulletin (29 MAY 2019)

Overview Phish Tale of the Week First American Financial Corp. Leaks 800+ Million Records Google Begins Tracking “zero-day” Exploits How Can Netizen Help? Phish Tale of the Week One way a malicious actor can try to collect a business’ sensitive information is by targeting the business’ employees. Attempting to phish an employee requires some research […]
Read More »

FDA plans to improve medical device cybersecurity

The US Food and Drug Administration (FDA) plans to tackle security issues related to medical devices and has released a plan of action it means to implement in the near future. Read More………….

AI a threat to cyber security, warns report

Artificial intelligence is being incorporated into a range of cyber security products, but the technology may also introduce new threats, a report warns Artificial intelligence (AI) poses a range of threats to cyber, physical and political security, according to a report by 26 UK and US experts and researchers. The Malicious use of artificial intelligence report examines the […]
Read More »

Cybersecurity ROI: Still a tough sell

Panelists at the MIT Sloan CIO Symposium agree that selling top management on the value of “something that doesn’t happen” is tricky. How do you convince a company board of directors that there is a return on investment (ROI) for something that doesn’t happen? Read here…

Cyber Security: The World’s Best And Worst Presented With A Well-Designed Infographic

Countries with the best (blue) and worst (red) malware infection rates. It’s no secret that online security is a global problem. Businesses and government agencies are hacked, corporations, hospitals and individuals are held up with ransomware, credit card numbers and passwords are routinely stolen. Cybercrime is ubiquitous and unrelenting. How bad is it? Which countries […]
Read More »

How To Find Cybersecurity Vulnerabilities Across Your Environment

When I was a CTO running a data center, I used to ask my ops team to do the shotgun test. They had to imagine our worst enemy came into the data center with a shotgun with one slug. What could they destroy to do the most damage? (I didn’t realize until recently that this […]
Read More »

Private sector’s national cybersecurity strategy contributions lacking

The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity […]
Read More »

Exploring The Gap Between Cybersecurity Perception And Reality

Most company executives and security professionals have a reasonable understanding of cybersecurity. Even if they don’t fully understand the mechanics under the hood, they at least realize that there is a vast and aggressive threat landscape out there, and that their networks are under virtually constant siege from attackers. When you ask how they feel […]
Read More »

Netizen Cyber Threat Intelligence – July 8th, 2015

Welcome to the Netizen IT Threat Intelligence Newsletter.  A complimentary service of Netizen Corporation, intended to help protect your business from the ever growing and ever changing threat of cyber attacks.  ZERO DAY VULNERABILITY ALERT  Microsoft Office – OLE Packager Allows Code Execution In All Office Versions, With Macros Disabled And High Security Templates Applied […]
Read More »

Netizen Cyber Threat Intelligence – June 24, 2015

Welcome to the Netizen IT Threat Intelligence Newsletter.  A complimentary service of Netizen Corporation, intended to help protect your business from the ever growing and ever changing threat of cyber attacks.  ZERO DAY VULNERABILITY ALERT  HP Drops The Hammer On Unpatched Internet Explorer 11’s Zero Day Vulnerability ” Last year HP’s highly regarded Zero Day Initiative group found […]
Read More »