Vulns & Alerts

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Shock Treatment

September 25, 2014 Added by:Wendy Nather

As many are explaining, one of the biggest problems with this #shellshock vulnerability is that it's in part of the Unix and Linux operating systems -- which means it's everywhere, particularly in things that were built decades ago and in things that were never meant to be updated.

Comments  (0)

Default-avatar

Parallels Among the Three Most Notorious POS Malware Attacking U.S. Retailers

September 22, 2014 Added by:Cyphort

After the first major success of POS malware breaching Target Corporation in November 2013 occurred, the number of POS device infections in the wild skyrocketed.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

2014 ICS Cyber Security Conference: Register Today to Hold Your Spot

September 17, 2014 Added by:InfosecIsland News

Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Attendees can register online and pay just $1895 for a full conference registration which includes 4 days AND workshops on Monday.

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

The Next ‘Black Swan’ Event: A Cyberattack?

September 03, 2014 Added by:Patrick Oliver Graf

Sprinkled throughout the course of history are flashpoints that were as unexpected as they were far-reaching.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Improving Microsoft Patching

September 02, 2014 Added by:Tripwire Inc

We frequently work with customers who use patch management solutions and are missing patches. The reason? I don’t think anyone fully understands the Microsoft Patching process and the third-parties don’t always get it right either.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vulnerability Management: Just Turn It Off! PART III

August 20, 2014 Added by:Tripwire Inc

In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Hackers Exploited Heartbleed Bug to Steal Patient Data from Community Health Systems

August 19, 2014 Added by:Mike Lennon

TrustedSec, citing sources familiar with the incident, said on Tuesday that the initial attack vector was through the infamous “Heartbleed” vulnerability in OpenSSL which provided the attackers a way in, eventually resulting in the compromise of patient data.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Passwords Protection Steps to Take According to Symantec

August 07, 2014 Added by:InfosecIsland News

Symantec tips help consumers safeguard information in light of claims that a Russian cybercrime group is behind the largest known collection of stolen Internet credentials.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Connecting Bellwether Metrics to the Business

July 28, 2014 Added by:Tripwire Inc

Benchmark facilitates organizations who want to define and track their own Bellwether metrics—comparing only with their own internal goals and trends.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Israeli Military and Hamas trade Hacking Attacks

July 24, 2014 Added by:Dan Dieterle

As Israeli ground forces push into Gaza to remove militant Islamic troops and missiles, hacking teams from both sides ply their trades.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

The Five Stages of Vulnerability Management

July 21, 2014 Added by:Tripwire Inc

The key to having a good information security program within your organization is having a good vulnerability management program.

Comments  (0)

93c815429fc1ab15a9295a4f55989ae0

Cached Domain Credentials in Vista/7 (AKA Why Full Drive Encryption is Important)

July 17, 2014 Added by:Neohapsis

Without full disk encryption (like BitLocker), sensitive system files will always be available to an attacker, and credentials can be compromised.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Why Should We Close the Threat Detection Gap?

July 09, 2014 Added by:Tripwire Inc

By closing off the threat detection gap, we can decrease the value to the criminal of the effort to commit the crime, making it a less worthwhile undertaking in the first place.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Government Network Security Failures Led to Remote Access Breaches

July 07, 2014 Added by:Patrick Oliver Graf

Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »