dcsimg

Emotet on the rise with heavy spam campaign

The threat landscape is changing once again, now that the ocean of cryptocurrency miners has shrunk to a small lake. Over the last couple months, we’ve seen cybercriminals lean back on tried and true methods of financial theft and extortion, with the rise of a familiar Banking Trojan: Emotet. However, over the last few days, we’ve noticed a large increase in malicious spam spreading … [Read more...]

What to Consider As You Move to the Cloud: DMaaS

The shift to the cloud and “as-a-service” applications means that data now lives in more areas than ever before. What is the approach to solve this issue? Cloud data management. As companies move to the cloud for their apps, whether these are on Platform-as-a-Service or Infrastructure-as-a-Service offerings, or run as Software-as-a-Service apps, the cloud becomes the natural home for Data … [Read more...]

Measuring The Benefits of Managed File Transfer for Insurance Companies

Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation. … [Read more...]

Simple Authentication and Security Layer (SASL) vulnerabilities

Simple Authentication and Security Layer (SASL) is an authentication layer used in Internet protocols. SASL is not a protocol, but rather a framework that provides developers of applications and shared libraries with mechanisms for authentication, data integrity–checking, and encryption. Within the framework and a few of its plugins, there are a couple of known vulnerabilities that we want to make … [Read more...]

VIDEO: How to Discover Azure Virtual Machines in WhatsUp Gold 2018

A new feature in Ipswitch's WhatsUp Gold network monitoring product is the ability to monitor Azure Virtual Machines. In this video from Ipswitch contributor Adam Betram, we'll cover how to add an Azure credential to WhatsUp Gold and how to set up an initial discovery to discover all Azure Virtual Machines in a subscription. … [Read more...]

Upcoming ISO 27001 and GDPR webinars. Register today!

ISO 27001   Assessing compliance: the ISO 27001 ISMS internal audit  28 September 2018, 2:00–3:15 pm (GMT)  Testing and assessing your information security measures is essential to ascertain whether the controls you have implemented are working effectively. Compliance with the international information security standard ISO 27001 requires continual monitoring and regular reviews of your ISMS … [Read more...]

Why Privileged Accounts Are A Gateway to Cyber Attacks

Thanks to more widespread reporting in mainstream media outlets, it is no longer rare to hear about data breaches causing serious damage to your organization. We are also finding that it is becoming more common to hear about cyber-attacks perpetrated by people from within the organization than from outside hackers. This is because your users, and in particular your most privileged users, are the … [Read more...]

Nessus at 20: Why It’s More Than a Product to Me

In honor of the 20th anniversary of Nessus this year, we've been asking users around the world to answer the question, "I love Nessus because...." Here, Tenable's VP and Deputy CTO Glen Pendley does just that, sharing his experiences working with Nessus over the past two decades – and tells us how it delivered his first rock-star moment. Read more here Download your Nessus, trial version … [Read more...]

4 Ways Busy People Sabotage Themselves

You’ve left an important task undone for weeks. It’s hanging over you, causing daily anxiety. And yet instead of actually doing it, you do a hundred other tasks instead. Or you’ve been feeling guilty about not replying to an email, even though replying would only take 10 minutes. Read more here Source hbr.org … [Read more...]

Mass WordPress compromises redirect to tech support scams

Content Management Systems (CMSes) such as WordPress, Drupal, or Joomla are under a constant barrage of fire. Earlier this year, we detailed several waves of attacks against Drupal, also known as Drupalgeddon, pushing browser-based miners and various social engineering threats. During the past few days, our crawlers have been catching a larger-than-usual number of WordPress sites being hijacked. … [Read more...]