IGEL Thin Client | Is it the future workstation and why?

What is an IGEL Thin Client? IGEL thin client is a small-sized and usually fanless desktop terminal without a hard drive. All the features found on a desktop PC, like storage, computing power, applications, and more, are utilized in the data center when using a thin client. How Thin Clients Work A thin client, also known as a “dummy terminal,” utilizes hard drives stored on servers or data centers … [Read more...]

CVE-2019-1579: Critical Pre-Authentication Vulnerability in Palo Alto Networks GlobalProtect SSL VPN Disclosed

Researchers disclose a critical vulnerability in Palo Alto GlobalProtect SSL VPN solution used by many organizations. Background On July 17, researchers Orange Tsai and Meh Chang published a blog about their discovery of a pre-authentication remote code execution (RCE) vulnerability in the Palo Alto Networks (PAN) GlobalProtect Secure Socket Layer (SSL) virtual private network (VPN) used by many … [Read more...]

Facebook Too Big For Compliance: Are Record Fines Ineffective?

Do the latest fines against Facebook matter or is Facebook going to continue with business as usual? … [Read more...]

New Facebook ad reporting tool launches in UK

Last year, well-known consumer advice expert Martin Lewis decided to take Facebook to court for defamation. The cause? Multiple bogus adverts placed on the social network featuring his likeness, appearing via the ad network Outbrain. As a trusted face in consumer causes, scammers bolting Lewis’ face onto rogue ads would always be a money spinner. This would, of course, have the knock-on … [Read more...]

Five must-read books on cyber security

Books are a great way of increasing your cyber security knowledge, but with thousands to choose from, it’s difficult to know where to begin.  To help you get the best information available and enable you to advance your cyber security career, we’ve chosen some of our best titles for you. Security in the Digital World Technology is always developing, and so are the threats and risks of being … [Read more...]

Enforcing HIPAA Might Just Be Getting Easier

A new bill recently passed by a Senate Committee incentivizes healthcare entities to adopt cybersecurity policies, and therefore making it easier for authorities to enforce the Health Insurance Portability and Accountability Act (HIPAA). The piece of legislation has been introduced to help lower the cost of healthcare, but it touches upon healthcare in that it asks providers to focus on … [Read more...]

Podcast: Have You Met? QBITS

In this Have You Met? podcast, we sat down with Daniel Hotz of QBITS, a Progress partner based in Switzerland, to see how they are implementing MOVEit managed file transfer in the various regions they server clients. … [Read more...]

Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void

Sodinokibi, also known as Sodin and REvil, is hardly six months old, yet it has quickly become a topic of discussion among cybersecurity professionals because of its apparent connection with the infamous-but-now-defunct GandCrab ransomware. On May 31, the threat actors behind GandCrab formally announced their retirement, detailing their plan to cease selling and advertising GandCrab in a dark … [Read more...]

No man’s land: How a Magecart group is running a web skimming operation from a war zone

Our Threat Intelligence team has been monitoring the activities of a number of threat actors involved in the theft of credit card data. Often referred to under the Magecart moniker, these groups use simple pieces of JavaScript code (skimmers) typically injected into compromised e-commerce websites to steal data typed by unaware shoppers as they make their purchase. During the course of an … [Read more...]

Vulnerability Management Fundamentals: What You Need to Know

In part one of our five-part series on Vulnerability Management fundamentals, we explore the four stages of the Cyber Exposure lifecycle.  Truth is ever to be found in simplicity, and not in the multiplicity and confusion of things. —Sir Isaac Newton At Tenable, we are pioneering the discipline of Cyber Exposure to help cybersecurity teams measure and manage their cyber risk. Cyber Exposure is … [Read more...]