Category: Viral

Cisco’s Talos research team says it’s monitoring a ‘global increase in brute-force attacks’ against targets including VPN services, while an exploit has been released for a critical vulnerability in Palo Alto Networks’ PAN-OS firewall software. Hackers continue to escalate their targeting of network security devices and remote access services as a means of breaching customer…

Read More

Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and…

Read More

Ransomware has evolved into an ecosystem with multiple players and an expanded threat model. Ransomware groups now deploy a double extortion technique, where they both encrypt and exfiltrate their victims’ data. The Tenable Security Research Team has released a report that enumerates common vulnerabilities exploited by ransomware affiliates and groups. The Ransomware Ecosystem dashboard enables…

Read More

As part of IoT Week, CRN rounds up five satellite IoT connectivity solutions that can help organizations keep devices connected in remote areas where there is little to no cellular coverage. When IoT devices are deployed in areas where there is little to no coverage for cellular networks and other ground-based communications infrastructure, satellite connectivity…

Read More

‘The combined power of the BMC Helix platform and Netreo solutions provides IT Operations, DevOps practitioners, developers, and network teams with comprehensive insights spanning applications, infrastructure, and networks, helping them increase the overall reliability and performance,’ wrote Margaret Lee, BMC’s senior vice president and general manager of digital service and operations management, in a blog…

Read More

Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover…

Read More

Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable dashboards enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA). The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance…

Read More

As part of IoT Week, CRN has rounded up industrial IoT solutions from five significant vendors in the space—Hitachi Vantara, Johnson Controls, Litmus, PTC and Siemens—that are solving big problems for manufacturers, utilities and building operators. Businesses across the world are expected to ramp up investments in IoT projects this year, and a great deal…

Read More

The deal is the second acquisition to date for cybersecurity unicorn Armis. Armis announced its acquisition Wednesday of a startup focused on helping organizations prioritize their response efforts to cybersecurity risk. The acquisition of the startup, Silk Security, is the second to date for cybersecurity unicorn Armis. The company said the deal is worth $150…

Read More

2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats.…

Read More