Author: DEFENDEDGE
-
Cyberattacks on Healthcare Spike 45% Since November
The relentless rise in COVID-19 cases is battering already frayed healthcare systems — and ransomware criminals are using the opportunity to strike. Read more
-
NSA Releases Guidance on Eliminating Obsolete TLS Protocol Configurations
Original release date: January 5, 2021 The National Security Agency (NSA) has released a Cybersecurity Information (CSI) sheet on eliminating obsolete Transport Layer Security (TLS) configurations. The information sheet identifies strategies to detect obsolete cipher suites and key exchange mechanisms, discusses recommended TLS configurations, and provides remediation recommendations for organizations using obsolete TLS configurations. CISA… Read more
-
Google Warns of Critical Android Remote Code Execution Bug
Google’s Android security update addressed 43 bugs overall affecting Android handsets, including Samsung phones. Read more
-
Vulnerability Summary for the Week of December 28, 2020
Original release date: January 4, 2021 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. High Vulnerabilities Primary Vendor —… Read more
-
2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud
Insider threats are redefined in 2021, the work-from-home trend will continue define the threat landscape and mobile endpoints become the attack vector of choice, according 2021 forecasts. Read more
-
Inbox Attacks: The Miserable Year (2020) That Was
Reflecting on 2020’s record-breaking year of spam and inbox threats. Read more
-
What’s Next for Ransomware in 2021?
Ransomware response demands a whole-of-business plan before the next attack, according to our roundtable of experts. Read more
-
FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’
Stolen email credentials are being used to hijack home surveillance devices, such as Ring, to call police with a fake emergency, then watch the chaos unfold. Read more
-
6 Questions Attackers Ask Before Choosing an Asset to Exploit
David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding “hacker logic” can help prioritize defenses. Read more
-
Taking a Neighborhood Watch Approach to Retail Cybersecurity
Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers. Read more