Resources

Blog

Best Strategies for Avoiding Cloud Data Leaks

In recent years, there has been a huge movement from storing data the traditional way, as the cloud has grown and become the better answer and option for companies and organizations alike. However, this has also led to a growth in cyber criminals and data breaches now that someone can access sensitive documents from their living room couch. As such,...
Blog

Cybercrime Laws: What Internet Fraud Victims Need to Know

As the Internet continues to be an important part of our lives, it also becomes a more dangerous avenue for cybercrime. The risk increases as the massive online community’s use of the Internet becomes more rampant. And despite the public being aware of cybersecurity issues, anonymous online criminals are able find more victims and creative ways to...
Blog

Eight Arrests Made in Connection with $3.5M Credit Card Skimming Scheme

Federal and local authorities have arrested eight individuals in connection with a credit card skimming scheme that caused losses in excess of $3.5 million. On 17 November, representatives of the United States Attorney Western District of Kentucky's office, Kentucky FBI division, Secret Service, and the Louisville Metro Police Department announced...
Blog

Criminals Demanded $8K from Sacramento Regional Transit after Attack

Criminals demanded a ransom of approximately $8,000 after they attacked the Sacramento Regional Transit's (SacRT) computer system. The attack occurred on 18 November, reports The Sacramento Bee, when unknown attackers defaced the public transportation agency's main website with the following message: I’m sorry to modify the home page, i’m good...
Blog

Why 'Yes Persons' Make Change Control a Necessity for Your Company

Recently, my nine-year-old son informed me that he had observed over time how I always seem to help other people and how others always depend on me. I said to him that, in a way, he is much the same, as he is always saying 'yes' to doing little jobs. Together, we defined ourselves as being 'yes persons.' However, as our conversation evolved, I said...
Blog

Securing the Entire Container Stack, Lifecycle and Pipeline – Part 1

With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift while security admins are left struggling to figure out how to secure this new class of assets and the environments they reside in. While containers do increase the complexity of the ecosystem that security admins are responsible for securing...
Blog

Australian Broadcasting Corporation Leaked Data through AWS S3 Bucket

The Australian Broadcasting Corporation (ABC) leaked sensitive data online through a publicly accessibly Amazon Web Services (AWS) S3 bucket. Public search engine Censys indexed the misconfigured asset on 14 November during a regular security audit of the S3 environment. Researchers at the Kromtech security center don't know who might have accessed...
Blog

Women in Information Security: Beth Cornils

Last time, I had fun talking with Victoria Walberg. She really understands cloud and IoT cybersecurity. This time, I got to speak to Beth Cornils. She has a pretty cool job that involves making IoT cars safe! Kim Crawley: Hi, Beth! Tell me about what you do. Beth Cornils: I am a product manager for an autonomous vehicle company. Prior to that, I was...
Blog

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate this risk by implementing foundational security controls. For example, enterprises can monitor their important files for change using file integrity...
Blog

Scammers Steal S$80K from Woman Using Fake Police Website

Scammers stole S$80,000 from a woman by tricking her into visiting a fake phishing website for the Singapore Police Force (SPF). On 13 November, local law enforcement received a report from the woman that someone had stolen several thousand Singapore dollars from her bank account. She told investigators that the trouble started sometime earlier when...
Blog

A Boeing 757 was hacked remotely while it sat on the runway

If you thought it was scary when security researchers remotely hijacked a Jeep as it was driven down the freeway, consider this - now airplanes are getting hacked. The US Department of Homeland Security has revealed that a Boeing 757 airliner was successfully hacked as it sat on the runway at the airport in Atlantic City, New Jersey on September 19,...
Blog

Microsoft Fixes 17-Year-Old Arbitrary Code Execution Bug in Office Suite

Microsoft has patched a 17-year-old bug hidden in its Office suite that attackers can use to execute arbitrary code on vulnerable machines. The vulnerability resides in Microsoft Equation Editor (EQNEDT32.EXE). It's a component that allows users to insert and edit equations into Microsoft Word documents as an Object Linking and Embedding (OLE) item....
Blog

Phishing Testing: Building Your Human Firewall

Phishing is becoming a major threat vector for organizations all around the world. Phishing is the exercise of sending illegitimate emails designed to elicit a response from the end user, whether that’s clicking on a link that infects them with malware or tricking the user into volunteering information that they normally would not provide like a...
Blog

Blockchain 101: How This Emerging Technology Works

Unless you’ve been living in Slab City or off the grid for a while, you’ve probably heard this year’s omnipresent buzzword ‘blockchain.’ But perhaps you're a bit clueless as to what this newer technology entails. In a recent HSBC survey of 12,000 respondents in 11 countries, 80 percent of people could not explain how blockchain works. Don’t worry,...
Blog

VERT Threat Alert: November 2017 Patch Tuesday Analysis

Today’s VERT Alert addresses the Microsoft November 2017 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-752 on Wednesday, November 15th. In-The-Wild & Disclosed CVEs CVE-2017-8700 A Cross Origin Resource Sharing bypass could allow information disclosure in ASP.NET Core. Microsoft has...
Blog

Cryptocurrency Miner among October's 10 Most Wanted Malware

A cryptocurrency miner has earned its place on a list of the top 10 most wanted malware for the month of October 2017. The browser-mining service in question goes by the name "CoinHive." It's a piece of JavaScript that site owners can embed into their websites. Whenever a user visits their domain thereafter, CoinHive will activate and begin mining...