Blog
HardBit ransomware tells corporate victims to share their cyber insurance details
By Graham Cluley on Wed, 02/22/2023
A ransomware outfit is advising its victims to secretly tell them how much insurance they have, so their extortion demands will be met.
As security researchers at Varonis describe, a new strain of the HardBit ransomware has taken the unusual step of asking targeted companies to spill the beans of whether they have cyber insurance (and the terms of...
Blog
Public or Private Cloud: Choices to Consider
By Tripwire Guest Authors on Wed, 02/22/2023
Organizations are progressively moving towards a predominantly cloud-based computing environment. What this means is that essentially all of their back-end infrastructure, systems, and client-facing applications can be accessed and distributed through the cloud.
Modern cloud computing goes a step further than simply being present in a virtual...
Blog
What Is Kubernetes Observability and Why It's Critical for Securing Your Clusters
By Tripwire Guest Authors on Wed, 02/22/2023
What Is Kubernetes Observability?
Kubernetes observability refers to the ability to monitor and diagnose the performance and behavior of a Kubernetes cluster and its applications. This includes monitoring resource usage, tracking the status of pods and deployments, and identifying and troubleshooting errors.
Observability tools for Kubernetes...
Blog
Phishing attacks: The phisherman, the phish, the bait and the hook
By Tripwire Guest Authors on Tue, 02/21/2023
There’s a good chance that you have heard the word phishing or probably even been a victim in the past, however you do not understand what it really means and how to protect yourself from being a victim.
According to CNBC, there were 225 million phishing attacks in 2022 which depicts a 61% increase from the number of reported cases in 2021. Sadly,...
Blog
Cybersecurity Threats in Europe: What You Need to Know and What to Do About Them
By Anastasios Arampatzis on Tue, 02/21/2023
As governments and organizations standardize and harmonize their responses to better mitigate the increasing number of cyber-attacks, so do cybercriminals. In Europe, security decision-makers and businesses face similar attack techniques as their global counterparts. While the methodologies employed are identical because they all rely on the same...
Blog
How do mail filters work?
By Tripwire Guest Authors on Mon, 02/20/2023
Mail filters play a huge role in protecting organizations from cyberattacks. Even though their task is quite small, they are very important for an organization’s ability to deter many malicious phishing and spam emails before delivery to a person’s inbox. According to the IBM X-Force Threat Intelligence Index, 40% of attacks in the manufacturing...
Blog
Why Application Dependencies Are Critical for Cloud Security
By Tripwire Guest Authors on Mon, 02/20/2023
Application dependencies occur when technology components, applications, and servers depend on each other to provide a business solution or service. Developers have a specific technology stack in mind when building solutions. This can typically include operating systems, database engines, and development frameworks (such as .Net or Java), as well as...
Blog
Cybercriminal convicted of $90 million SEC earning reports hack
By Graham Cluley on Thu, 02/16/2023
The owner of a Russian penetration-testing company has been found guilty of being part of an elaborate scheme that netted $90 million after stealing SEC earning reports.
For nearly three years, 42-year-old Vladislav Klyushin - the owner of Moscow-based cybersecurity firm M-13 - and his co-conspirators had hacked into two US-based filing agents used...
Blog
Four of the Oldest Tricks in Scammers’ Books
By Tripwire Guest Authors on Thu, 02/16/2023
As the world grows increasingly digital and dependent on the internet, cyberthreats are constantly evolving to clash with newer and more rigid security features. Despite cybercriminals’ propensity for finding new and innovative ways to take advantage of their targets, however, there are also tactics that have been in use since the early days of the...
Blog
The Language of Cybersecurity Frameworks, Guidance, Regulations, and Standards
By Bob Covello on Wed, 02/15/2023
When it comes to acronyms, Technology and Cybersecurity often rival various branches of government. Technology acronyms are usually somewhat bland, amounting to little more than the arcane argot of the profession, such as SOC, SIEM, and DNS. Government, however, rarely disappoints in its inventiveness, whether it is the acronym of the Puppies...
Blog
How to achieve and maintain data compliance in 2023
By Tripwire Guest Authors on Wed, 02/15/2023
The Compliance Landscape
Only those hiding from the news, prospects, and customers can miss the data security and privacy challenges that are occurring. More businesses are relying on data analytics (garnered from data collection) for more and improved service and product offerings. More individuals want data privacy and security. More nations...
Blog
VERT Threat Alert: February 2023 Patch Tuesday Analysis
By Tyler Reguly on Tue, 02/14/2023
Today’s VERT Alert addresses Microsoft’s February 2023 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1042 on Wednesday, February 15th.
In-The-Wild & Disclosed CVEs
CVE-2023-21823
The first vulnerability in the list this week is CVE-2023-21823, a vulnerability in Windows Graphic Component...
Blog
How to protect organizations against Brute Force Attacks
By Tripwire Guest Authors on Mon, 02/13/2023
A brute force attack is an attempt to reveal passwords and login credentials in order to gain access to network resources. These attacks are mainly done with the purpose of gaining unauthorized, and undetected access to compromise systems. Threat actors usually prefer this attack method since it is simple to carry out, and can cause significant...
Blog
Cybersecurity Is Necessary for Mission-Critical Energy Grids
By Tripwire Guest Authors on Mon, 02/13/2023
Today’s energy sector is undergoing massive change, especially as more utilities try to usher in clean or renewable energy alternatives like solar, geothermal, hydroelectric, and wind power. In addition to the clean energy transition, grid modernization is another major shift in the energy industry.
The Industrial Internet of Things (IIoT) is...
Blog
The Role of Data Hygiene in the Security of the Energy Industry
By Tripwire Guest Authors on Wed, 02/08/2023
We create massive amounts of data daily, from the exercise stats compiled by our wearable devices to smart meters used at our homes to reduce expense consumption to maintenance statistics of critical systems in industrial settings. If data creation continues at its present rate, more than a yottabyte (a million trillion megabytes) will likely be...
Blog
Tripwire Patch Priority Index for January 2023
By Lane Thames on Tue, 02/07/2023
Tripwire's January 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe.
First on the patch priority list this month are patches for Microsoft Visio and Microsoft Office that resolve 6 vulnerabilities, including remote code execution and information disclosure vulnerabilities.
Next are patches for Adobe...
Blog
Safer Internet Day 2023: Protecting Your Personal Data
By Anthony Israel-Davis on Tue, 02/07/2023
February 7th is the 20th Safer Internet Day, a day to focus on addressing ways to reduce the risks created by our now very online world. Painting the internet as an inherently dangerous place full of predators and … would be using too broad a brush. The internet is an amazing technology - an information sharing resource unrivaled in depth, breadth,...
Blog
Social Networking Without Selling Yourself
By Rita Nygren on Tue, 02/07/2023
A truism about the free tools online is that if you aren’t paying for the service, then you are the product. Take your grocery store's “club” card program. You sign up and give them your name and phone number, and every time you shop, you swipe your card and get discounts on certain items. If you shop at the same store all the time, it makes...
Blog
VERT Reads All About It - Cybersecurity News February 6 2023
By Andrew Swoboda on Mon, 02/06/2023
The Tripwire Vulnerability Exposure and Research Team (VERT) keeps its finger on the cybersecurity pulse. Check out some of the stories that stood out for us recently:
Compromised Linux Endpoints can be isolated with Microsoft Defender
Microsoft Defender for Endpoint can now isolate compromised Linux environments. This can potentially mitigate the...