Resources

Blog

Compliance: Thoughts of a Newbie

When I started at Tripwire just over five months ago, I never really thought about compliance and why it’s critical. To me, it was something that companies went through and dare I say it, it seemed a bit boring. But the more time I spend at Tripwire, the more I understand why business compliance requirements are so important and how they help us as...
Blog

Brooks Brothers Alerts Customers of Year-Long Payment Card Breach

Brooks Brothers announced on Friday that it recently learned of a potential credit card breach, affecting customers who shopped in-store over the past year. In a press release, the men’s clothing retailer – which operates more than 400 stores worldwide – said potentially compromised information included cardholder names, account numbers, card...
Blog

WannaCry Poses Healthcare Risks in Today's Interconnected World

Patients turned away. Ambulances diverted. Doctors and nurses locked out of patient files and unable to deliver care. On Friday, 45 National Health Service (NHS) organizations in the UK and Scotland and over 200,000 other victims in 150 countries fell prey to the WannaCry ransomware. The threat spread quickly, infecting vulnerable Microsoft systems...
Blog

DocuSign Warns Users of Targeted Email Malware Campaign after Breach

DocuSign is warning customers and users to be on the lookout for targeted emails containing malware after a data breach affected one of its systems. On 15 May, the provider of electronic signature technology disclosed the security incident in an update posted to its website: "...[T]oday we confirmed that a malicious third party had gained temporary...
Blog

Why You Should Not Pay WannaCry Ransomware

If you’ve been infected with WannaCry, you're probably not getting your files back if you pay. About three days ago, a ransomware campaign named “Wannacry” began. If you looked only at what mainstream media is telling you, this was malware written by genius programmers who know what they are doing and is one of the most sophisticated and profitable...
Blog

Women in Information Security: Thaís

As a woman who works in cybersecurity, I know that there are many amazing women in my field. Last time, I had the pleasure of speaking with Cheryl Biswas, who works as a corporate cybersecurity consultant. This time, I spoke to Thaís. She's been educated on two different continents in both physics and computer science! Now she's doing some pretty...
Blog

WhatsApp Scam Offers Users Free Netflix for a Year

Fraudsters have launched a new scam campaign where they offer WhatsApp users one year of free membership access to Netflix. An attack begins when a user receives a message about gaining free access to the streaming service from one of their WhatsApp contacts. The message appears to come from the Netflix domain. But careful inspection of the...
Blog

10 High-Profile Malware Families of 2017

Each year, the United Nations observes the International Day of Families on May 15. It's a day that focuses on the role families play in cultivating education and lifelong learning. By emphasizing the importance of caregivers, the International Day of Families encourages parents to teach their children about sustainable development, human rights,...
Blog

An InfoSec Intern Roadmap

The college year is rapidly coming to a close, and for many students who are in their early college years, an internship is usually part of the summer plans. With the growing interest in cyber security and infosec, as well as the increased availability of cyber security programs in many higher education establishments, some students are entering the...
Blog

Ransomware Attack – Am I Safe Against “WannaCry”?

On Friday May 12th, the headlines were all about how the NHS UK trusts had been impacted by a severe cyber-attack. The attack was related to a strain of ransomware called “Wana Decrypt0r 2.0”, also known as Wannacryptor, WannaCry or wncry. As the news unfolded, reports revealed the NHS had not been the victim - other organizations around the world...
Blog

WannaCryptor Ransomware Strikes NHS Hospitals, Telefonica, and Others

Within a matter of hours, an updated version of WannaCryptor ransomware struck hospitals belonging to the National Health Service (NHS), Telefonica, and several other high-profile targets. News of the attacks first broke on the morning of 12 May, when a doctor operating under the pseudonym "B" broke posted the following message on Twitter: https:/...
Blog

7 Tips to Keep Your Mother Safe Online

Mother's Day is a holiday honoring mothers around the world. This special day traditionally falls on the second Sunday of every May. The timing couldn't be more perfect, as it allows children to present springtime flowers in full bloom as a gift to their mothers. We at The State of Security love and respect our mothers, which is why we spend all...
Blog

.Jaff Virus File Ransomware – The New Locky?

A new ransomware threat called .Jaff Virus File Ransomware has been discovered. Early signs were pointing to the virus potentially being a new variant of the much feared Locky Virus. However, it turns out this is not the case after all. .Jaff Virus File is yet another addition to the fearsome ransomware cyber threat family – it has just been...
Blog

Persirai IoT botnet threatens to hijack over 120,000 IP cameras

Internet-connected cameras around the world are once again being hijacked by malicious hackers in order to carry out distributed denial-of-service (DDoS) attacks. Security researchers at Trend Micro have identified that over 1,000 different models of Internet Protocol (IP) cameras are at risk of being compromised by the threat dubbed Persirai, which...
Blog

The Google Docs Phishing Scam: A Win for Security Awareness

Even if you weren't aware of it, you likely contributed to the security awareness of the global Internet community in early May 2017. By now, you’ve undoubtedly heard of the phishing scam using a phony Google Docs third-party extension. Across all sectors of social media, word spread like wildfire. I know I couldn't scroll through my Facebook feed...
Blog

Tripwire Tuesdays: Right Data, Right Audience

The Tripwire Product Suite is capable of collecting a treasure trove of information. These stored pieces of data can change from useful information to an exhaustive record of every activity, something which can easily overwhelm your IT staff. We are going to focus on FIM/SCM information today to help eliminate the noise and focus in on delivering...
Blog

How the UK is Closing the Cybersecurity Skills Gap

There is a growing skills gap in the cybersecurity sector around the world. Online recruitment company Indeed recently released a report that revealed Israel had the biggest cybersecurity skills shortage of anywhere in the world between Q3 2014 and Q3 2016. The country in second place? The UK – with less than a third of employer demand (31.6%). A...
Blog

WhatsApp Users Can Now Encrypt iCloud Data Backups

WhatsApp users can now encrypt their in-app messages and contacts that are uploaded to Apple's servers as data backups. The new feature works when a user of the secure messaging app chooses to back up their data to iCloud Drive. Once they've entered in a texted verification code sent to them by the Facebook-owned company, they receive an encryption...
Blog

The Key to Merging DevOps with Security

In today’s tech and data world, the risk around security is no longer focused on tills, commercial surveillance systems, or locks. Security systems are more focused on data breaches and network security. And as the speed at which DevOps teams are releasing code increases, so comes the increase in security risks to end users. Rigorous security review...