Blog
Your Guide to the Latest Email Fraud and Identity Deception Trends
By Tripwire Guest Authors on Tue, 09/27/2022
There’s a high chance that you or someone you know has been impacted by email fraud or identity theft. At the very least, you’ve likely received a variety of spam emails and text messages asking to provide a payment or confirm your identity.
The good news is that cybersecurity protection is constantly evolving and improving, with cybersecurity...
Blog
Quantifying the Social Impact of Ransomware and ESG Disclosure Implication
By Tripwire Guest Authors on Mon, 09/26/2022
2022 began with successful ransomware attacks against global IT and digital transformation providers, no thanks to the notorious LAPSUS$ ransomware gang. Often, any discussion about ransomware impact has mostly centered on affected organizations. Rightly so, as victimized organizations usually suffer significant disruption to their operations. In...
Datasheet
The Egypt Financial Cybersecurity Framework
Central Bank of Egypt (CBE) identified key areas of focus to tailor a cybersecurity framework to the unique requirements of the Egyptian financial sector. This framework will serve as the foundational guidance for cybersecurity capability development within this critical sector. This is the kick-off of a larger-scale effort by the CBE to build a robust and sustainable cybersecurity ecosystem...
Blog
How to Leverage NIST Cybersecurity Framework for Data Integrity
By Lane Thames on Mon, 09/26/2022
Together with the National Cybersecurity Center of Excellence (NCCoE), the National Institute of Standards and Technology (NIST) has released a series of practice guides that focuses on data integrity. Data integrity is the property that records have not been altered in an unauthorized manner. Tripwire is very proud to have contributed and...
Blog
The State of Cybersecurity has improved but is hardly flawless
By Tripwire Guest Authors on Sun, 09/25/2022
For the record, it should be acknowledged from the start that there is no question that the cybersecurity landscape has improved over time, mostly courtesy of persistent increases in cyber spending year after year. Gartner estimates that the U.S. and the rest of the world will invest $172 billion in cybersecurity this year, up from $150 billion last...
Blog
Overheard at the SANS Security Awareness Summit 2022
By Anastasios Arampatzis on Thu, 09/22/2022
People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals...
Blog
SecTor 2022: The IoT Hack Lab is Back!
By Tyler Reguly on Wed, 09/21/2022
Last year, it was great to be back at SecTor after everything was canceled in 2020. The capacity was reduced, but the Hack Lab was still plenty busy and we loved having everyone come by and visit our table and play with the gear. Even more than that, we were excited to meet up with so many friends that we hadn’t seen since 2019. We’re looking...
Report a Vulnerability
Tripwire encourages the responsible reporting of potential vulnerabilities in our applications. We are committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us. Please provide the full details of the suspected vulnerability and your contact information privately to [email protected] so that we can validate the issue and...
Blog
Tripwire Patch Priority Index for August 2022
By Lane Thames on Wed, 09/21/2022
Tripwire's August 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month are patches for Microsoft Office, Outlook, and Excel that resolve 4 vulnerabilities, including denial of service, remote code execution, and security feature bypass.
Up next are patches that affect...
Blog
What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide
By Tripwire Guest Authors on Tue, 09/20/2022
Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications.
...
Blog
Defense in Depth: 4 Essential Layers of ICS Security
By Editorial Staff on Tue, 09/20/2022
It is always said that security is never a one-size-fits-all solution. This is true not only because of the apparent infinite varieties of equipment in each individual organization, but also, and perhaps more importantly, the different ways that every organization views security. Some spend lots of time focusing on physical security, especially...
Blog
SecTor 2022: The Power of the Pico
By Tyler Reguly on Mon, 09/19/2022
I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks....
Blog
A Traveller’s Guide to Staying Cyber safe
By Tripwire Guest Authors on Mon, 09/19/2022
With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers can take to protect...
Blog
Top Phishing and Social Media Threats: Key Findings from the Quarterly Threat Trends & Intelligence Report
By Tripwire Guest Authors on Sun, 09/18/2022
In today’s online landscape, it is crucial for organizations to stay on top of the threats that put their enterprises at risk. Agari and PhishLabs have put together their Quarterly Threat Trends & Intelligence Report detailing their analysis of phishing and social media attacks this quarter. The report presents statistics regarding the volume of...
Blog
FBI warns of criminals attacking healthcare payment processors
By Graham Cluley on Thu, 09/15/2022
Millions of dollars have been stolen from healthcare companies after fraudsters gained access to customer accounts and redirected payments.
In a newly-published advisory directed at the healthcare payment industry, the FBI warns that cybercriminals are using a cocktail of publicly-available Personally Identifiable Information (PII) and social...