Tens of thousands of Cisco Adaptive Security Appliance devices remain vulnerable to a zero-day exploit released last month as part of the Equation Group toolset dump by Shadow Brokers, according to scans conducted by security firm Rapid7.
An increasing number of sophisticated, high-performance security and content-aware devices are at layers 4
through 7. This calls for, among other things, even greater sophistication of network emulation from test equipment. When Layer 4-7 devices are not properly tested, they face a greater risk for failure within...
In their quest for easy ways to extort victims into giving them bitcoins, cybercriminals continue to double down on crypto-ransomware attacks and increasingly target enterprises, seeking proportionally higher paydays.
You've gone back and forth on encryption, its benefits and challenges, and you've made the decision: to keep your data truly safe, your organization needs encryption. So what now? You've got options available, but what is the best, safest way to implement encryption without disrupting your users' workflow and...
Enterprises must have meaningful conversations about business risk at all levels and across every department. Risk scoring is a fundamental way of normalizing risk to make sense of complex and disparate data. It enables you to standardize reporting, streamline workflows and communicate risk clearly to stakeholders....
The Equation Group tools released by the Shadow Brokers have revealed that the U.S. National Security Agency has been able to decrypt any traffic sent using a Cisco PIX device. While Cisco no longer supports the devices, more than 15,000 remain in use.
Eighty percent of the Android ecosystem - an estimated 1.4 billion devices - is vulnerable to an attack affecting TCP. While the flaw has been patched in Linux, Android remains vulnerable, although Google is aware of the issue.
Cerber ransomware victims often see a ransom note demanding 1 bitcoin in exchange for a decoder. For what's sure to be a limited time, however, victims can take advantage of a new, free decoder.
Obviously, ransomware attackers have no scruples. But the latest attacks go to even further extremes, channeling everything from Hitler to cats, as attackers hone their attempts to shake down Windows and Android users alike.
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest ISMG Security Report.
Do you have $100,000 burning a hole in your pocket and an abiding love of bitcoins? If so, then the U.S. Marshals Service has an offer you can't refuse: Bid on bitcoins seized in some high-profile investigations, including the Silk Road takedown.
In the largest HIPAA settlement to date, federal regulators have smacked Chicago-based Advocate Health Care with a $5.5 million fine in the wake of an investigation into three 2013 breaches. The settlement is HHS's tenth HIPAA enforcement action this year.
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
The new "No More Ransom" portal is designed to emphasize that police and security firms are doing whatever they can to disrupt ransomware gangs, as well as to help more victims get their data back for free, says Intel Security's Raj Samani.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.