CISA releases advisory on five Apache HTTP server vulnerabilities affecting Cisco products
The government agency urged administrators to review Cisco’s advisory and apply the necessary updates. CISA has released a second advisory about several Apache HTTP server vulnerabilities. Cisco sent out a notice about the vulnerabilities...
Hackers are targeting this Microsoft Windows Installer flaw, say security researchers
The flaw can be exploited to give an attacker administrator rights on a compromised system, despite efforts to fix the problem. Hackers have already created malware in a bid to...
Why email is still the most significant vector that attackers exploit
The impact of the pandemic is spoken about every day. Never before have we had to react to a danger such as COVID. However, we’re now seeing more repercussions develop...
Ransomware demands and payments hit new records
Ransomware groups continue to intensify their operations as ransom demands and payments increase alongside use of “quadruple extortion” tactics during first half of 2021. The average ransom paid by victim...
Feds’ demand for software standards could boost enterprise security
An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting. Enterprises can...
Ransomware recovery: Plan for it now
Make a disaster-recovery plan to address ransomware attacks, and start with stopping its spread, IDing the variant and getting ready to get restore your files. If your computing environment is...
The threat of single vendor security is too high to ignore
Jaws dropped last year when the SolarWinds attack was revealed. The extent of the sophisticated intrusion was breathtaking: the hackers leveraged SolarWinds’ commercial software to infiltrate major firms and top government agencies,...
Avast identifies cryptocurrency scam rises in regions of high adoption
Research from Avast Threat Labs has revealed a growth in crypto-based scams in regions where cryptocurrency is growing in popularity, in the first half of 2021. Avast’s threat labs researchers...
The hidden costs of ransomware
The catalogue of high-profile ransomware attack examples is growing larger and becoming more alarming every day, affecting everything from gas pipelines to transport and technology firms. And as the range of targets...
Cybersecurity in 2021: Stopping the madness
The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks....