vulnerabilities

Orca Security 2020 State of Virtual Appliance Security

To help move the cloud security industry forward and reduce risk for customers, Orca Security conducted a wide-reaching research and testing project to benchmark the current state of virtual appliance security. Virtual appliances are cheap and easy for software vendors to distribute. Fully preconfigured with all requisite software, they’re often delivered ready for customers to […]

Orca Security 2020 State of Virtual Appliance Security Read More »

License to Kill: Leveraging License Management to Attack ICS Networks

Claroty researchers have found six vulnerabilities in Wibu-Systems AG’s CodeMeter product, a solution widely used in the ICS domain as a license-management and antipiracy tool. The vulnerabilities collectively earned the highest criticality CVSS score of 10.0, and can be exploited in denial-of-service attacks, or to achieve remote code execution. Wibu-Systems’ CodeMeter is used in critical

License to Kill: Leveraging License Management to Attack ICS Networks Read More »

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020

Introduction Security leaders, while supporting business growth and digital transformation, struggle with a multitude of challenges.We know this because you tell us, both in ongoing conversations and as part of our annual benchmark survey.Some challenges are focused on security, such as needing better visibility or automation, or striving for greater simplicity of management and response.Some

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020 Read More »

ESET Threat Report Q1 2020

Foreword Welcome to the first quarterly ESET Threat Report! The first quarter of 2020 was, without a doubt, defined by the outbreak of COVID-19 — now a pandemic that has put much of the world under lockdown, disrupting peoples’ lives in unprecedented ways. In the face of these developments, many businesses were forced to swiftly

ESET Threat Report Q1 2020 Read More »

Monthly Threat Report – Special edition: April 2020

Protecting the Remote Worker Lead Analyst: Jon Heimerl — CISSP, Sr. Manager, Global Threat Intelligence Center Telecommuting. Virtual workplace. Teleworking. Working remotely. E-working. Regardless of what we call it, the purpose is to enable employees to function effectively from remote locations. In the current climate of the coronavirus pandemic, many organizations have already implemented a

Monthly Threat Report – Special edition: April 2020 Read More »

Security Operations Effectiveness

Security professionals’ overconfidence in security tools leads to data breaches, vulnerabilities and wasted time and money Today’s security operations teams face an unrelenting stream of attacks from both outside and inside of their organizations. Security operations teams are dealing with tool sprawl which may inadvertently compromise their security tools’ capabilities, while misconfigurations can result in

Security Operations Effectiveness Read More »

Cybercrime techniques and tactics (CTNT): Ransomware retrospective

Malwarebytes has released the company’s latest quarterly threat report. This special, in-depth ransomware edition of the CTNT explores the shift in ransomware attacks from consumer targets to organisations, businesses, municipalities and beyond, breaking out attack vectors and trends region by region for an unprecedented view into ransomware behavior.

Cybercrime techniques and tactics (CTNT): Ransomware retrospective Read More »