HackDig : Dig high-quality web security articles

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 1, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 1st, 2022. I’ve also included some comments on these stories.Windows 11 Smart App Control blocks files used to push malwareSm
Publish At:2022-08-08 06:20 | Read:126 | Comments:0 | Tags:Featured Articles VERT News credentials Kaspersky Lab malwar

Top trends in Application Security in 2022

The rising number of cyber attacks against software applications has emphasized how security must serve as an important factor in software development.  More than the traditional Software Development Lifecycle (SDLC) procedures, now security-integrated development lifecycles are being widely adapted. These aren’t the typical security assessments t
Publish At:2022-08-05 01:07 | Read:131 | Comments:0 | Tags:DevSecOps Featured Articles application security DevOps Soft

Aviation Safety and Cybersecurity: Learning from Incidents

The aviation safety sector is the study and practice of managing aviation risks. It is a solid concentration of regulations, legal documents, investigations of accidents and near-miss aviation incidents. On top of them lie lessons learned and shared knowledge; reports, facts and stats forming a cognitive super vitamin, that the aviation community uses to kee
Publish At:2022-08-04 01:07 | Read:188 | Comments:0 | Tags:Featured Articles ICS Security Aviation cybersecurity Transp

Auto Industry at Higher Risk of Cyberattacks in 2023

Cyberattacks are an increasingly common occurrence for a spectrum of industries. Rising cybercrime affects everyone, but certain sectors are more at risk than others. In 2023, the auto industry could face particularly significant dangers.Attacks in the automotive space can impact automakers, automotive fleets, and consumers alike. Reducing these risks will b
Publish At:2022-08-03 01:06 | Read:260 | Comments:0 | Tags:Featured Articles ICS Security Automotive automotive securit

Tripwire Patch Priority Index for July 2022

Tripwire’s July 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe.First on the patch priority list this month are patches that resolve 2 vulnerabilities in Edge.Next is a patch that resolves a security feature bypass vulnerability in Office.Up next are patches for Adobe Reader and Acrobat that resolve 22
Publish At:2022-08-02 06:20 | Read:280 | Comments:0 | Tags:Featured Articles VERT Adobe microsoft patch priority index

Exploring ESG Through a GRC Lens

Oftentimes, three-letter acronyms trend and become buzzwords. At other times, they act as catalysts by influencing the business environment in which an organization operates. Such acronyms include CSR (corporate social responsibility), GRC (governance, risk, and compliance), and the most recent one, ESG (environmental, social, and governance). These are impo
Publish At:2022-08-02 01:06 | Read:222 | Comments:0 | Tags:Featured Articles Regulatory Compliance environmental Govern

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of July 25, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of July 25, 2022. I’ve also included some comments on these stories.SonicWall fixed critical SQLi in Analytics and GMS productsSecurity
Publish At:2022-08-01 13:00 | Read:190 | Comments:0 | Tags:Featured Articles VERT News security cyber cybersecurity

Email Fraud in 2022: What you Need to Know

With how much of our personal and professional lives take place online, it becomes more important each day for us to understand our vulnerability to cyberattacks. Cybercriminals target emails, domains, and accounts in order to impersonate identities and scam consumers and businesses alike. In 2021 alone, email spoofing and phishing increased by 220% and caus
Publish At:2022-08-01 01:06 | Read:218 | Comments:0 | Tags:Cyber Security Featured Articles cybercrime email email scam

$10 million reward offered for information on foreign government-linked malicious hackers

A $10 million reward is being offered for information leading to the identification or location of malicious hackers working with North Korea to launch cyber attacks on US critical infrastructure.The offer comes from the US State Department which is understandably eager to disrupt the activities of hacking gangs linked to foreign governments who may have eng
Publish At:2022-07-28 13:00 | Read:250 | Comments:0 | Tags:Featured Articles Government hack

Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats?Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’.The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware ga
Publish At:2022-07-28 05:04 | Read:306 | Comments:0 | Tags:Cyber Security Featured Articles IBM malware power systems p

Is any organisation risk and data breach free?

I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite.“We don’t accept any risk. We’re risk-averse” said the CEO. But, is this achievable?Given the complexity of our modern world, with div
Publish At:2022-07-27 01:06 | Read:312 | Comments:0 | Tags:Featured Articles IT Security and Data Protection

The State of Data Security in 2022: The CISOs Perspective

In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is now spread across a wider attack surface, putting it at a heightened risk of becoming a compromised risk. The manner and location of data storage and correspondence h
Publish At:2022-07-26 01:06 | Read:263 | Comments:0 | Tags:Featured Articles IT Security and Data Protection C-Suite CI

Cybersecurity in city government, taken to new heights: An Interview with Shane McDaniel

When most people speak of any city government, they often mention words like “Bureaucratic”,“Behind the times”, and “Slow.”  This is especially true when considering cybersecurity initiatives.  However, a small town in Texas is changing that view.  Seguin, Texas, which was once the smallest Texas city to have a full-time cybersecurity employee
Publish At:2022-07-25 01:06 | Read:335 | Comments:0 | Tags:Featured Articles Government city local security cyber cyber

Black Hat USA 2022: What you need to know

Following a successful hybrid event in 2021 that saw more than 6,000 in-person, and more than 14,500 virtual attendees, Black Hat USA returns in 2022 to the Mandalay Bay Convention Centre in Las Vegas, Nevada. Now in its 25th year, this year’s event has three key components, each equally unmissable, namely these are Trainings, Briefings, and The Business Hal
Publish At:2022-07-25 01:06 | Read:291 | Comments:0 | Tags:Events Featured Articles black hat Black Hat USA

Cybersecurity Policy – time to think outside the box?

When we get into cybersecurity, one of the first things any organisation or company should do is write a cybersecurity policy, one that is owned by all. Easy words to put down on paper, but what do they mean?So, what is a cybersecurity policy? Well, it is defined in the Gartner IT Glossary as, “an organization’s statement of intent, principles and appro
Publish At:2022-07-21 01:06 | Read:226 | Comments:0 | Tags:Featured Articles Security Controls cybersecurity policy pol


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud