SecurityCentric is your source for Blog Aggregation in the Security industry

Security, Compliance and Best Practices

View This Blog Frequency: 1.3 posts / day

 

"Junk gun" ransomware: the cheap new threat to small businesses

 Mark As Read    

What's going on? A wave of cheap, crude, amateurish ransomware has been spotted on the dark web - and although it may not make as many headlines as LockBit , Rhysida , and BlackSuit , it still presents a serious threat to organizations. What's "junk gun" ransomware? It's a name coined by Sophos researchers for unsophisticated ransomware that is oft...

UK IT Leaders Are Prioritizing Cybersecurity: But Is This a Good Thing?

 Mark As Read    

Tech leaders taking cybersecurity seriously is something of a double-edged sword. While its undoubtedly good that organizations are waking up to the genuine threat cyberattacks pose, its depressing that they must siphon off so many resources to protect themselves rather than using them for growth and innovation. A recent survey of UK technology lea...

"All for One and One for All": The EU Cyber Solidarity Act Strengthens Digital Defenses

 Mark As Read    

Alexandre Dumas's timeless novel "The Three Musketeers" immortalized the ideal of unyielding solidarity, the enduring motto "All for one and one for all." In the face of ever-evolving threats in the digital realm, the European Union echoes this spirit with its landmark Cyber Solidarity Act . This new legislation recognizes that collective defense i...

Enhancing Endpoint Security with Advanced Host-Based Intrusion Detection Capabilities

 Mark As Read    

In 2023, companies lost about $4.45 million on average because of data breaches. As cyber threats advance, securing endpoints is more important than ever. An advanced Host-based Intrusion Detection System (HIDS) provides a sturdy remedy to improve endpoint security . By monitoring and examining system responses and device status, HIDS identifies an...

University Cybersecurity Clinics Can Now Use the New CISA Resource Guide

 Mark As Read    

Budgetary and resource constraints play a huge role in cyberattacks on smaller organizations. Amidst a strained global economy, many under-resourced organizations like non-profits, local governments, and hospitals struggle to keep their heads above water - they simply don't have the funds to invest in cybersecurity. To make matters worse, cybercrim...

Exploring Cybersecurity Risks in Telemedicine: A New Healthcare Paradigm

 Mark As Read    

The experience of seeing a doctor has transformed dramatically, thanks in part to the emergence of telemedicine. This digital evolution promises convenience and accessibility but brings with it a host of cybersecurity risks that were unimaginable up until a few years ago. The unique cybersecurity challenges facing telemedicine today underscore the ...

NSA Debuts Top 10 Cloud Security Mitigation Strategies

 Mark As Read    

As businesses transition to hybrid and multi-cloud setups, vulnerabilities arising from misconfigurations and security gaps are escalating, attracting attention from bad actors. In response, the US National Security Agency (NSA) issued a set of ten recommended mitigation strategies, published earlier this year (with support from the US Cybersecurit...

37 Arrested as Police Smash LabHost International Fraud Network

 Mark As Read    

Police have successfully infiltrated and disrupted the fraud platform "LabHost", used by more than 2,000 criminals to defraud victims worldwide. A major international operation, led by the UK's Metropolitan Police, has seized control of LabHost, which has been helping cybercriminals create phishing websites since 2021 to steal sensitive information...

Supply Chain Cybersecurity the importance of everyone

 Mark As Read    

Im always surprised and a little disappointed at how far we have to go before supply chain cybersecurity gets the respect and attention it deserves. I sat down this week with a new client who wanted some help addressing several internal issues surrounding their IT systems. When I asked them about their relationship with the supplier essentially,...

Navigating AI and Cybersecurity: Insights from the World Economic Forum (WEF)

 Mark As Read    

Cybersecurity has always been a complex field. Its adversarial nature means the margins between failure and success are much finer than in other sectors. As technology evolves, those margins get even finer, with attackers and defenders scrambling to exploit them and gain a competitive edge. This is especially true for AI. In February, the World Eco...

SCM and NERC: What You Need to Know

 Mark As Read    

Security configurations are an often ignored but essential factor in any organizations security posture: any tool, program, or solution can be vulnerable to cyberattacks or other security incidents if the settings are not configured correctly. Staying on top of all of these security configurations can be a daunting responsibility for security or IT...

Casting a Cybersecurity Net to Secure Generative AI in Manufacturing

 Mark As Read    

Generative AI has exploded in popularity across many industries. While this technology has many benefits, it also raises some unique cybersecurity concerns. Securing AI must be a top priority for organizations as they rush to implement these tools. The use of generative AI in manufacturing poses particular challenges. Over one-third of manufacturer...

What Is an Axon Agent, and Why Do You Need One?

 Mark As Read    

The number of endpoints in an organization often exceeds the number of employees. Managing these often disparate entities is more than a full-time job. Moreover, keeping them secure is equally difficult, yet securing all of your endpoints against cyber threats has become paramount for organizations worldwide. A common oversight that undermines thes...

ITRC's 2023 Data Breach Report Is a Mixed Bag

 Mark As Read    

In the first quarter of every year, organizations around the world release reports summing up data breach trends from the previous twelve months. And every year, these reports say broadly the same thing: data breach numbers have gone up again. This year is no different. Or is it? Compromises Up, Victims Down However, the Identity Theft Resource Cen...

DragonForce Ransomware - What You Need To Know

 Mark As Read    

What's going on? A relatively new strain of ransomware called DragonForce has making the headlines after a series of high-profile attacks. Like many other ransomware groups, DragonForce attempts to extort money from its victims in two ways - locking companies out of their computers and data through encryption, and exfiltrating data from compromised...

Life in Cybersecurity: From Nursing to Threat Analyst

 Mark As Read    

As digital threats increase, we see more professionals transition into cybersecurity. Some come from previous technical roles, and some do not. However, because cybersecurity is primarily a problem-solving industry, those who switch from other high-pressure, high-performance positions are often best prepared for the job. Take Gina DAddamio , for ex...

Embracing Two-Factor Authentication for Enhanced Account Protection

 Mark As Read    

Lets start the second quarter of the year with boosting our security posture by adopting two-factor authentication methods on our accounts to make them more secure. Two-factor authentication (2FA) is an identity and access management security method that requires two forms of identification to access resources and data. The first factor you provide...

VERT Threat Alert: April 2024 Patch Tuesday Analysis

 Mark As Read    

Todays VERT Alert addresses Microsofts April 2024 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1101 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2024-26234 This CVE describes a Proxy Driver Spoofing Vulnerability that, thanks to Microsofts new CWE listings , we know...

Cybersecurity Compliance Around the Globe: India's DPDP

 Mark As Read    

In an era where data breaches and privacy concerns are increasingly shaping global discourse, India's proactive stance on data protection is noteworthy. Introducing the Digital Personal Data Protection (DPDP) Act 2023 marks a significant milestone in India's legislative landscape. This groundbreaking Act fortifies individual data privacy rights and...

Gone Phishing 2023: Here Are the Results!

 Mark As Read    

Phishing is one of the most pertinent cybersecurity dangers for organizations to be concerned about in todays digital landscape. Threat trends come and go, but phishing is a tried-and-true method that cybercriminals can adjust and adapt to all different manners of communication and evolving technology. Fortras Gone Phishing Tournament (GPT) is a ye...

AI/ML Digital Everest: Dodging System Failure Summit Fever

 Mark As Read    

Summit Fever Syndrome, a cause of many extreme altitude climbers' deaths, is due to a lack of oxygen and mission blindness, which leads to impaired judgment where climbers take needless risks, disregard safety precautions, and make deadly errors. Deploying AI/ML models is like climbing Mount Everest. Both climbers and AI projects chase their peaks ...

Exploring Advanced Tripwire Enterprise Capabilities

 Mark As Read    

In today's digital landscape, it is important for organizations to depend upon the tools they use for cybersecurity. Large businesses can employ many security solutions, practices, and policies that must combine to create a robust and layered security strategy. While many of these tools are important and necessary, organizations often don't use the...

Google Patches Pixel Phone Zero-days After Exploitation by "Forensic Companies"

 Mark As Read    

Google has issued a security advisory to owners of its Android Pixel smartphones, warning that it has discovered someone has been targeting some devices to bypass their built-in security . What makes the reported attacks particularly interesting is that traditional cybercriminals may not be behind them, but rather "forensic companies" exploiting tw...

Security vs. Compliance: What's the Difference?

 Mark As Read    

Security and compliance a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team, or two great tastes that go great together. As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reeses cup, a recent gap analysis that I was part of rem...

Tripwire Patch Priority Index for March 2024

 Mark As Read    

Tripwire's March 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft, Google, and Apple. First on the patch priority list are patches for Windows Kernel and Multiple Apple products. These CVEs (CVE-2024-21338, CVE-2024-23296, CVE-2024-23225) have been added to CISA's Known Exploited Vulnerabilities (KEV) catalog....

Exploring Access Control Models: Building Secure Systems in Cybersecurity

 Mark As Read    

In any organization, unrestricted access to systems and resources poses significant security risks. Recent cybersecurity events have shown that attackers will target any organization of any size. The most common attack vector is through unauthorized access to a legitimate account, often preceded by a phishing technique. To protect against unauthori...

Oops, Malware! Now What? Dealing with Accidental Malware Execution

 Mark As Read    

On an ordinary day, you're casually surfing the web and downloading some PDF files. The document icons seem pretty legitimate, so you click without a second thought. But, to your surprise, nothing happens. A closer look reveals that what you believed to be a harmless PDF was, in fact, an executable file. Panic sets in as your settings lock up, and ...

Whats New in NISTs Cybersecurity Framework 2.0?

 Mark As Read    

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) was published in 2014 for the purpose of providing cybersecurity guidance for organizations in critical infrastructure. In the intervening years, much has changed about the threat landscape, the kinds of technology that organizations use, and the ways that operati...

The Cyber Sleuth's Handbook: Digital Forensics and Incident Response (DFIR) Essentials

 Mark As Read    

In the intricate landscape of cybersecurity, Digital Forensics and Incident Response (DFIR) stand as the sentinels guarding against the onslaught of digital threats. It involves a multifaceted approach to identifying, mitigating, and recovering from cybersecurity incidents . In the physical world, the aftermath of a crime scene always yields vital ...

Bake-off: Ensuring Security in the Cyber Kitchen

 Mark As Read    

Ill start this one with an apology Ive been watching a lot of the TV show The Bear (which Id highly recommend!) and thus been thinking a lot about kitchen processes and the challenges of making everything come together nicely (both in life and in a recipe). If you are unfamiliar with the show, it is a comedy-drama about a chef who manages his dece...

AI Platforms Name Cybersecurity Threats and Advice for 2024

 Mark As Read    

With $109.5 billion of growth expected between now and 2030, the global AI cybersecurity market is booming and it's not hard to see why. According to a recent survey of security professionals, three-quarters ( 75% ) have observed an increase in cyberattacks. Of these, the research found that an even greater proportion (an overwhelming 85%) blamed ...

Browser Security in 2024: Technologies and Trends

 Mark As Read    

What Is Browser Security? Browser security is a set of measures and processes intended to protect users and their data when using web browsers. This includes mechanisms to prevent unauthorized access, safeguard against malicious software and other browser security threats , and ways to protect the privacy of online activities. Essential components ...

Notorious Nemesis Market Seized by German Police

 Mark As Read    

Nemesis Market, a notorious corner of the darknet beloved by cybercriminals and drug dealers, has been suddenly shut down after German police seized control of its systems. Germany's Federal Criminal Police (known as the BKA) has announced that it has seized the infrastructure of Nemesis and taken down its website. At the same time, cryptocurrency ...

Managed Cybersecurity Services Secure Modern Environments

 Mark As Read    

In an era characterized by relentless digital transformation and interconnectedness, cybersecurity has evolved into a complex and dynamic battleground. Businesses, governments, and individuals find themselves locked in a perpetual struggle against a relentless flood of evolving threats. From sophisticated cybercriminal syndicates to state-sponsored...

The Looming Cyber Threat in Real Estate

 Mark As Read    

In our interconnected world, the real estate industry has embraced technology to revolutionize its operations, enhance customer experiences, and streamline business processes. Yet, while this technological evolution has brought immense benefits to the property sector, it has also attracted the attention of nefarious actors keen on exploiting vulner...

AI Transparency: Why Explainable AI Is Essential for Modern Cybersecurity

 Mark As Read    

Modern cybersecurity has reached an exceptional level, particularly with the integration of AI technology . The complexity of cyberattacks and their methodologies has also increased significantly, even surpassing human comprehension . This poses a considerable challenge for cybersecurity professionals who struggle to keep pace with the scale and co...

Fraudsters Are Posing As The FTC To Scam Consumers

 Mark As Read    

The United States Federal Trade Commission (FTC) has warned the public to be cautious if contacted by people claiming to be... FTC staff. In a warning published on its website , the FTC said that scammers were using its employees' real names to steal money from consumers. A typical ruse will see the bogus FTC staffer advising someone to wire or tra...

What Is Log Management and Why you Need it

 Mark As Read    

Thanks to the burgeoning supply chain, a host of IoT and work-from-home devices, and an expanding cloud presence, organizations are constantly ingesting new hardware into their IT environments. With each new line of code comes a fresh chance for a hidden vulnerability. With each unfound weakness, attackers gain one more opportunity to gain a footho...

Critical insights into Australias supply chain risk landscape

 Mark As Read    

Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as a challenge that demands attention and proactive strategies. From July to December 2023, 483 data b...

Achieving continuous compliance with Tripwires Security Configuration Manager

 Mark As Read    

Security and compliance are often tightly intertwined. The main difference is that sometimes security can outpace compliance efforts. While it is easy to infer that a more secure system exceeds a compliance requirement, an auditor should not be expected to deduce the state of a system; the evidence needs to be clear. There are many factors that can...

Firmware Monitoring is Just a Snapshot Away

 Mark As Read    

Any time the television news presents a story about cybersecurity, there is always a video of a large data center with thousands of blinking lights. Even most cybersecurity blogs will include an image of many lights on the front panels of servers, routers, and other hardware. However, most people dont notice that the lights are usually green or som...

Federated Learning for Cybersecurity: Collaborative Intelligence for Threat Detection

 Mark As Read    

The demand for innovative threat detection and intelligence approaches is more pressing than ever. One such paradigm-shifting technology gaining prominence is Federated Learning (FL). This emerging concept harnesses the power of collaborative intelligence, allowing disparate entities to pool their insights without compromising sensitive data. A rep...

LockBit affiliate jailed for almost four years after guilty plea

 Mark As Read    

An affiliate of the LockBit ransomware gang has been sentenced to almost four years in jail after earlier pleading guilty to charges of cyber extortion and weapons charges. 34-year-old Mikhail Vasiliev, who has dual Russian and Canadian nationality, was arrested in 2022 as part of a multinational law enforcement investigation into LockBit that star...

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

 Mark As Read    

According to the Verizon 2023 Data Breach Investigations Report , Basic Web Application Attacks accounted for nearly one-fourth of the entire breach data set. Although not the most sophisticated threats in the bunch, common web attacks like credential stuffing and SQL injection attacks continue to wreak havoc on the cybersecurity landscape, just li...

The Importance of Host-Based Intrusion Detection Systems

 Mark As Read    

What Is a Host-Based Intrusion Detection System (HIDS)? A host-based intrusion detection system, or HIDS , is a network application that monitors suspicious and malicious behavior, both internally and externally. The HIDS job is to flag any unusual patterns of behavior that could signify a breach. By bringing this activity to the teams attention, t...

VERT Threat Alert: March 2024 Patch Tuesday Analysis

 Mark As Read    

Todays VERT Alert addresses Microsofts March 2024 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1097 as soon as coverage is completed. In-The-Wild & Disclosed CVEs There were no in-the-wild or disclosed CVEs included in the March Patch Tuesday release. CVE Breakdown by Tag While historica...

Reducing Cyber Risks with Security Configuration Management

 Mark As Read    

Protecting sensitive data and other assets requires an organization to be adaptable and stay informed on things like the digital landscape and threat trends. While some aspects of security are within an organizations control, it can be extremely difficult to manage all of the risks and vulnerabilities that are likely to arise. Security configuratio...

Cybersecurity in the Age of AI: Exploring AI-Generated Cyber Attacks

 Mark As Read    

Historically, cyber-attacks were labor-intensive, meticulously planned, and needed extensive manual research. However, with the advent of AI , threat actors have harnessed their capabilities to orchestrate attacks with exceptional efficiency and potency. This technological shift enables them to execute more sophisticated, harder-to-detect attacks a...

VERT Threat Alert: October 2022 Patch Tuesday Analysis

 Mark As Read    

Todays VERT Alert addresses Microsofts October 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1025 on Wednesday, October 12th. In-The-Wild & Disclosed CVEs CVE-2022-41033 A vulnerability in the Windows COM+ Event System service could allow malicious individuals to obtain SYSTEM lev...

Turning a Pico into a Human Interface Device (HID)

 Mark As Read    

I just walked out of room 716 at SecTor here in Toronto, where I shared details on my Raspberry Pi Pico project. Im happy that I was finally able to share this and even happier to announce that the GitHub repo is now open to the public. I wont walk you through the code, but you can […]… Read More The post Turning a Pico i...

Security
Welcome!
SecurityCentric aggregates blogs for the Security industry.
Custom Feeds
Add any RSS feed to the information you read daily.
Blocked Feeds
Block feeds to remove blogs you’re not interested in.
Account Settings
Customize the site by adding or removing feeds.

About Us

SecurityCentric is your source for all your Security news.

Have a Suggestion for Us?
Know of a Security blog that we're missing? Let us know!

Share SecurityCentric.com