TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 21, 2017
In last week’s blog entry, I mentioned the fact that the Zero Day Initiative (ZDI) published two zero-day advisories (ZDI-17-691 and ZDI-17-692) for vulnerabilities found in Foxit Reader after Foxit...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article4 Principles For Hybrid Cloud Success
The future is cloud. At this point in it’s evolution it’s undeniable. The questions facing organizations now are “how much?” and “how fast?” How do you map out a reasonable path to a cloud deployment?...
View ArticleExtend Protection to VMWare Cloud on AWS with Trend Micro™ Deep Security™
On August 28th at VMworld 2017 in Las Vegas, VMware announced initial availability for their unique offering called ‘VMware Cloud on AWS’ allowing customers to run VMware workloads on the AWS cloud....
View ArticlePetya expands its scope: A global ransomware threat
Ransomware remains a formidable threat for individual users and businesses alike, particularly as new sample families continue to be discovered by security researchers. What makes ransomware so...
View ArticleIt’s Back to School Time, So How Do I Keep My Child Safe Online?
The end of the summer can be a pretty stressful time for parents as well as their kids. Apart from the prospect of a return to school, there’s a whole checklist of items to get ready. Schoolbag? Check....
View ArticleHow hackers have improved their BEC attack methods
Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion...
View ArticleVMworld 2017 Recap
VMware featured a number of great announcements at VMworld 2017 including VMware Cloud on AWS. VMware customers can now run new or existing virtualized workloads in the AWS cloud while maintaining...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 28, 2017
The only topic I can bring up this week is the devastation in Texas caused by Hurricane Harvey. Many cities have been completely destroyed and to add insult to injury, Harvey moved back to the Gulf of...
View ArticleEdith Wharton, Identity Theft, and the GDPR
During one of my talks for Gartner, I asked the audience, “How many of you have ever had anything stolen?” Many hands went up. Then I asked, “How did you know it was stolen?” The answers generally...
View ArticleSmartphones Under Fire: Why We Need to Keep Our Android Devices Safe
If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why...
View ArticleAn Established Solution for Mobile Threats
As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adware to dangerous...
View ArticleUNITEDRAKE Looms Large…Maybe
Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 4,...
Earlier this week, a ‘severe’ vulnerability was discovered in Apache Struts, an open source framework for developing applications in Java. The vulnerability, CVE-2017-9805, affects all versions of...
View ArticleEquifax Breach – an Example of Good Communications
Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44 percent of the US population. This breach will have a significant impact on a lot of people. Companies...
View ArticleGrading our Predictions: See how we faired in 1H 2017
In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...
In last week’s blog, I mentioned the Apache Struts vulnerability, which is still making headlines as estimates show that as many as 65 percent of Fortune 500 companies use it in some form. In addition,...
View Article