433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

How and why threat actors target Microsoft Active Directory

Microsoft Active Directory debuted 22 years ago. In computer age, that’s old technology. Threat actors like old technology because it often has legacy code or processes that are not secured to modern standards or organizations have not kept up with patches and recommended settings. Derek Melber, chief technology and security strategist for Tenable, discussed Active Directory risks at this year’s RSA conference. Attackers target domains. If they see a device joined to Active Directory, they will continue with the attack. If they don’t see a domain-joined machine, they will go on to another workstation. Below are some examples of how attackers can exploit legacy Active Directory vulnerabilities To read this article in full, please click here
http://news.poseidon-us.com/ST2YvS

Photos: Cyber Week 2022

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Cyber Week 2022 is held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), The Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Directorate under the Prime Minister’s Office and the Ministry of Foreign Affairs. Our Editor-in-Chief Zeljka Zorz is at the conference this week, and here’s a closer look … More → The post Photos: Cyber Week 2022 appeared first on Help Net Security.
http://news.poseidon-us.com/ST2Rhq

Destructive firmware attacks pose a significant threat to businesses

As business workforces become increasingly distributed, IT leaders say it’s harder than ever to defend against firmware attacks, according to HP Wolf Security. The growing threat of destructive firmware attacks The shift to hybrid work models has transformed how organizations manage endpoint security, while also highlighting new challenges for IT teams around securing device firmware. The HP Wolf Security global survey of 1,100 IT leaders reveals that: The threat of firmware attacks is a growing … More → The post Destructive firmware attacks pose a significant threat to businesses appeared first on Help Net Security.
http://news.poseidon-us.com/ST1wm7

Why digital trust needs to be a strategic imperative for your company

It’s no secret that digital interactions have extended to every aspect of our professional and personal lives. Connectivity is soaring and digital transformation is accelerating, making it critical for the technology community, governments and corporate boardrooms to invest in digital trust. We’re witnessing an explosion of connected devices, with the number of Internet of Things (IoT) devices expected to soar from 8.74 billion in 2020 to more than 25 billion in 2030. Hybrid and remote … More → The post Why digital trust needs to be a strategic imperative for your company appeared first on Help Net Security.
http://news.poseidon-us.com/ST1tlJ

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, and make it abundantly clear that ransomware attacks are not a threat that any organization, however big or small and across industries, can afford to ignore. It follows, then, that proactively protecting company assets and mitigating cyber … More → The post Detection, isolation, and negotiation: Improving your ransomware preparedness and response appeared first on Help Net Security.
http://news.poseidon-us.com/SSylsv

Exploring the insecurity of readily available Wi-Fi networks

In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the wild, and introduces specific hacking techniques to crack Wi-Fi passwords. CyberArk researchers have already proven the ease with which attackers can access Wi-Fi networks, having recently gone on wardriving exercises in San Francisco, Dallas and Tel Aviv to uncover how many Wi-Fi networks could be could cracked … More → The post Exploring the insecurity of readily available Wi-Fi networks appeared first on Help Net Security.
http://news.poseidon-us.com/SSyZQH

Trends to watch when creating security strategy for the next two years

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next three years; and security platform consolidation will help organizations thrive in hostile environments, according to the top cybersecurity predictions revealed by Gartner. In the opening keynote at the Gartner Security & Risk Management Summit in Sydney, Richard Addiscott, Senior Director Analyst and Rob McMillan, Managing VP at Gartner discussed the top … More → The post Trends to watch when creating security strategy for the next two years appeared first on Help Net Security.
http://news.poseidon-us.com/SSyXGK

Threat actors increasingly use third parties to run their scams

Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In January 2022, the number of business email compromise (BEC) attacks impersonating external third parties surpassed those impersonating internal employees for the first time and has continued to exceed traditional internal impersonations in each month since. In May 2022, external, third-party impersonation made up 52% of all BEC attacks seen by … More → The post Threat actors increasingly use third parties to run their scams appeared first on Help Net Security.
http://news.poseidon-us.com/SSyT11

Properly securing APIs is becoming increasingly urgent

Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique cybersecurity incidents estimates that API insecurity results in $41-$75 billion of losses annually. The study, conducted by the Marsh McLennan Cyber Risk Analytics Center, found that larger organizations were statistically more likely to have a higher percentage of API-related incidents. In fact, enterprises with revenues of at least $100 billion were 3-4x more … More → The post Properly securing APIs is becoming increasingly urgent appeared first on Help Net Security.
http://news.poseidon-us.com/SSyR4Q