CISA has added the use of single-factor authentication for remote or admin access to its list of “Bad Practices.”
Popular Tags within: Network SecurityCybersecurity Microsoft Videoconferencing ransomware Storage AV-over-IP Cryptocurrency IT ServiceNow Azure
Microsoft is warning thousands of its customers of a vulnerability in Azure that left customer data – including for several Fortune 500 companies – completely exposed. Cloud security company Wiz said in lengthy and detailed post that the flaw – dubbed Chaos DB – is in Azure’s Cosmos DB database. A successful exploit would give […]
The IoT has long been thought to be full of gaping vulnerabilities for attackers to exploit, and it’s now becoming a reality as two recently vulnerability disclosures say millions of IoT devices could be at risk and allow attackers to spy on organizations or completely control affected devices. IoT Inspector was the first to disclose […]
When Microsoft released security patches earlier this month to address the vulnerabilities in Windows Print Spooler service, we thought the flaws known as PrigntNightmare were behind us. However, due to the very patch that Microsoft issued to keep cybercriminals from gaining admin privileges through this vulnerability and other changes, some admins are complaining of printing […]
Thanks to a continuous onslaught of nation-state cyberattacks, exploited vulnerabilities and ransomware, the term Zero Trust has been thrust into the mainstream, but the term isn’t new. In fact, it’s about a decade old, but the ideas and concepts behind the term are even older. However, there isn’t one Zero Trust solution or any one […]
System administrators and other IT professionals are urged to apply Microsoft’s May 2021 security updates as threat actors are actively exploiting a previous vulnerability in Microsoft Exchange Server. The U.S. Cybersecurity and Infrastructure Security Agency said over the weekend that multiple threat actors are exploiting three ProxyShell Vulnerabilities, which could allow an attacker to install […]
Microsoft this week published a blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards. The blog comes amid a heightened awareness of cybersecurity […]
Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.
Cybercriminals may have their sights set on school districts in 2021-22 academic year; parents fear leak of student data.
Cisco acquires cloud monitoring startup to better track the performance of the components that make up a firm’s digital infrastructure.