SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software

After being notified on July 4, HP waited four months before releasing a security advisory. Since HP Touchpoint Analytics was introduced to users in 2017, it has been a hotrod for controversy. In 2017 HP said the feature “anonymously collects diagnostic information about hardware performance. No data is shared with HP unless access is expressly granted. Customers can opt-out or uninstall the service at any time.” But users have continued…

October 11, 2019
Read More >>

How to enable SSH session recording in CentOS 8

Learn how to enable SSH session recording in CentOS 8. CentOS 8 has been released and it includes some really amazing features. One feature that many security admins will greatly appreciate is session recording. With this feature, CentOS will record any/all SSH sessions, which includes all of the user activity that occurs during the session. Once recorded, videos of these sessions can be played back by any admin with a…

October 11, 2019
Read More >>

McAfee, IBM join forces for global open source cybersecurity initiative

IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies. The diversity of cyberthreats has never been greater as our digital landscape grows to encompass more of our lives. There are hundreds of competing security solutions but little integration considering how many people deploy more than one system. That’s about to change as dozens of tech companies have joined…

October 10, 2019
Read More >>

Financial industry spending millions to deal with breaches in 2019

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack. Companies managing financial services are suffering from more attacks than ever and spending millions to address the problems created by cybercriminals. In the 2019 Global DNS Threat Report from security company EfficientIP, analysts spoke to 900 respondents from nine countries across…

October 9, 2019
Read More >>

Financial industry spends millions to deal with breaches

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack. Companies managing financial services are suffering from more attacks than ever and spending millions to address the problems created by cybercriminals. In the 2019 Global DNS Threat Report from security company EfficientIP, analysts spoke to 900 respondents from nine countries across…

October 9, 2019
Read More >>

70% of business report Pass the Hash attacks directly impact operational costs

Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials. More about cybersecurity Pass the Hash attacks are growing in prevalence and impact, but most organizations aren’t even aware these attacks exist. These brute-force credential attacks have detrimental effects on organizations, acting as a wake-up call for businesses to stay protected, according to a One Identity report.  One Identity’s Global Survey 2019, released on…

October 9, 2019
Read More >>

70% of businesses report Pass the Hash attacks directly impact operational costs

Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials. More about cybersecurity Pass the Hash attacks are growing in prevalence and impact, but most organizations aren’t even aware these attacks exist. These brute-force credential attacks have detrimental effects on organizations, acting as a wake-up call for businesses to stay protected, according to a One Identity report.  One Identity’s Global Survey 2019, released on…

October 9, 2019
Read More >>

How MIT researchers use machine learning to detect IP hijackings before they occur

The goal is to predict incidents in advance by tracing them back to the actual hijackers. The internet uses routing tables to determine how and where data is sent and received. Without accurate and reliable tables, the internet would be like a highway system with no signs or signals to direct the traffic to the right places. Of course, cybercriminals find a way to corrupt just about everything that makes…

October 9, 2019
Read More >>

UT Austin launches first ever healthcare cybersecurity leadership program in the US

With the shortage of cybersecurity professionals in the US, UT’s program aims to develop individuals who can mitigate security risks in healthcare. More about cybersecurity The McCombs School of Business at The University of Texas at Austin announced its Leadership in Health Care Privacy and Security Risk Management certificate program on Tuesday. The first professional program of its kind in the US aims to produce cybersecurity leaders who can manage…

October 8, 2019
Read More >>

Only 1 in 5 enterprises have DMARC records set up with an enforcement policy

More companies than ever are adopting new email security methods, like DMARC, but few actually put them to full use. Security company Vailmail released the Summer 2019 Email Fraud Landscape report on Tuesday highlighting recent efforts by enterprises to protect email accounts from cyberthreats.  The report mostly focuses on the adoption rate of Domain-based Message Authentication, Reporting and Conformance (DMARC), a system that allows email domain owners to protect their domain from…

October 8, 2019
Read More >>