Western Digital Cyber Attack a ‘Wake Up Call for ASIC Vendors’

Update: In a statement on the extent of the data breach disclosed last month, Western Digital said it has control of its digital certificate infrastructure and is “equipped to revoke certificates as needed.” “Regarding reports of the potential to fraudulently use digital signing technology allegedly attributed to Western Digital in consumer products, we can confirm […]

The post Western Digital Cyber Attack a ‘Wake Up Call for ASIC Vendors’ appeared first on eSecurityPlanet.

April 15, 2023
Read More >>

Windows CLFS Vulnerability Used for Ransomware Attacks

Microsoft’s Patch Tuesday for April 2023 targets 97 vulnerabilities, seven of them rated critical – as well as one that’s currently being exploited in the wild. The one flaw that’s currently being exploited, CVE-2023-28252, is an elevation of privilege vulnerability in the Windows Common Log File System (CLFS) Driver that could provide an attacker with […]

The post Windows CLFS Vulnerability Used for Ransomware Attacks appeared first on eSecurityPlanet.

April 12, 2023
Read More >>

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes the healthcare industry a prime target for cybercriminals. While there is no doubt that healthcare service […]

The post Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe? appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

April 11, 2023
Read More >>

#IdentityManagementDay – Best Practices to Help Keep Your Organization Secure

By Chinatu Uzuegbu, CISSP, CEO/Managing Cyber Security Consultant at RoseTech CyberCrime Solutions Ltd. We kicked off the Identity and Access Management Processes from the Top-Level Management approach. The Identity and Access Management Security Steering Committee is a group of C-Suites leaders, also referred to as the respective Data and Asset Owners from the various Business Units of my organization. The group met and established the governing policy around the Identity and Access Management Processes. The governance covers the Mandatory Access Control Policy and Trust Policy of the organization which are automatically enforced as the baselines on default. The governance of…

April 11, 2023
Read More >>

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

Kali Linux turns 10 this year, and to celebrate, the Linux penetration testing distribution has added defensive security tools to its arsenal of open-source security tools. It remains to be seen if Kali Purple will do for defensive open source security tools what Kali Linux has done for open source pentesting, but the addition of […]

The post Kali Linux Penetration Testing Tutorial: Step-By-Step Process appeared first on eSecurity Planet.

April 8, 2023
Read More >>

What Is a DMZ Network? Definition, Architecture & Benefits

A DMZ network, or a demilitarized zone, is a subnetwork in an enterprise networking environment that contains public-facing resources — such as web servers for company websites — in order to isolate them from an enterprise’s private local area network (LAN). Also referred to as a perimeter network or screened subnet, a DMZ network acts […]

The post What Is a DMZ Network? Definition, Architecture & Benefits appeared first on eSecurityPlanet.

April 7, 2023
Read More >>