February 21, 2019
WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more â¶
Are zero-day exploits the new norm?
The cybersecurity legislation agenda: 5 areas to watch
North Korean hackers target Russian-based companies
How much does it cost to launch a cyberattack?
Review: SlashNext is like shooting phish in a barrel
How to update Windows 10 for side channel vulnerability fixes
Read your guide to prevent breaches from attackers with stolen credentials and ways around 2FA. The more you know about users, the more confidently you can remove authentication disruptions. Read more â¶
Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more â¶
FROM OUR BUSINESS PARTNERS
Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more â¶
The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Hereâs the list. Read more â¶
The North Korean Lazarus APT group is going after the Russians. Russian hackers, however, needed less than 20 minutes in 2018 to completely pwn an organization. Read more â¶
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more â¶
SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more â¶
Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more â¶
This paper explores how you can actually increase security and make users more productive by removing them. Read more â¶