Article
URGENT: Endpoint Vulnerability Coming to a Boil – 2023 IT Security Predictions by Josh Aaron
This year, several trends are converging, making endpoint vulnerability one of the most urgent IT challenges organizations need to address. The temperature has been rising for years on this issue, and it is coming to a boil in 2023 in ways that are already making it a top priority all the way up to the boardroom. The sheer number ...
Application deployment dashboards are a security risk
Out-of-the-box application deployment dashboards only show what types of machines are in your environment and if your software application package was (or wasn’t) successfully deployed on various machines. Unless you're IT team has put in a ridiculous amount of time customizing your application deployment dashboard, they don’t answer the much harder question that IT security teams are left trying ...
Automate Microsoft Upgrades from Windows 7 to Windows 10
Starting on January 10th, 2023, Microsoft 365 will no longer provide any new updates or security patches for Windows 7 and 8.1. This means that these operating systems are exposed to greater vulnerabilities and will be less secure than ever. If you're still using either of these versions of Windows, now is the time to get moving and upgrade ...
Windows Autopatch + Aiden = IT Security Innovation
When Bill Gates started Microsoft, he had envisioned “a computer on every desk and in every home,” but I’m convinced he never imagined back then how hard it would become to keep every computer updated, patched, and free of software and firmware vulnerabilities. The innovation of computer networks and the Internet, coupled with rapid adoption of enterprise software, has made ...
The Path to Desired State Configuration: Where to Focus and Why
Managing devices has never been a simple task … and organizations’ adoption of “work from anywhere” policies are now making it that much harder for IT and security teams. As we settle into this new normal, organizations are working on better processes to manage computers, secure the modern enterprise, and elevate end-user experience. Once they reach (or at least ...
CloudFlare ID’s active exploits of newer log4j vulnerability
An estimated third of all the websites in the world run Apache server software and remain vulnerable to serious cybersecurity threats, according to cybersecurity experts at Cloudflare reviewing Apache’s log4j vulnerability. Researchers have logged attacks on 44% of all corporate networks globally using log4j, and signs that nation-state and other well-funded threat actors are doubling down on the opportunity to attack unpatched systems are ...
Why Software Patch Management Isn’t a Silver Bullet to Remediate Vulnerabilities
Software patching is an important part of remediating vulnerabilities … but patch management comes with plenty of challenges. This post covers why software patching is critical, the patching challenges organizations face, and how to fix them.
Bank of America Insider BEC Scam, FontOnLake Malware, New Findings About Ransomware Costs, Python-based ESXi Server Attack, Office365 Password Spraying
1. Bank of America employee charged with insider BEC scam A Bank of America employee and two other perpetrators were accused of money laundering, aggravated identity theft, and alleged involvement in Business Email Compromise (BEC) scams. The three actors targeted small and large companies across the globe, but mainly in the United States. By using phishing techniques and deploying malware, the threat ...
3 Reasons to Run a Tabletop Exercise To Determine Your IT Budget
Who knew that creating an IT budget for the upcoming year would require a crystal ball? In these unpredictable times, planning an IT budget is challenging at best. Your organization likely isn’t going back to “normal” anytime soon. Between remote work and an increase in crafty cybersecurity attacks, creating an IT budget is daunting when you don’t know what curveballs ...
Malware Samples Target Windows OS from Linux Subsystem, New Findings About Cloud-Based Attacks, AUKUS Pact, U.S. Hacking on Behalf of UAE, Master Decryptor for REvil Victims
1. Malware samples target Windows operating systems from its Linux subsystem Security researchers discovered a strain of malware samples developed to compromise the Windows subsystem in Linux and then laterally move to the native Windows enclave. Threat actors created the malware samples using Python code. They run on Debian systems and have a low detection rate for traditional security controls. The malware developers packaged the samples in ...
Ransomware Gang Threatens to Leak Stolen Data, REvil Back in Action, New Zero-Day Attack in Microsoft Office, Atlassian Confluence Exploit, Fortinet VPN Password Leak
1. Ransomware gang threatens to leak stolen data if victims contact law enforcement During a ransomware attack, one of the most notorious ransomware groups, Ragnar Locker, threatened to leak complete data of victims who seek help from law enforcement agencies, including the Federal Bureau of Investigation (FBI). The ransomware group claims that incident investigators and recovery experts often collaborate with ...
Turn to Microsoft Endpoint Manager to Save Your Company
Remote Monitoring and Management systems (RMMs), like Kaseya, SolarWinds, ConnectWise Automate, and NinjaRMM, are useful for maintaining control over your IT systems until, of course, they become the vector through which your IT systems are destroyed. Last month, attackers associated with REvil--a Russian ransomware-as-a-service (RaaS) group--breached a large Florida-based RMM company called Kaseya. It was, short of SolarWinds, possibly the ...
Cybercriminal recruitment, House of Representatives Debate Cybersecurity, Attackers Sale Internet Bandwidth, Dropper-as-a-Service Attacks, Insight into the Conti ransomware
1. Cybercriminals Recruit English Speakers for Business Email Compromise Administrative and technical security controls have helped to reduce the effects of business email compromise (BEC). However, as a result, some BEC threat actors struggle to develop compelling phishing email messages for English corporate audiences. According to security researchers, said threat actors are now recruiting native English speakers in mass to ...
Banning Ransomware Payments, BlackMatter Hackers, Kubernetes Vulnerabilities, Kenetic Warfare, Windows 11 Malware
1. FBI Cautions Congress Against Banning Ransomware Payments Senior FBI officials advised the U.S. Congress not to mitigate ransomware threats by making ransom payments illegal. While the FBI cautioned organizations against sending ransomware payments to cybercriminals, the assistant director of the FBI (cyber division) argues that if Congress were to ban ransom payments, it could create opportunities for further extortion ...
Printer Vulnerability CVE-2021-3438, China Attacks Microsoft, Pulse Secure VPN Cyberattack, Pegasus Spyware Compromised, Kaseya Ransomware Decryption Key
1. A 16-year-old Printer Vulnerability CVE-2021-3438 (CVSS score: 8.8) Impacts Millions of Infrastructures A 16-year-old vulnerability was discovered in popular corporate printers that allow hackers to gain administrative rights to perform several activities on systems, including the ability to install rogue programs, view, change, encrypt or wipe data. This critical vulnerability is prevalent in HP, Samsung, and Xerox printer software, impacting ...
4 Reasons Why Ransomware Works
Putting everything else aside, there’s one thing you can’t deny about ransomware: It’s good business. After all, what would most businesses do for a 56% conversion rate? How about 56% on a $300,000 product? Ransomware, at least in the modern sense, is only about seven years old. Yet it’s already a multi-billion-dollar problem, for everyone other than the attackers ...
Double Ransomware Attacks, Carnival Cruise’s Data Breach, REvil Compromises U.S. Nuclear Weapons Contractor, CVS Gets Hacked, G7 Cracks Down On Russia
1. After Paying Off The First Ransomware Demand, Most Firms Face A Second Ransomware Attack Security experts discovered that ransomware attackers deploy secondary ransomware attacks against firms that pay off initial ransom demands. After paying off a ransom demand, firms often receive a decryptor for their hijacked systems. However, most attackers corrupt hijacked systems by creating backdoors that allow future ...
Antivirus Softwares Vulnerable to ‘Cut and Mouse’, JBS Foods Cyber-Attack, Ransomware Hinders Criminal Prosecutions, US Supreme Court Restricts CFAA, US Nuclear Bunker Secrets Discovered
1. Security researchers reveal stealthy techniques to bypass antivirus tools and ransomware defenses Security researchers discovered significant vulnerabilities in popular antivirus tools, which could be exploited to deactivate protective mechanisms to launch ransomware attacks and other malicious operations. According to said researchers, of the 29 antivirus tools evaluated, 14 were found susceptible to the 'Ghost Control' attack technique. In comparison, ...
3 Emerging Technologies For Achieving Zero Trust
(Zero) Trust What effect does trust have in cybersecurity? To understand, we might consider what happened in late March, 1999, when millions of people received emails from their friends, family and coworkers. In each case, the format was the same. Title: “Important Message from [Name of Sender].” Message: “Here is that document you asked for...don't show anyone else ;-)” ...
Colonial Pipeline ransomware attack fallout, President Biden’s executive cybersecurity order, triple extortion, Truist Bank spear-phishing campaign, AXA Insurance becomes victim
1. Congress introduced two bills in the wake of the Colonial Pipeline ransomware attack Following the recent ransomware attack against Colonial Pipeline, which caused gas shortages in several states, the U.S. Congress introduced two bipartisan bills designed to mitigate cybersecurity weaknesses across the nation’s critical infrastructure, including the oil and gas sector. The first congressional bill, the Pipeline Security Act, ...
5 Top Takeaways from the IT-Security Paradigm Shift Panel Discussion
Real-world advice on covering the fundamentals of IT security with upper management, and how automation and AI have a crucial role to play in reducing cybersecurity risk.
Hackers Target EDR Tools, Nuke Account Spouts Gibberish, Ransomware Labelled National Security Threat
Threat actors find ways against common endpoint security tools, US government classifies ransomware as a national security threat, an unattended government agency Twitter account that is responsible for US nuclear arsenal tweeted gibberish, a deluge of tools is actually making it harder for IT teams to assess their network's security and PHP’S ‘Git’ server compromised to add Backdoors to PHP source codes.
Less Than 25% of New IT Tools Meet Security Goals, Office365 Scams, New D/TLS, Purple Fox, REvil Hacks | aiden IT Security News
Survey finds IT teams are over-burdened with tools that don't fully meet security goals, financial phishing attacks imitate Office365 and researchers discover new D/TLS, Purple Fox, REvil ransomware hacks.
10 Benefits of IT Automation
Lighting fast compliance, robust vulnerability and patching management, and fewer IT support tickets are just a few of the benefits you can expect by empowering your IT teams with automation.
Kia Motors Hack, California DMV Data Breach, Morse Code Phishing Campaigns – Cybersecurity News and Trends
1. Kia Motors Suffers a Ransomware Attack, and a $20 million Ransom is Demanded The notorious ransomware gang, DoppelPaymer, has seized critical systems belonging to Kia Motors America. Thus, impacting business continuity within 800 dealerships; the integrity of critical data; and the company’s reputation. According to the attackers, to receive a decryptor and a return back to normalcy, Kia Motors ...
7 Ways Hackers Will Steal Your Data Using Advanced Automation
Hackers are using automation to outsmart anti-virus programs and hack into network systems at unprecedented speed and scale.
Poor Patching Put Businesses At Risk, China Has Stolen Your Data, SolarWinds Hack legal changes – Cybersecurity News and Trends
New data shows slow or ineffective software patching leads to more than a quarter of cybersecurity vulnerabilities, Evanina: Chinese government has stolen 80% of personally identifiable US consumer data, threat actors now targeting supercomputers, US federal, legal agencies told to file paper documents, and new ransomware encrypts virtual disks using VMWare vulnerabilities .
Security by Design: Advocating for a Security-first Software Paradigm
Making security a part of the software design process, using frameworks like Zero-Trust, is needed to counter today's cybersecurity threats.
NetWalker Ransomware, Volatile Cedar Cyberespionage, Windows 7 TCP/IP Hijacking, USCellular CRM Hacked, Trickbot Phishing Attacks – Cybersecurity News and Trends
International taskforce disables NetWalker, Windows 7 TCP/IP hijacks and Trickbot ransomware returns with added intelligence
5 Ways to Beat Sophisticated Threat Actors with Security Automation
The advancement in cybercrime tactics like the use of automation has left IT teams in the dust. Here are 5 ways that you can defend against them using security automation technology.
The 5 big wins every new CISO needs in the first 90 days
As of 2020, the average cost of a successful cyber breach is $3.9m – 12% up from last year. It’s not surprising that companies have high expectations when they hire a CISO. COVID-19 has introduced unique security challenges for the incoming CISO. Working from home has accelerated endpoint security risks. Many organizations face expanded cybersecurity attack surfaces due to bring-your-own-computer ...
SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks
Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc. Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, ...
Cybersecurity in 2020: Year End Review
The year 2020 definitely made its way into everyone’s ‘naughty list’ for different reasons. Of course, COVID-19 was the chief reason, but we shall highlight more reasons in this article. The world faced an overwhelming number of cybersecurity threats in 2020: ransomware attacks increased by 715%; business email compromises (BECs) and phishing exploits were more sophisticated than ever before; third party and state-sponsored supply ...
How Financial Organizations Can Recover From and Prepare for a Ransomware Attack
The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19 exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic. It's likely that your financial institution is already taking the threat of a ransomware attack seriously. But does your firm have ...
Computer Imaging is Dead.
Computer imaging is holding IT teams back from true digital transformation because it's resource heavy, inefficient and incomplete. Dynamic Windows Bare Metal Builds using intelligent packaging automation empowers IT teams to be more proactive.
How Intelligent Automation Drives Digital Transformation
Digital transformation with the help of intelligent automation is a necessary next step in driving business growth and helps to overcome transitional obstacles.
The Importance of Vulnerability Scanning in a WFH Environment
Vulnerability scanning in the new WFH environment has become more critical than ever in identifying weaknesses, but how can IT teams keep up?
Why a Vulnerability Scan is Not Enough.
A vulnerability scan is good for identifying weaknesses in your cybersecurity posture, but they're not the answer to securing your network...here's why.
Automation Beyond Belief!
Endpoint deployment and management is a constant IT headache, and it's an obvious target for automation. Until recently, automation for deployment and patch management has existed only for organizations privileged with the budget for technology and the highest levels of IT infrastructure engineering talent. Even those engineers only offer partial automation and struggle to keep pace with new technologies ...
How & Why Intelligent Automation Delivers Sustainable Cybersecurity
Adding intelligent automation like artificial intelligence & robotic process automation to your cybersecurity arsenal will help you to achieve sustained security across your technology environment.
Why Automating Cyber Hygiene is Key to Mitigating Risk
3 ways to maintain cyber hygiene and mitigate risk using automation in an ever-expanding virtual working environment, which isn't going anywhere any time soon.
The Seven Post-COVID-19 Healthcare IT Trends That Matter for CIOs
From remote work to vendor selection, these are the 7 post-covid healthcare IT trends that matter most for CIOs and technology leaders.
Get Updates Right In Your Inbox
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.