Cybersecurity
3 Key Takeaways from the 2023 ElevateIT Dallas Closing Keynote
At ElevateIT in Dallas on Wednesday, June 7th, Joshua Aaron- Aiden CEO, moderated the closing keynote panel on Cybercrime, Nation-States, and the Emerging Threat Landscape for guest speakers John Kindervag, Founder of Zero Trust, Stefan Hare Network Intrusion Forensic Analyst, U.S. Secret Service, and Joshua Jacobs, Special Agent, FBI Cyber, Dallas. They discussed various issues, including the increasing levels ...
URGENT: Endpoint Vulnerability Coming to a Boil – 2023 IT Security Predictions by Josh Aaron
This year, several trends are converging, making endpoint vulnerability one of the most urgent IT challenges organizations need to address. The temperature has been rising for years on this issue, and it is coming to a boil in 2023 in ways that are already making it a top priority all the way up to the boardroom. The sheer number ...
Why Software Patch Management Isn’t a Silver Bullet to Remediate Vulnerabilities
Software patching is an important part of remediating vulnerabilities … but patch management comes with plenty of challenges. This post covers why software patching is critical, the patching challenges organizations face, and how to fix them.
Aiden is Now Part of Microsoft for Startups
Today, we have some exciting (and different) news to share. Aiden is now part of the Microsoft for Startups community. What is Microsoft for Startups? Microsoft for Startups is a global program dedicated to helping startups with Microsoft-based technologies scale. Each year, Microsoft selects 200 startups to be part of their program with a rigorous selection process. To be accepted, startups have ...
3 Reasons to Run a Tabletop Exercise To Determine Your IT Budget
Who knew that creating an IT budget for the upcoming year would require a crystal ball? In these unpredictable times, planning an IT budget is challenging at best. Your organization likely isn’t going back to “normal” anytime soon. Between remote work and an increase in crafty cybersecurity attacks, creating an IT budget is daunting when you don’t know what curveballs ...
The Kaseya Ransomware Attack SME Breakdown, DOD Data Left Unprotected, Morgan Stanley Data Breach & Email Exploitation
1. Kaseya Ransomware Attackers Demand A $70 Million Ransom An affiliate of the notorious REvil ransomware gang compromised Kaseya’s virtual systems administrator (VSA) software. The Russian-linked attackers compromised the backend architecture of the IT infrastructure management tool. They used its notification capability to send a malicious update to VSA servers running on client environments. Thus, installing a ransomware code onto ...
4 Reasons Why Ransomware Works
Putting everything else aside, there’s one thing you can’t deny about ransomware: It’s good business. After all, what would most businesses do for a 56% conversion rate? How about 56% on a $300,000 product? Ransomware, at least in the modern sense, is only about seven years old. Yet it’s already a multi-billion-dollar problem, for everyone other than the attackers ...
Chinese Threat Actors Target NY MTA, Surge in Brokerage Account Hacks, Fake Encrypted Chat Platform Anom Lures Criminals, Ransomware Attacks Prioritized as Terrorism
1. Chinese Threat Actors Target New York’s MTA Chinese-sponsored threat actors leveraged Pulse Secure vulnerabilities to compromise systems belonging to the New York Metropolitan Transportation Authority (MTA). It is unclear why state-sponsored actors targeted the MTA. Still, security experts investigating the case speculate that China may be trying to obtain sensitive information on U.S. transit networks to gain an advantage ...
3 Emerging Technologies For Achieving Zero Trust
(Zero) Trust What effect does trust have in cybersecurity? To understand, we might consider what happened in late March, 1999, when millions of people received emails from their friends, family and coworkers. In each case, the format was the same. Title: “Important Message from [Name of Sender].” Message: “Here is that document you asked for...don't show anyone else ;-)” ...
Ransomed Companies = Ransomed Customers, Unpatched Cyber Infrastructure Targeted Worldwide and Rust Leaks
Cring ransomware targets customers of hacked companies, Fortinet vulnerabilities expose US cyber operations, Rust leaks data & EU commission hacked
Hackers Target EDR Tools, Nuke Account Spouts Gibberish, Ransomware Labelled National Security Threat
Threat actors find ways against common endpoint security tools, US government classifies ransomware as a national security threat, an unattended government agency Twitter account that is responsible for US nuclear arsenal tweeted gibberish, a deluge of tools is actually making it harder for IT teams to assess their network's security and PHP’S ‘Git’ server compromised to add Backdoors to PHP source codes.
Less Than 25% of New IT Tools Meet Security Goals, Office365 Scams, New D/TLS, Purple Fox, REvil Hacks | aiden IT Security News
Survey finds IT teams are over-burdened with tools that don't fully meet security goals, financial phishing attacks imitate Office365 and researchers discover new D/TLS, Purple Fox, REvil ransomware hacks.
US Gov. Using Outdated Android OS, Ransomware Demands Increase, Malware Detection Falls Short, Microsoft Teams and Sharepoint Bug, Pictures Steal CC Data | aiden IT Security News
1. 99.2% of U.S. Government Android Users Are Using Outdated OS Versions Out of the 200 million+ mobile devices being used by local, state, and federal government employees, a majority of said devices run on Android operating systems (OS). Shockingly, only 0.08% of those devices are operating on the newest version of said OS, which exposes those critical devices to ...
Cyber Threat Act, Infamous Financial Hackers Return, EBA Targeted in Exchange Hack | aiden IT Security News
Proposed US Cyber Threat Act would allow Americans to sue foreign states for damages stemming from cyberattacks, infamous financial hackers FIN8 return with new tools , European Banking Authority targeted in Microsoft Exchange hack, Tesla and several other companies have security cameras hacked and suspected state-sponsored threats from China target Linux systems with new malware.
Microsoft Exchange Hack: Biden Launches Emergency Task Force
Biden administration launches emergency task force as latest wide-ranging Microsoft Exchange hack taxes cybersecurity resources still recovering from last year's SolarWinds attack.
Federal Patch Order for Microsoft Exchange, Investment Firms Newly Scammed, Ryuk Ransomware Spreads Laterally – Cybersecurity News
US Dept. of Homeland Security issues patch order to any federal agencies using Microsoft Exchange, fake "capital call" emails target investors and investment firms, Ryuk ransomware adapts to move laterally through Windows LAN devices, Mobile adware campaigns targeting online banking and crypto-currency wallets sees expansive growth and threat actors game Google's SEO to prioritize payload distribution from fake sites.
Unpatched Jail Software Forgets to Release Prisoners, Sequoia Venture Capital Hacked, Ransomware Strikes Aerospace Vendor – IT Security News and Trends
Major venture capital firm Sequoia fell victim to a targeted phishing campaign. Non-violent prisoners were kept after their scheduled release dates in Arizona due to a bug in custom software that failed to update prisoner records accurately. CLOP ransomware gang struck Bombardier, shadow attacks dupe PDF anti-tampering security and NGINX misconfigurations lead to website attacks.
7 Ways Hackers Will Steal Your Data Using Advanced Automation
Hackers are using automation to outsmart anti-virus programs and hack into network systems at unprecedented speed and scale.
Security by Design: Advocating for a Security-first Software Paradigm
Making security a part of the software design process, using frameworks like Zero-Trust, is needed to counter today's cybersecurity threats.
NetWalker Ransomware, Volatile Cedar Cyberespionage, Windows 7 TCP/IP Hijacking, USCellular CRM Hacked, Trickbot Phishing Attacks – Cybersecurity News and Trends
International taskforce disables NetWalker, Windows 7 TCP/IP hijacks and Trickbot ransomware returns with added intelligence
DDoS Attacks Hijack Windows RDP, SonicWall, 7-Zip, Google Forms, Airline Data Stolen– Cybersecurity News and Trends
As the cybersecurity industry is still dealing with the fallout of the SolarWinds hack, more discoveries were made this week about its scope and vectors of attack. Significant exploits of popular software (Google Forms) and network-level hardware (SonicWall) also came to light.
Linux Under Cyberattack, New Phishing Attacks, MFA Pass The Cookie Hack – Cybersecurity News and Trends
File-less malware used in linux cyberattack, phishing attacks use remotely hosted images to bypass email filters, MFA PassTheCookie Hack among other cybersecurity news
5 Ways to Beat Sophisticated Threat Actors with Security Automation
The advancement in cybercrime tactics like the use of automation has left IT teams in the dust. Here are 5 ways that you can defend against them using security automation technology.
The 5 big wins every new CISO needs in the first 90 days
As of 2020, the average cost of a successful cyber breach is $3.9m – 12% up from last year. It’s not surprising that companies have high expectations when they hire a CISO. COVID-19 has introduced unique security challenges for the incoming CISO. Working from home has accelerated endpoint security risks. Many organizations face expanded cybersecurity attack surfaces due to bring-your-own-computer ...
SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks
Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc. Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, ...
Cybersecurity in 2020: Year End Review
The year 2020 definitely made its way into everyone’s ‘naughty list’ for different reasons. Of course, COVID-19 was the chief reason, but we shall highlight more reasons in this article. The world faced an overwhelming number of cybersecurity threats in 2020: ransomware attacks increased by 715%; business email compromises (BECs) and phishing exploits were more sophisticated than ever before; third party and state-sponsored supply ...
Our Response to the SolarWinds Hack – A Global Cyber Pledge
Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in ...
How Financial Organizations Can Recover From and Prepare for a Ransomware Attack
The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19 exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic. It's likely that your financial institution is already taking the threat of a ransomware attack seriously. But does your firm have ...
Was the SolarWinds Hack Preventable?
The scope of the SolarWinds hack continues to expand as SolarWinds has updated their security advisory to show that more versions of the company’s Orion server software were impacted by the vulnerability than was previously thought. Furthermore, the Department of Homeland Security issued an emergency directive about the endpoint security breach telling federal agencies to shut down their servers until further notice. SolarWinds provides network administration, monitoring, ...
The Importance of Vulnerability Scanning in a WFH Environment
Vulnerability scanning in the new WFH environment has become more critical than ever in identifying weaknesses, but how can IT teams keep up?
How & Why Intelligent Automation Delivers Sustainable Cybersecurity
Adding intelligent automation like artificial intelligence & robotic process automation to your cybersecurity arsenal will help you to achieve sustained security across your technology environment.
Why Automating Cyber Hygiene is Key to Mitigating Risk
3 ways to maintain cyber hygiene and mitigate risk using automation in an ever-expanding virtual working environment, which isn't going anywhere any time soon.
Get Updates Right In Your Inbox
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.