Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lessons Learned from OT:ICEFALL - New Vulnerabilities and Insights on OT Security Design and Patching

In our final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure. The OT:ICEFALL research, including 61 vulnerabilities affecting 13 vendors, has yielded three key insights into the current state of OT product security.

How Architects and Engineers Can Gain Faster Access to Newforma Content with Egnyte

Architects and engineers know that success depends on getting the right information to the right people at the right time. And when it comes to projects, having access to essential digital content from Newforma makes all the difference; but getting that content into a unified platform is critical.

Essen Health Care Gets Breached and Loses Patient and Employee Data

Essen Health Care is a massive healthcare network of facilities and providers throughout New York City, Staten Island, and Westchester County. With more than 300 providers at a range of facilities connected to Essen Health Care, the organization maintains and stores a huge amount of medical and personal data for patients, providers, faculty, and more. All this data is protected by security features, but it was exposed in a recent breach.

8 Attack Surface Management Advantages for Security Teams

In the digital era, managing your attack surface – the sum total of all potential attack vectors in your systems – is a critical part of your cybersecurity strategy. Attack Surface Management (ASM) provides the insights and tools necessary to understand, assess, prioritize and remediate risks faster and more effectively. In this post, we’re going to explore eight key ASM advantages for security teams, and the key product capabilities needed to achieve them.

5 Best Practices to Achieve a Trusted Wireless Environment

Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.

New Social Engineering Tactic Uses PDFs in Business Email Compromise Attacks

Legitimate services can be exploited in social engineering, including business email compromise (BEC) attacks. Researchers at Check Point describe one current BEC campaign that’s using Soda PDF to send messages encouraging the recipients to call a phone number. Should they make the call, the bad actor on the line seeks to winkle them out of their cash. Check Point calls these kinds of attempts, which “leverage legitimate services to send out malicious material,” BEC 3.0.

KnowBe4's 2023 Phishing By Industry Benchmarking Report Reveals that 33.2% of Untrained End Users Will Fail a Phishing Test

Cybercriminals still know that the easiest way to successfully infiltrate an organization is through its people. While organizations continue evaluating and investing in their technology-based security layer, the human layer continues to be the most enticing and vulnerable attack vector. This marks the sixth consecutive year that KnowBe4 has analyzed hundreds of millions of data points in order to provide our annual Phishing by Industry Benchmark Report.

How to Protect Your Sensitive Information: A Guide to Keeping You Safe Online

Have you or someone you know been a victim of a breach of your privacy? Would you know if you did? The majority of people tend not to worry about breaches in their privacy until it’s too late. By this point, your confidential information may already be in the wrong hands. Not to worry, though; this article will equip you with the tools to construct your own personal shield, which will defend you against the possible ways in which your data may be used to directly cause you or your business harm.

Safely Enable ChatGPT and Other Generative AI Applications-In One Move!

At Netskope, we’ve talked a lot lately about how to safely enable ChatGPT and other generative AI applications such as Google Bard and Jasper. Why? As the saying goes, “There’s no going back.” Generative AI is here to stay and will have a transformative effect on our day-to-day lives whether we’re in technology or not.

5 Best Practices for Building a Cyber Incident Response Plan

You’ve probably heard the Boy Scout motto, “be prepared.” In his 1908 handbook, Scouting for Boys, the author explained, “it shows you how you must be prepared for what is possible, not only what is probable.” Your cyber incident response plan is how you prepare for a possible, and, also in today’s world, probable security incident or data breach. Unfortunately, since every organization is different, no single plan will work for everyone.