Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Weekly Cyber Security News 04/03/2022

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Well not a great time for NVIDIA, after being deprived of buying ARM, they have now been breached in what looks like hackers wanting GPU restraints removed for more efficient cryptocurrency mining.

10 Reasons Why Links are Better than Attachments

Even with the rise of messaging apps and other collaboration software, email remains the tool for business communications, both inside and outside the organization. And despite its enduring ubiquity, email still has its drawbacks, especially when it comes to sharing documents, PDFs, photos, and other types of content. The average person spends about 28% of their workday dealing with emails, sending and receiving more than 600 each week.

How to Protect Your Business from DDoS Attacks

If a couple of years ago Distributed Denial of Service attacks (DDoS) were just a nuisance for businesses, today they constitute serious, costly cybercrime. Equally, if not more alarming, is the use of cybercriminals as surrogates in state-to-state political conflicts. The tools for launching these attacks are easily available online. They are so simple and cheap to use that even amateur citizen fraudsters and kids can commit a financial crime.

Be On Alert: Steps to Take Ahead of Possible Cyber Attacks

Netskope is keeping a close watch on the rapidly changing situation in Ukraine. Along with the attention we are giving to the safety and well-being of Netskope employees in the region, we are in a state of high alert with respect to cyber threats and risks to our customers. Netskope Threat Labs is continuously monitoring cybersecurity threats related to the conflict in Ukraine.

15 Minute Friday: How a Leading University Hospital Health System Secures Patient Data with Lookout

Hear a use case of how a leading university hospital secures patient data through its journey to the cloud. In addition to cloud protection, needs quickly were realized for cloud DLP and EDRM to fully secure and keep sensitive data safe and HIPAA compliant in the cloud. In this 15 minute session, we will dive into the problem faced and how it was solved. No sales pitches, no demos, just solutions.

Strategies For Vendor Third Party Risk Management

Vendor Third-Party Risk Management is an essential part of most regulatory and compliance programs. Tracking and monitoring vendor risk are important as it helps businesses make critical business decisions and mitigate risk from time to time. As organizations mostly outsource some parts of their operations to vendors or third-party service providers, it has become mandatory in certain standards and regulations to establish Vendor third-party risk management as a part of the compliance process.

How to Protect From Potential Cyber Threats Stemming From Russian/Ukrainian Crisis

The following organizations should raise their INFOCON levels and be prepared for cyber-attacks because of this conflict: Our threat intelligence teams continue to enhance Obrela’s technology with new threat intel information as soon as it becomes available. We are conducting threat hunting activities to proactively detect and respond to emerging threats.

Dark Web Insights: Evolving Cyber Tactics Aim to Impact the Russia-Ukraine Conflict

The Russia-Ukraine conflict currently is ongoing and continues to escalate. Trustwave is on heightened alert, and we are actively monitoring malicious cyber activity associated with and adjacent to the conflict between Russia and Ukraine.

Staying safe online when you live off-grid

Over 250,000 people in the US live off the grid, meaning they do not rely on public utilities such as electricity and water. Their aim is generally to live more independently and self-sufficiently, rely on solar or other eco-friendly technologies, and build a stronger connection with nature. However, most people who choose this lifestyle are very much reliant on the Internet.