Leveraging UEBA Capabilities in Your Existing SIEM
User and entity behavior analytics (UEBA) uses advanced analytics to track and flag suspicious behaviors of both users and assets, such as networked assets, sensors, databases, devices, and hosts. There are many reasons why UEBA is gaining traction as both an integrated tool with SIEM as well as a standalone solution. A few include: Increasing […] more…A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar with the field, you’d be hard pressed to find a better phrase than “zero-day threat.” It’s catchy, it hints at clandestine activity, and it’s taken advantage of vulnerabilities found with the systems of a large health organization and […] more…Continuous IT audits are needed to combat today’s cyber threats
We find that many IT departments within our clients’ organizations have very talented IT staff, but all too often they don’t have an information security and compliance staff member on board. All too often this role is not in place. So the question is, how can they meet compliance and maintain security of their vital […] more…Saks self-leaked customer data unencrypted, violating multiple rules
With so many retailers being impacted by cyber attacks, it’s easy to conclude that thieves are necessary for data breaches. Not necessarily. Saks last week made clear that it can breach itself quite efficiently. That revelation comes courtesy of Buzzfeed News, which visited the site and noticed private data about quite a few fellow site visitors […] more…Currency and Performance Drive Multinational Conglomerate’s Migration to McAfee ENS
“Maintaining currency is one of our new driving forces,” says Dwayne Cyr, senior cyber security manager at Textron, a $13.4 billion aerospace, defense, and advanced technologies conglomerate that employs over 35,000 people worldwide. Textron is working diligently to stay ahead of cyber threats as well as provide a more leading-edge experience for its end users. For […] more…How to keep ransomware from human resources
Ransomware is not your friend. It’s lurking out there to take over your computer and business systems to extort money from you. Keeping this wolf from your door takes some doing. The sneak attacks come attached to emails. When opened, these attachments infect your computer and lock it up until you pay the ransom demanded. […] more…Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low. Here’s Why
A lot of people love to play poker for the thrill and entertainment of sheer luck. For some, however, it’s more of a game of skill. One where you can discern the intent of your competitors by reading their faces and tics and betting on whether they have the cards they say they do. It […] more…Update: Technical McAfee Detail On DoubleAgent
By Cedric Cochin, Brook Schoenfield Updated March 29, 2017 Intel Security / McAfee has been investigating the impact of the so-called “DoubleAgent zero-day” technique of Windows debugging capabilities announced on 22 March 2017. This injection technique uses a Microsoft Windows debugging feature that requires administrative privileges. On the fly debugging is designed to be used […] more…Let the Great McAfee ENS 10.5 Migration Begin!
Since I started writing blogs last year, I’ve experienced some great interaction from the partner community – your perspectives, comments, questions, etc. It’s been a great way to connect with many of you. Over the next few weeks, starting today, I have some pretty big things on my mind that I want to share. ENS […] more…Acoustic attack lets hackers control smartphone sensor
A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker – chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University […] more…Widening Threat Surface and Security Gaps
Digital transformation, the rise of mobile banking, ongoing migration of core banking services to the cloud and a shift towards an omni-banking model have all contributed to an overall wider threat landscape for financial institutions to monitor and manage. This is further exacerbated by the fact that financial institutions operate in a highly complex and interconnected […] more…Trust Under Fire: How to Help Your Kids Understand Trust in a Digital World
Just about everything comes down to trust, especially in a hyper-connected, share-happy digital culture. We pay strangers to Uber us, we Airbnb our vacations, we eBay our purchases, Venmo money to friends, and eHarmony our soul mates. It’s efficient, brilliant, and dicey all at the same time. This social landscape presents parents with a mound […] more…These Cute Teddy Bears Have Been Recording Your Kids
When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might think of enterprises and large organizations as victims of cyberattacks, but actors are moving their target to the home. Living with three kids, I try to make my home––and my […] more…7 best practices for securing your cloud service
As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security. Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which […] more…Technical McAfee Detail On DoubleAgent
Intel Security / McAfee has been investigating the impact of the so-called, “DoubleAgent zero-day”, technique of Windows debugging capabilities announced on 22 March 2017. This injection technique uses a Microsoft Windows debugging feature that requires administrative privileges. On the fly debugging is designed to be used with all Microsoft Windows executables. It is not specific […] more…Report says smart people do dumb things online
People who identified themselves in a survey as “tech savvy” were 18 percent more likely to be victims of online identity theft. In addition, those who said they had Ph.Ds were more frequently victims than high school graduates. These were some of the interesting findings of online training company CBT Nuggets in a survey of […] more…More information
- Exploitation Attempts Target New MOVEit Transfer Vulnerability
- protected.personal.psu.edu and virtualhost.aset.psu.edu to be uptdated May 31 – Jun 1
- University breaks silence on FBI payments to bring Tor users out of the shadows
- School rule-breakers to hand over Facebook and Twitter passwords
- California business scores settlement in thorny cybercrime case
- Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers
- Vulnerability Patched in Android Possibly Exploited by Forensic Tools
- What sensitive data is lurking on your old SD card?
- ABB Relion 670 Series CVE-2019-18253 Directory Traversal Vulnerability
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections