Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
The patches released by Linux distributions for the GRUB2 vulnerability dubbed BootHole (CVE-2020-10713) are causing many systems to become unbootable. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]
Red Hat has told customers not to install the package updates released in response to the BootHole vulnerability after users reported that their systems hung after applying the updates. [Read More]
The FBI has released an alert to warn businesses of ongoing cyberattacks involving the NetWalker ransomware. [Read More]
Companies affected by the BootHole vulnerability in the GRUB2 bootloader have started issuing advisories. [Read More]
Computer networks of Garmin were coming back online Monday after an outage widely believed to have been due to a ransomware attack. [Read More]
Computer networks of smartwatch and electronics firm Garmin were offline July 24 in an incident which raised concerns of a ransomware attack affecting both its aviation and fitness app services. [Read More]
Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack. [Read More]
A genealogy website used to catch one of California’s most wanted serial killers remained shut down Thursday after a security breach exposed the DNA profiles of more than a million people to law enforcement agencies. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.
Preston Hogue's picture
The healthcare industry will need advanced security measures to identify and mitigate flaws in new apps carrying the world’s most sensitive, regulated information.
Marc Solomon's picture
The LEAD threat intelligence framework is a perfect example of the symbiosis between technology and people to strengthen security posture.
Gunter Ollmann's picture
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.