Laden...
January 20, 2019
A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix. Read more â¶
Rocke coinminer disables cloud protection agents
I can get and crack your password hashes from email
Building your forensic analysis toolset
Why AI-based threat detection hasnât taken over the market ⦠yet
How to enable audit logs in Microsoft Office 365
New CISO appointments, January 2019
A transformation to a more globally dispersed, flexible and remote workforce is happeningâin some companies more rapidly than others. Read more â¶
Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection. Read more â¶
FROM OUR BUSINESS PARTNERS
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more â¶
Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash â just by sending you an email. Take these steps to test for the vulnerability. Read more â¶
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more â¶
Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more â¶
Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more â¶
Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more â¶
Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more â¶
© 2024