The Latest in IT Security

Posts Tagged ‘risk management’

The U.S. Cybersecurity and Infrastructure and Security Agency is urging healthcare sector entities to take critical steps in fortifying their environments based on findings from a two-week risk and vulnerability assessment performed by the federal agency on a medical organization earlier this year. In a Friday advisory, CISA said it had performed the assessment in […]

Read more ...

North Korean hacking group Lazarus Group is exploiting Log4Shell to target manufacturing, agriculture and physical security sectors, resulting in the deployment of a tailored implant on compromised systems. This attack campaign targeted publicly accessible VMware Horizon servers, leveraging the Log4Shell vulnerability tracked as CVE-2021-44228 for initial access, Cisco Talos researchers found. Read More

Read more ...

An employee who used an app to escalate privileges in a bid to download a torrent client onto a work computer. A programmer who ran code from GitHub and ransomed his own machine. An internal user who tried to troubleshoot a Linux host machine rather than going to IT – and used a local privilege […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments