15 Jul

How Threat Detection and Response Technologies Are Integrating

Threat detection and response is difficult and only getting more complicated. According to ESG research, 76% of cybersecurity professionals claim that threat detection and response is more difficult today than it was 2 years ago, so this situation may only get worse in the future.

read more

Share this
08 Jul

Keep Your WordPress Website Secure in Cyber Space

WordPress itself is designed to keep your website safe, but there is always more you can do to protect it yourself and your livelihood. The minute you let it slip your mind, you are compromising your online presence.

read more

Share this
01 Jul

Security Weakness Found in VPN Clients

An alert from the Carnegie Mellon University CERT Coordination Center (CERT/CC) has warned that numerous enterprise VPN clients could be vulnerable to a potentially serious security weakness that could be used to spoof access by replaying a user’s session.

read more

Share this
24 Jun

AI & Cyber Security: Which Protects Which?

For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses. The question remains – which protects which?

read more

Share this
27 May

Artificial Intelligence: Cybersecurity Threat or Solution?

Companies are in a cybersecurity arms race. Attackers have easy access to more tools as the lines between state actors and criminal gangs fade. Malware and identity theft kits are easy to find and inexpensive to buy on dark web exchanges. AI-enabled attack kits are on the way, and we can expect that they will be readily available at commodity prices in the next few years.

read more

Share this
20 May

Malware in Open Source Software

Open Source software is always trustworthy, right? Last year, Bertus broke a story about a malicious Python package called “Colourama”. When used, it secretly installs a VBscript that watches the system clipboard for a Bitcoin address and replaces that address with a hardcoded one. Essentially this plugin attempts to redirects Bitcoin payments to whoever wrote the “colourama” library.

read more

Share this
13 May

Cyber Threats Are Lurking in Your Backups

It’s no surprise that spending on security technology continues to soar. Nevertheless, data breaches and cyber attacks make headlines at an incredible rate, with no relief in sight. The Online Trust Alliance reported that attacks in 2017 came from a myriad of vectors, such as phishing and ransomware, and that the number of attacks doubled to nearly 160,000 incidents per year over 2016. What’s worse, estimates for the number of unreported attacks exceed 350,000 annually.

read more

Share this
06 May

Insider Threats: 7 Warning Signs

Insider threats are becoming ever-increasing and money-consuming, so it’s essential for companies to be as informed about which employees are prone to such excesses and why, as well as what kind of data they target and how. To that effect, paying attention to unusual behavior is of the utmost importance for keeping your company and all the sensitive data safe. Take a look at the warning signs that an insider might become a threat.

read more

Share this

© 2017 Awontis. All rights reserved.