SecurityWeek Briefing

 The History and Evolution of Zero Trust.

Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.

Accessed on 11 July 2022, 2212 UTC.

Content supplied by ""


Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts (machine learning, artificial intelligence, IoT, and information security)

 Your SecurityWeek BriefingWebcasts
RSS Feed

Monday, July 11, 2022, 2022

ICS Cyber Security Conference

SecurityWeek’s ICS Cyber Security Conference

The Hub for Industrial Cybersecurity

October 25-27, 2022 | Atlanta

Register Now

As Cybercriminals Recycle Ransomware, They're Getting Faster
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Read the Full Column
 by Derek Manky

Is an Infrastructure War on the Horizon?
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Read the Full Column
 by Gordon Lawson

RSAC22 and Infosecurity Europe, Three Weeks, Two Events
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Read the Full Column
 by Laurence Pitt

Cyber-Physical Security: Benchmarking to Advance Your Journey
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Read the Full Column
 by Galina Antova

Security Orchestration: Beware of the Hidden Financial Costs
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
Read the Full Column
 by Marc Solomon

ICS Cyber Security Conference

SecurityWeek’s ICS Cyber Security Conference

Join ICS users, ICS vendors, system security providers and government representatives to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

October 25-27, 2022

Register Now

See All Recent Articles at SecurityWeek.Com
ICS Conference

The History and Evolution of Zero Trust: The concept of Zero Trust, coined by Forrester’s John Kindervag in 2010, has evolved over the years and is now a collective adjective. Read the Feature

Microsoft Confirms Temporary Rollback of Macro Blocking Feature: Microsoft has temporarily rolled back the new default behavior in Office that made it more difficult for users to enable macros. Read More

'Raspberry Robin' Windows Worm Abuses QNAP Devices: Spreading via removable drives or ISO files, the malware uses LNK shortcuts containing Windows shell commands as lures. Read More

Associated Eye Care Discloses Impact From 2020 Netgain Ransomware Attack: The Montana-based company has started informing patients that their data was accessed without authorization during a November 2020 ransomware attack on Netgain. Read More

CEO Accused of Making Millions via Sale of Fake Cisco Devices: A man has been arrested and charged for allegedly making millions of dollars through a scheme that involved the sale of fake Cisco devices from China. Read More

Free Decryptors Released for AstraLocker Ransomware: Emsisoft has released free decryptors for the AstraLocker ransomware variants to help victims recover data. Read More

Musk Ditches Twitter Deal, Triggering Defiant Response: Elon Musk pulled the plug on his $44 billion deal to buy Twitter, accusing the social media giant of "misleading" statements about the number of fake accounts, a regulatory filing showed. Read More

Cisco Patches Critical Vulnerability in Enterprise Communication Solutions: A critical vulnerability in Cisco Expressway devices and TelePresence Video Communication Server (VCS) could allow an attacker to overwrite files on the operating system with root privileges. Read More

New 'HavanaCrypt' Ransomware Distributed as Fake Google Software Update: Deployed as a fake Google Software Update application, the new ransomware family uses a Microsoft web hosting service IP address for command and control. Read More

Fortinet Patches High-Severity Vulnerabilities in Several Products: Fortinet published security advisories this week to inform customers about vulnerabilities affecting several of the company’s products. Read More

Election Officials Face Security Challenges Before Midterms: Election officials preparing for the upcoming midterms face a myriad of threats, both foreign and domestic, as they look to protect voting systems and run a smooth election while fighting a wave of misinformation. Read More

10 Vulnerabilities Found in Widely Used Robustel Industrial Routers: Cisco Talos researchers have uncovered several critical command injection vulnerabilities in industrial cellular routers from Robustel. Read More

ICS Conference

To help make sure the SecurityWeek Briefing reaches you, please add to your address book.

© 2022 Wired Business Media


Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.