Guest Post – Cybersecurity Trends to Know in 2019

Here’s a contribution from Orla Forrest at Irish cloud services provider Paradyn.


In this guide, we examine some emerging innovations that are helping organisations to bolster their security in 2019.

In 2019, organisations are facing an ever-growing range of cyber-threats. In fact, according to a 2018 study from Bromium, the cybercrime economy was estimated to be worth $1.5 trillion. As ...

Continue Reading →
0

Android OS Set Top Boxes Target of Botnet

A new botnet known as “Ares” is targeting misconfigured set top boxes that run the light-weight Android OS.  Two older botnets, Fbot and Trinity, are also targeting this misconfiguration.  A module, the Android Debug Bridge (ADB), is the specific vulnerability, and it should not be available at all.  The debug bridge is used by software developers during code writing to check for flaws, ...

Continue Reading →
0

Many Popular Printers Provide Easy Attack Surfaces

Printers seems to be simple devices that we use to convert information into a physical form, usually text on paper.  But all printers are really small special purpose computers.  They have processors, RAM memory, and storage in the form of solid state chips or entire hard drives.  The operating system is often some form of Linux.  They usually can be accessed and configured ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


IRS Warns of New Email Scam

Original release date: August 23, 2019

The Internal Revenue Service (IRS) has issued a warning about a new email scam in which malicious cyber actors send unsolicited emails to taxpayers from fake (i.e., spoofed) IRS email addresses. The emails contain a link to a spoofed IRS.gov website that displays fake details about ...

Continue Reading →
0

Remote Desktop Protocol is Still a Top Attack Vector

Phishing for login credentials may still be the way most network breaches happen, but insecure use of remote desktop protocol is another favorite vulnerability used by attackers to enter a network..  Sophos Naked Security reported their findings on the use of RDP or the Remote Desktop Protocol as a launch vector for accessing and compromising ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The US is reportedly seeding Russia’s power grid with malware

The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid.

My comment:  Anybody who wonders why the bad guys are always attacking the US, well, it’s because we are doing it to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cyber war meets real war.

Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First

And from Bruce Schneier and Wired.


Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released security ...

Continue Reading →
0
Page 1 of 9 12345...»