You are here

Cybersecurity

APT Victims – Size Doesn’t Matter

Most Advanced Persistent Threat (APT) groups are not focused on the size of an organization, but whether an organization can help them achieve their objective. That objective might be espionage or sabotage and it’s the significance of the organization toward accomplishing the objective, not the size, that matters. As a matter of fact, APT groups often leverage smaller targets such as supply chain partners or vendors as an entry point to larger attacks.

Security Awareness Reminders – New Year’s Cyber Hygiene Resolutions

2021 experienced several significant cyber attacks and incidents, many of which may have been prevented by practicing a few basic cybersecurity best practices. Thus, in the spirit of New Year’s resolutions, cybersecurity firm ESET drafted a list of ten cybersecurity bad practices to break for 2022. This list is reminiscent of the Bad Practices Catalog that CISA started last year and includes common bad habits to break such as using outdated software, poor password hygiene, and not thinking before clicking.

Looking at RDP Security in the New Year

Many organizations rely upon Remote Desktop Protocol (RDP) software for connecting to remote systems. However, the widespread adoption of RDP software has significantly increased the attack surface for threat actors to exploit, because there are multiple security flaws with RDP. One particular security issue with RDP is known as “BlueKeep.” This RDP vulnerability, tracked as CVE-2019-0708, occurs pre-authentication and requires no user input.

Pages

Subscribe to Cybersecurity