Uncategorized

3 Observations from CISA Alert (AA20-133A) ‘Top 10 Routinely Exploited Vulnerabilities’

In a recent alert from the National Cyber Awareness System (NCAS) three government agencies — the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the broader US government came together to provide technical guidance to public and private sector organizations to prioritize the patching of commonly known vulnerabilities exploited by foreign cyber actors. As

Weekly InfoSec Roundup 08/03/18

How pervasive is the insider threat in your company? The pervasiveness of the insider threat is something every company worries about. And according to the conclusions reached by Dtex Systems based on threat assessments from several global organizations, 100 percent of companies have blind spots that enable … ​Ream More HP Launches Printer Bug Bounty

Weekly InfoSec Roundup 07/27/18

“Red Alert” Warning on US Cyber-Attacks, Now at  “Critical Point” The United States’ director of national intelligence issued a “red alert” warning on a dangerous new level of cyber-warfare during a Washington think tank conference. He also spoke of Russia as one of the “worst offenders” ahead of US President Trump’s… ​Ream More Russia Targeted

Weekly InfoSec Roundup 07/20/18

“Red Alert” Warning on US Cyber-Attacks, Now at  “Critical Point” The United States’ director of national intelligence issued a “red alert” warning on a dangerous new level of cyber-warfare during a Washington think tank conference. He also spoke of Russia as one of the “worst offenders” ahead of US President Trump’s… ​Ream More Russia Targeted

Weekly InfoSec Roundup 07/02/18

  60,000 Android devices hit with ad-clicking malware Android Hack mobile security A new malicious Android app has infected at least 60,000 devices gaining the ability to extract some important information from each device along with installing some ad click malware. The scam’s, which was uncovered by…   60,000 Android devices hit with ad-clicking malware

Weekly InfoSec Roundup 06/25/2018

This Week in InfoSec we’ve seen phishing campaigns, ransomware, and breaches. Some vulnerability fixes and an announcement from Cisco to patch known vulnerability immediately. 60,000 Android devices hit with ad-clicking bot malware Android Hack mobile security A new malicious Android app has infected at least 60,000 devices gaining the ability to extract some important information

Weekly InfoSec Roundup 06/18/2018

This week in InfoSec news highlighted a plethora of new vulnerabilities and zero-day exploits. Be sure to register for our upcoming webinar Vulnerability Analytics: The Visual Language of Vulnerability Management. Nearly Half of All Web Apps Vulnerable to Unauthorized Access New research from Positive Technologies has discovered that almost half (48%) of web applications are

Weekly InfoSec Roundup 06/15/2018

Vulnerabilities were the name of the game this week in InfoSec news. The amount of threats and vulnerabilities is increasing at an exponential pace, be sure to catch on what ones were found this week. New Threats, Old Threats: Everywhere a Threat First-quarter data shows crypto-jacking on the rise — but don’t count out some

Weekly InfoSec Roundup 06/08/2018

Vulnerabilities were the name of the game this week in InfoSec news. The amount of threats and vulnerabilities is increasing at an exponential pace, be sure to catch on what ones were found this week. New Threats, Old Threats: Everywhere a Threat First-quarter data shows crypto-jacking on the rise — but don’t count out some

Weekly InfoSec Roundup 06/01/2018

Vulnerabilities were the name of the game this week in InfoSec news. The amount of threats and vulnerabilities is increasing at an exponential pace, be sure to catch on what ones were found this week.  New Threats, Old Threats: Everywhere a Threat First-quarter data shows crypto-jacking on the rise — but don’t count out some

Stay updated with our blog posts

Enter your email address and you'll be notified about our new posts

Brinqa Thank You logo speech bubble

Processing...

  • This field is for validation purposes and should be left unchanged.