Monday 10/3
Q&A on Cyber Resiliency for Operational Technology (Fortinet)
Fortinet’s CISO for Operational Technology, Willi Nelson, shares perspective on considerations when developing cyber resilience, covering fundamentals and strategic planning, to protect the convergence of IT and OT environments.
https://bit.ly/3e2oEAe
Hackers are testing a destructive new way to make ransomware attacks more effective
Ransomware hackers are experimenting with a new kind of attack that, instead of encrypting data, outright destroys it. The aim is to make it impossible for victims to retrieve their data if they don't pay the ransom.
https://zd.net/3SvOsU9
Tuesday 10/4
What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops – September 2022 (Citrix)
Citrix DaaS and Citrix Virtual Apps and Desktops deliver new features and enhancements that make it easier than ever for organizations to create agile work environments with apps and desktops delivered securely anywhere, on any device.
https://bit.ly/3ydO6cP
This Cybersecurity Awareness Month, Set Your Identity Security Strategy to Master Cyber Fundamentals (CyberArk)
The 2022 theme of “See Yourself in Cyber” doesn’t just encourage consumers to #BeCyberSmart in protecting their personal identities and information — it also underscores the role each cybersecurity professional plays in defending their organization and strengthening the broader supply chain ecosystem against pervasive identity-based attacks and data breaches.
https://bit.ly/3EgA1iO
Wednesday 10/5
Business Email Compromise: Essential Security Awareness Training Topic (Proofpoint)
Attackers use social engineering to trick people into clicking unsafe URLs, opening malicious attachments, entering their credentials, sending sensitive data, transferring funds and more.
https://bit.ly/3yhzhpy
What’s the Story Around Cyber Attackers and IP Cameras? (Check Point)
Today, CCTV (or internet-connected security cameras) are one of the most preferred ways for cyber attackers to penetrate corporate networks, as they are inherently vulnerable and serve as the easiest entry point for attackers.
https://bit.ly/3EoiO77
Thursday 10/6
ICYMI: Gotham’s CTO Ken Phelan was joined by Cybersixgill’s Director of Threat Intelligence for North America, Brad Liggett, for a discussion to help businesses better understand the dark web. See the link below for the full video
https://bit.ly/3MaIhm2
Azure Managed Identities: Definition, Types, Benefits + Demonstration (Varonis)
Removing credentials from the code tightens an application’s security, but now how will you manage these credentials, keys, and secrets? This is where managed identities come into play.
https://bit.ly/3V5gCal
Adversaries Have Their Heads in Your Cloud (CrowdStrike)
The rapid proliferation of cloud technology has empowered organizations to meet complex challenges with innovative solutions. This flexibility, however, is the antithesis of security — each new cloud solution that an organization adopts expands their attack surface.
https://bit.ly/3TiZBbd
Friday 10/7
The Uber Hack Explained
In recent days, it has been widely reported that Uber suffered a significant intrusion into their network. While the extent of the damage is unknown, we do know about the sequence of events that allowed the breach to be successful.
https://bit.ly/3RK0Kae
Additional Updated Guidance for Microsoft Exchange Zero-Day Vulnerabilities Exploited in the Wild (Arctic Wolf)
Late Wednesday, October 5, 2022, Microsoft published additional updated mitigation guidance for the two zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild: CVE-2022-41040 (SSRF vulnerability) and CVE-2022-41082 (RCE vulnerability).
https://bit.ly/3RJw4Gi
Cybersecurity Month 2022: Resources to Help You Now (Pure Storage)
With Cybersecurity Awareness Month upon us, it’s the ideal time to consider the proactive steps you can take to protect your critical infrastructure now while preparing for the cyber challenges of tomorrow.
https://bit.ly/3Mgg6SX