Monday 9/9
Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment
Ransomware is a global threat targeting organizations in all industries. The impact of a successful ransomware event can be material to an organization - including the loss of access to data, systems, and operational outages.
http://bit.ly/2lEhh6y
Malicious Android apps containing Joker malware set up shop on Google Play
In total, the applications -- made available through Google Play -- have been installed over 472,000 times by unwitting Android handset owners. The malicious applications contained a Trojan dubbed Joker, a name that references one of the domain names connected to the operator's command-and-control (C2) server.
https://zd.net/2m7JxP7
VMware Inches Closer To Carbon Black Acquisition
VMware said the purchase will allow the Palo Alto, Calif.-based virtualization superstar to provide a next-generation security cloud with Carbon Black’s protection suite and VMware’s intrinsic security assets.
http://bit.ly/2kCpt6V
Tuesday 9/10
Can’t print in Citrix from a Mac or Linux client? Here is a simple fix!
The Citrix Universal Printer and Citrix XPS Universal Printer drivers are automatically installed when you install the 7.x VDA. The HP Color LaserJet 2800 Series PS printer driver from Hewlett Packard is used by Mac and Linux clients, which require PostScript printer format.
http://bit.ly/2kDp0BA
Examine the growing role of VMware in the IoT market
IoT technology enables businesses to collect information from new endpoints and improve their operations with that data -- in some cases, quite dramatically.
http://bit.ly/2k5jEi6
Proofpoint Report: 99% of cyberattacks require human interaction to execute
More than 99 percent of threats observed required human interaction to execute- enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks.
http://bit.ly/2m9Sh7n
Wednesday 9/11
General Paul M. Nakasone to Deliver Opening Day Keynote at FireEye Cyber Defense Summit
General Paul M. Nakasone, United States Army, Commander, United States Cyber Command, Director, National Security Agency/Chief, Central Security Service, will deliver an opening day keynote address at the FireEye Cyber Defense Summit 2019. Astronaut and retired U.S. Navy Captain Scott Kelly will deliver this year’s closing keynote.
https://bwnews.pr/2lHqoTU
September Is Insider Threat Awareness Month: Are You Ready?
20 percent of cybersecurity incidents and 15 percent of data breaches originated with “insiders” to the organization. While they don’t happen as frequently as external attacks, insider attacks can be extremely costly and difficult to prevent and detect.
http://bit.ly/2kbSYMJ
F5 Debuts Solutions at its NGINX Conf to Reduce Sprawl and Complexity of Modern Application Delivery
Companies must modernize their apps and infrastructure in order to offer experiences as compelling as today’s most popular consumer apps—but often with far fewer means.
https://yhoo.it/2md5qfZ
Thursday 9/12
Veeam Named to the 2019 Forbes Cloud 100 for Fourth Consecutive Year
Veeam Software, has for the fourth consecutive year, been named on the Forbes 2019 Cloud 100, the definitive ranking of the top 100 private cloud companies in the world
https://yhoo.it/2lKmXMn
Ransomware attacks: Weak passwords are now your biggest risk
Brute force and remote desktop attacks have become the most common means of cyber criminals distributing ransomware, overtaking phishing emails and spam as the top technique for conducting file-encrypting malware campaigns.
https://zd.net/2k9zcRY
Friday 9/13
BlueKeep exploit is weaponized: Check Point customers remain protected
Check Point’s BlueKeep protections for network and endpoint are based on the IPS and endpoint security products released several months ago. These products are designed to protect organizations against the BlueKeep vulnerability and new weaponized versions of this attack.
http://bit.ly/2meMsFJ
FireEye to Improve Response to Privileged Access-Related Incidents With CyberArk
Together, FireEye Helix and the CyberArk Privileged Access Security Solution bring visibility of privileged events occurring throughout the organization and help minimize damage if privileged access is compromised.
http://bit.ly/2kfewrN