WinRAR Flaw Exposes Russian and Chinese Threat Actors

In recent times, security experts have detected a surge in cyber threats linked to the exploitation of a known vulnerability, CVE-2023-38831, in WinRAR, a widely used file archiver tool for Windows. These ...
Google Cloud cyber, hygiene, building blocks

Cybersecurity Hygiene—Building Blocks to Protect Your Attack Surface

Cybersecurity breaches or ransomware-induced shutdowns can crush a company. Financial loss. Reputation damage. Legal penalties. Nobody wants to be responsible for any of these, but attacks are on the rise. The average ...
Security Boulevard
BEC cybersecurity hygiene Russian Ukraine microsoft Freeze on Phishing

Russia-Linked Attackers Target US Nuclear Research Facilities

It made the headlines in early January; Russia is targeting U.S. nuclear scientists and research facilities. While certainly not a news flash—given that Russia’s (and the USSR’s) history of targeting U.S. nuclear ...
Security Boulevard

Password Reuse is Putting MSP’s at Risk

Password hygiene is a huge priority for Managed Service Providers   Every organization is at risk for cyber attack, but MSPs have emerged as a top target. This is because threat actors can ...

Three Tips to Combat Cyber-threats in the Financial Industry

No firm in the financial industry has been unaffected by digital transformation. Even over the last three years of tech advancements and a global pandemic, there have been seismic shifts in the ...

Multi-Factor Authentication: A Key to Cyber Risk Insurance Coverage

Cyber-attacks are becoming more sophisticated and devastating, especially for small and medium enterprises (SMEs). With ransom demands rising and the cost of data breaches soaring, businesses are investing heavily in building their ...
The Tripwire Cybersecurity Podcast

Behind the Community Defense Model with the Center for Internet Security (CIS)

In this episode, Curtis Dukes, executive vice president and general manager of the Center for Internet Security (CIS), explains the need for their Community Defense Model. He also details their process for ...

Addressing Authentication Issues Within IoT

Staying Safe, While Staying Connected As more organizations enter the digital landscape of the Internet of Things (IoT), there are parallel increases in the number and frequencies of cyberattacks. IoT has a ...

Using Good Cyber Practices to Frame your Personal Cyber Narrative

Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot do in our homes as working ...
One in Every 142 Passwords is ‘123456’, New Research Shows

One in Every 142 Passwords is ‘123456’, New Research Shows

“123456” is the most widely used password on breached accounts, according to a recent password re-use study c by computer engineering students at Cyprus University. Last month, student Ata Hakçıl analyzed more ...