NSA shares guidance on securing voice, video communications

The National Security Agency (NSA) has shared mitigations and best practices that systems administrators should follow when securing Unified Communications (UC) and Voice and Video over IP (VVoIP) call-processing systems. UC and VVoIP are call-processing systems used in enterprise environments for various purposes, from video conferencing to instant messaging and project collaboration. Since these communication … Continue reading NSA shares guidance on securing voice, video communications

Ransomware Operators Strategies Evolve as Attacks Rise

Ransomware Operators' Strategies Evolve as Attacks Rise Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks. Corporate email inboxes remain a valuable target for many cybercriminals, but ransomware operators are finding new avenues into enterprise networks as defensive tools improve, new research shows. Ransomware … Continue reading Ransomware Operators Strategies Evolve as Attacks Rise

Largest US propane distributor discloses 8-second data breach

America's largest propane provider, AmeriGas, has disclosed a data breach that lasted ephemerally but impacted 123 employees and one resident. AmeriGas servers over 2 million customers in all 50 U.S. states and has over 2,500 distribution locations. This month's data breach was reported by the propane giant to the Office of the New Hampshire Attorney … Continue reading Largest US propane distributor discloses 8-second data breach

Experts Shed Light On Distinctive Tactics Used by Hades Ransomware

Cybersecurity researchers on Tuesday disclosed "distinctive" tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. "In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues … Continue reading Experts Shed Light On Distinctive Tactics Used by Hades Ransomware

Back to the Future of Firewall

Read Me First As a network and workload security strategy leader, I spend a lot of time thinking about the future of the good old network firewall. Everyone has been using and abusing the “next-generation” qualifier to describe any modern firewall product for far too long, so it is appropriate to drop this extraneous prefix … Continue reading Back to the Future of Firewall

Many Mobile Apps Intentionally Using Insecure Connections for Sending Data

Many Mobile Apps Intentionally Using Insecure Connections for Sending Data A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections. Many mobile application developers are deliberately disabling secure HTTPS protections when sending data from a user's browser … Continue reading Many Mobile Apps Intentionally Using Insecure Connections for Sending Data

Emerging Ransomware Targets Dozens of Businesses Worldwide

An emerging ransomware strain in the threat landscape claims to have breached 30 organizations in just four months since it went operational, riding on the coattails of a notorious ransomware syndicate. First observed in February 2021, "Prometheus" is an offshoot of another well-known ransomware variant called Thanos, which was previously deployed against state-run organizations in … Continue reading Emerging Ransomware Targets Dozens of Businesses Worldwide

Is Big Necessarily Bad?

Why did a network technology such as the Internet, designed to pass control away from the central network to the connected devices, succumb to the level of centrality we see today? In this guest post, Geoff Huston shares his thoughts on the topic of centrality. The IRTF is a research-oriented part of the larger IETF … Continue reading Is Big Necessarily Bad?

With Cloud, CDO and CISO Concerns Are Equally Important

With Cloud, CDO and CISO Concerns Are Equally Important Navigated properly, a melding of these complementary perspectives can help keep an organization more secure. Cloud data consolidation is widespread, as evidenced by the rapid growth of well-known cloud data warehouses like Redshift and Snowflake. Of course, the pivot to support remote working environments over the … Continue reading With Cloud, CDO and CISO Concerns Are Equally Important

New TLS Attack Lets Attackers Launch Cross-Protocol Attacks Against Secure Sites

Researchers have disclosed a new type of attack that exploits misconfigurations in transport layer security (TLS) servers to redirect HTTPS traffic from a victim's web browser to a different TLS service endpoint located on another IP address to steal sensitive information. The attacks have been dubbed ALPACA, short for "Application Layer Protocol Confusion - Analyzing … Continue reading New TLS Attack Lets Attackers Launch Cross-Protocol Attacks Against Secure Sites