Blog RSS Feed Fortra Blog
- on January 22, 2025 by Josh Breaker-Rolfe
Security Operations Center ( SOC) analysts have it rough. Modern security tools generate an extraordinary number of alerts, attackers are more […]
- on January 22, 2025 by Matthew Jerzewski
Knowing who has credentials, how those credentials are granted, and how they are being used is the foundation of any secure environment. It begins […]
- on January 22, 2025 by Tyler Reguly
Recently, I looked at Microsoft’s assigned CVSS v3.1 scores for Patch Tuesday vulnerabilities alongside the Microsoft assigned severity ratings. I […]
- on January 21, 2025 by Graham Cluley
What is the Medusa ransomware? Medusa is a ransomware-as-a-service (RaaS) platform that first came to prominence in 2023. The ransomware impacts […]
- on January 21, 2025 by Josh Breaker-Rolfe
NASA is about to introduce new requirements for its contractors. These requirements will dramatically improve the cybersecurity of spacecraft and the […]
Blog RSS Feed Fortra Blog
- on January 22, 2025 by Josh Breaker-Rolfe
Security Operations Center ( SOC) analysts have it rough. Modern security tools generate an extraordinary number of alerts, attackers are more […]
- on January 22, 2025 by Matthew Jerzewski
Knowing who has credentials, how those credentials are granted, and how they are being used is the foundation of any secure environment. It begins […]
- on January 22, 2025 by Tyler Reguly
Recently, I looked at Microsoft’s assigned CVSS v3.1 scores for Patch Tuesday vulnerabilities alongside the Microsoft assigned severity ratings. I […]
- on January 21, 2025 by Graham Cluley
What is the Medusa ransomware? Medusa is a ransomware-as-a-service (RaaS) platform that first came to prominence in 2023. The ransomware impacts […]
- on January 21, 2025 by Josh Breaker-Rolfe
NASA is about to introduce new requirements for its contractors. These requirements will dramatically improve the cybersecurity of spacecraft and the […]
Palo Alto Networks Blog Palo Alto Networks Blog
- Securing DOT Infrastructureon January 17, 2025 by Lakshmi Kandadai and Kyle Lanahan
The nature of ITS networks, IT-OT convergence, limited physical security controls, and interconnected IoT devices vulnerabilities pose challenges. The post Securing DOT Infrastructure appeared first on Palo Alto Networks Blog.
- 5 Trends Shaping Healthcare Cybersecurity in 2025on January 15, 2025 by Troy Ament and Tarun Sondhi
Palo Alto Networks shares five of the top healthcare cybersecurity trends and strategies to prepare you for transformation in 2025 and beyond. The post 5 Trends Shaping Healthcare Cybersecurity in 2025 appeared first on Palo Alto Networks Blog.
- Protecting Web-Based Workon January 8, 2025 by Anupam Upadhyaya
Web browsers have evolved for work, but security hasn’t kept up. This poses cyber risks. Protecting browsers is crucial for safe web-based work operations. The post Protecting Web-Based Work appeared first on Palo Alto Networks Blog.
- Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Todayon January 2, 2025 by Anand Oswal
There’s a growing threat looming over our collective privacy and security — and that’s quantum computing. The post Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today appeared first on Palo Alto Networks Blog.
- Securing Remote OT Operations:on December 26, 2024 by Qiang Huang
Expanded attack surfaces have made OT systems a target for cyber threats, underscoring the need for a security framework tailored to remote OT environments. The post Securing Remote OT Operations: appeared first on Palo Alto Networks Blog.
Consumer Insights News, views and insights from the Bitdefender experts
- Half a million hotel guests at risk after hackers accessed sensitive dataon January 22, 2025 by Graham CLULEY
The personal information of almost half a million people is now in the hands of hackers after a security breach of a company used by some of the world’s best known hotel brands. Hotel management software provider Otelier boasts that more than 10,000 hotels – including brands like Marriott, Hilton, and Hyatt – use its cloud-based solution to help them run their operations. Otelier has now disclosed that hackers allegedly breached its systems from July until October 2024, with hackers stealing w
- Research Unveils 4.2 Million Hosts Exposed to Cyberattacks by Unsecured Tunneling Protocolson January 21, 2025 by Vlad CONSTANTINESCU
Security experts discovered a new set of tunnel protocol vulnerabilities that could expose millions of devices to a broad range of cyberattacks. Tunneling packets used to hijack internet hosts According to the research, the issue revolves around internet hosts that fail to verify the sender’s identity when handling tunneling packets. This paves the way for host takeovers, which could allow attackers to breach vulnerable networks and weaponize the hosts for anonymized attacks. The study, by
- 15-Year-Old Hacker Diverts Ships in Mediterranean Sea for Funon January 20, 2025 by Silviu STAHIE
A 15-year-old hacker gained access to a number of online portals in Italy, allowing him to alter the routes of oil tankers and other ships in the Mediterranean Sea. Most hackers today have financial goals as they try to compromise companies and other organizations, steal data, and lock out employees, in order to ask for ransom. But there was a time when hackers tried to break into secure locations just to see if they could. As it turns out, the same goes for the young adolescent from Cesena,
- Russian Hackers Target Diplomats in WhatsApp Spear-Phishing Campaignon January 20, 2025 by Vlad CONSTANTINESCU
Security experts have discovered a new spear-phishing campaign orchestrated by Russian state-backed threat actors against high-profile diplomats and Ukrainian aid organizations. Russian malicious campaign against Ukrainian targets Star Blizzard, a group of Russian state-sponsored hackers, has launched a ruthless spear-phishing campaign against various Ukraine-linked targets. Perpetrators sought targets in diplomacy, defense policy, government, international relations and aid organizations in
- Responding to a Cyberattack – What to Do When You Get Hacked: A Small Business Guideon January 17, 2025 by Silviu STAHIE
All businesses should operate under the assumption that a cybersecurity incident can occur at any moment. This stance also prepares them for the immediate aftermath; knowing what to do after a cyberattack is crucial when time is of the essence. One of the biggest problems facing cybersecurity today is the belief on the part of the individual or company that it will not happen to them. The idea of getting lost in the crowd is very appealing – it’s a key reason people are caught completely by su