Archive for the ‘cyber security’ Category

Global Cybersecurity Outlook 2023

#Geopolitical Instability Means a #Cyber “Catastrophe” is Imminent Routledge Companion to Global Cyber-Security Strategy The 2023-2028 Outlook for Cybersecurity in China  Global Cyber Security Labor Shortage and International Business Risk The Cyber Threat and Globalization : The Impact on U.S. National and International Security InfoSec books | InfoSec tools | InfoSec services

Leave a Comment

Microsoft Exchange Vulnerabilities Most Exploited by Hackers Targeting Financial Sector

During the month of November, researchers at the cybersecurity firm LookingGlass examined the most significant vulnerabilities in the financial services industry in the United States. The company looked at assets with public internet-facing assets from more than 7 million IP addresses in the industry and discovered that a seven-year-old Remote Code Execution vulnerability affecting Microsoft Windows […]

Leave a Comment

Automotive Industry Exposed to Have Major API Vulnerabilities

The impacted automotive giants include BMW, Toyota, Ford, Honda, Mercedes-Benz and many more… These API vulnerabilities exposed vehicles to information theft, account takeover, remote code execution (RCE), and even hijacking of physical commands such as starting and stopping engines. Millions of vehicles belonging to 16 different manufacturers had completely exposed API vulnerabilities which could be abused to […]

Leave a Comment

CYBERSECURITY BASICS for small business

DISC InfoSec: A reliable information security solutions tailored to individual business needs and our mantra is securing the business Infosec books | InfoSec tools | InfoSec services

Leave a Comment

Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum

According to a post on a well-known hacker forum, Volvo Cars has experienced a new data breach, with stolen information allegedly being made available for sale. Anis Haboubi, a French cybersecurity expert, was the first to discover that a threat actor was seeking to sell data purportedly taken from Volvo Cars on a well-known hacking […]

Leave a Comment

Microsoft revised CVE-2022-37958 severity due to its broader scope

Microsoft revised the severity rate for the CVE-2022-37958 flaw which was addressed with Patch Tuesday security updates for September 2022. Microsoft revised the severity rate for the CVE-2022-37958 vulnerability, the IT giant now rated it as “critical” because it discovered that threat actors can exploit the bug to achieve remote code execution. The CVE-2022-37958 was originally classified […]

Leave a Comment

3.5m IP cameras exposed, with US in the lead

The number of internet-facing cameras in the world is growing exponentially. Some of the most popular brands don’t enforce a strong password policy, meaning anyone can peer into their owners’ lives. Original post at https://cybernews.com/security/millions-ip-cameras-exposed/ When you spy on your neighborhood or your cafe customers, do you wonder if someone is watching Big Brother – you, […]

Leave a Comment

Bug in Toyota, Honda, and Nissan Car App Let Hackers Unlock & Start The Car Remotely

The majority of major automobile manufacturers have addressed vulnerability issues that would have given hackers access to their vehicles to perform the following activities remotely:- Lock the car Unlock the car Start the engine Press the horn Flas the headlights Open the trunk of certain cars made after 2012 Locate the car Flaw in SiriusXM […]

Leave a Comment

3 Simple Yet Vital Tips to Stay Safe Online

The online world has never been risk-free and in 2022 the risks posed by cybercriminals are a threat to all internet users. As scams and phishing methods become more complex there is a greater need for the individual to adopt a range of best practices to protect their personal information.  Cybercriminals can target both individuals and businesses […]

Leave a Comment

How To Take A Multi-Layered Approach To Cybersecurity

As we continue to rely on technology more and more, we should also be increasingly thinking about protection. According to Cyber Security Hub, two-thirds of companies are spending more on cybersecurity in 2022 than last year — a pattern that should only continue. On the heels of National Cybersecurity Awareness Month, it is the perfect time for […]

Leave a Comment

Taking cybersecurity investments to the next level

Recently, the Forgepoint team announced a new alliance with global banking leader Santander to increase cyber investment worldwide, specifically in Europe, Israel, and Latin America. Santander will also be the primary investor in Forgepoint’s next fund, slated for 2023, with a nearly $300 million goal. This was the perfect reason to connect with Alberto YĂ©pez, […]

Leave a Comment

What You Need for a Strong Security Posture

From the basics to advanced techniques, here’s what you should know. Cybersecurity has been compared to a never-ending game of whack-a-mole, with an ever-changing cast of threats and threat actors. While the attacks that make headlines may change from year to year, the basic fact remains: Any network, no matter how obscure the organization it […]

Leave a Comment

SMBs are hardest-hit by ransomware

Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, overall incidents are down, and ransomware attacks are declining as demands go unpaid. During the first half of 2022, the average cost of a claim for a small business owner increased to […]

Leave a Comment

CISA adds 10 new flaws to its Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, including a high-severity security flaw ( CVE-2021-38406  CVSS score: 7.8) impacting Delta Electronics industrial automation software. According to Binding Operational Directive (BOD) […]

Leave a Comment

Digital Ethics Book Bundle

As technology advances, so must our ability to use such technology ethically. The rise of AI (artificial intelligence) and big data raises concerns about data privacy and cyber security. ITG have combined their latest titles into one bundle, saving you 20% – ideal for bank holiday reading. Digital Ethics Book Bundle Understand the growing social, […]

Leave a Comment

SMB’s cybersecurity solutions to remediate risk

We have build cybersecurity solution sheets for our clients which we would like to share with you. This can be a useful resource when there is a need to remediate risk. These are in pdf format which you can download. Privacy guidance, audits, tools, training and software Certification of individuals Cybersecurity Solutions NIST Gap Assessment […]

Leave a Comment

Start as you mean to go on: the top 10 steps to securing your new computer

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats. With Windows 11 making headlines for all the right reasons, it could be a great time to invest in a new PC for the family or the home office. […]

Leave a Comment

Cybersecurity Solutions

Cybersecurity reduces the risk of cyber-attacks and protects against the unauthorized exploitation of systems, networks and technologies. Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering DISC InfoSec #InfoSecTools and #InfoSectraining #InfoSecLatestTitles #InfoSecServices Ask DISC an InfoSec & compliance related question

Comments (1)

State of Cybersecurity 2022

State of Cybersecurity 2022 – via ISACA State of Cybersecurity 2022, Global Update on Workforce Efforts, Resources and Cyberoperations reports the results of an eighth annual global study that looks at the following topics and more: What are the top cybersecurity hiring challenges today? Which cybersecurity skills are in highest demand? How can companies improve retention? […]

Leave a Comment

How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep gaining the upper hand on cybercriminals. Unfortunately, there are millions of unfilled cybersecurity job openings around the globe. The gender divide The problem of not enough cybersecurity professionals is exacerbated by a lack […]

Leave a Comment