Recent Security News
-
Cisco Patches High-Severity Vulnerabilities in Data Center OS
February 29, 2024 at 07:57AM Cisco released its semiannual FXOS and NX-OS security advisory bundle, which includes info on four vulnerabilities. Two high-severity flaws impact NX-OS software: CVE-2024-20321 allows remote attackers to perform a DoS attack, while CVE-2024-20267 could cause a DoS condition. Medium-severity flaws in FXOS and NX-OS software were also patched. Additional details…
-
The Imperative for Modern Security: Risk-Based Vulnerability Management
February 29, 2024 at 07:57AM The news has been filled with reports of various vulnerabilities being exploited, highlighting the urgent need for organizations to modernize their vulnerability management practices. With the rise in cyber threats, organizations face resource constraints and challenges in patch management, making a risk-based approach essential for prioritizing and managing vulnerabilities effectively.…
-
BlackCat Ransomware Gang Claims Attack on Change Healthcare
February 29, 2024 at 07:57AM The Alphv/BlackCat ransomware group claimed responsibility for a cyberattack on Change Healthcare’s systems, disrupting services for over a week. The attack resulted in massive healthcare transaction outages and the theft of 6 Tb of data, including health records, payment information, and personal data. UnitedHealth Group confirmed it was a cybercrime…
-
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
February 29, 2024 at 07:09AM Threat hunters discovered a new Linux malware, GTPDOOR, designed for telecom networks near GPRS roaming exchanges. It uses GPRS Tunnelling Protocol for command-and-control communication. The backdoor is linked to known threat actor LightBasin targeting telecom sector for subscriber information theft. GTPDOOR allows contact with a compromised host and executing commands.…
-
How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI
February 29, 2024 at 07:09AM Staying ahead in cybersecurity is crucial for IT leaders in protecting organizations. The text discusses the impact of data breaches, increasing cybersecurity spending, and maximizing cybersecurity resources. It highlights the importance of a risk-based approach, focusing on external attack surfaces, end user credentials, vulnerability remediation, and threat intelligence to optimize…