Mitel MiCollab zero-day flaw gets proof-of-concept exploit

December 5, 2024 at 10:41AM A zero-day vulnerability in Mitel MiCollab allows unauthorized file access on servers. Discovered by watchTowr, it remains unpatched after 90 days. Users are urged to implement security measures and monitor for suspicious activity until a fix is available, as Mitel plans to address the issue in December 2024. **Meeting Takeaways:** … Read more

Leveraging Wazuh for Zero Trust security

November 5, 2024 at 06:07AM Zero Trust security enhances organizational security by eliminating implicit trust and continuously validating user access. It addresses limitations of traditional models by mitigating insider threats and improving compliance. Wazuh aids this approach through real-time monitoring, incident response, and visibility, thereby protecting against evolving cyber threats and data breaches. ### Meeting … Read more

Cybersecurity Is Serious — but It Doesn’t Have to Be Boring

October 4, 2024 at 09:31AM Humor is emerging as a powerful asset in cybersecurity, boosting engagement, retention, and fostering a resilient security culture. Examples include gamification and humor-based competitions, effectively increasing motivation and productivity. However, implementing humor carries risks and challenges, such as trivializing threats or lacking cultural sensitivity. Nevertheless, humor can combat security fatigue, … Read more

Could Security Misconfigurations Become No. 1 in OWASP Top 10?

September 27, 2024 at 10:05AM The convergence of rising cyber threats, AI, remote work, and hybrid infrastructures presents significant cybersecurity challenges. Continuous threat exposure management and robust security solutions are imperative. Misconfigurations are a major vulnerability, with 80% of ransomware attacks attributed to common configuration errors. Automation and policy-as-code approach are recommended to mitigate human … Read more

Remote Work: A Ticking Time Bomb Waiting to be Exploited

August 26, 2024 at 10:33AM The challenges of hybrid work environments, including unsecured home networks and the use of unvetted software, pose significant security risks for organizations. Remote and hybrid workers may be susceptible to malware, phishing, and unauthorized access to corporate data. It is essential to implement measures such as limiting inbound network traffic, … Read more

KnowBe4 mistakenly hires North Korean hacker, faces infostealer attack

July 24, 2024 at 01:36PM KnowBe4 hired a North Korean state actor posing as a Principal Software Engineer. The company stopped the attempted installation of information-stealing software. The actor evaded background checks and used AI tools to create a fake identity. KnowBe4 detected the threat through its security product and now recommends isolating new hires’ … Read more

Worldwide 2023 Email Phishing Statistics and Examples

June 20, 2024 at 01:31PM The need for enhanced email security is evident as cyber threats continue to rise in remote work environments. In 2023, Trend Micro discovered over 45 million high-risk email threats, emphasizing the insufficiency of native security in popular email services. Phishing incidents surged by 40%, with credential phishing and BEC attacks … Read more

Avoid high cyber insurance costs by improving Active Directory security

March 19, 2024 at 10:36AM Organizations face rising cyber insurance rates due to remote work expansion, increased cyberattacks, more claims, and higher ransomware payouts. Active Directory security plays a crucial role in insurers’ risk assessment, focusing on security audits, password control, access management, patch updates, and privileged account protection. Implementing robust Active Directory security measures … Read more

Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa

March 1, 2024 at 01:05AM African economies faced varied cyber threats in 2023, with Kenya experiencing a 68% rise in ransomware attacks and South Africa seeing a 29% increase in phishing attempts. Cybercriminals are leveraging AI and social engineering tactics, particularly in BEC attacks. Organizations in Africa should invest in cybersecurity expertise to combat evolving … Read more