Tuskira Scores $28.5M for AI-Powered Security Mesh

December 4, 2024 at 09:02AM Tuskira, a new cybersecurity startup from the Accurics team, has secured $28.5 million in funding led by Intel Capital. It aims to use AI to unify over 150 fragmented security tools into a comprehensive platform, enabling real-time data analysis and proactive threat mitigation for enterprises. ### Meeting Takeaways: 1. **Company … Read more

Emergency patch: Cisco fixes bug under exploit in brute-force attacks

October 24, 2024 at 02:26PM Cisco has patched a medium-severity security flaw (CVE-2024-20481) in its ASA and FTD software, exploited through brute-force attacks leading to resource exhaustion in devices with remote access VPN enabled. The vulnerability is included in CISA’s Known Exploited Vulnerabilities Catalog, and Cisco urges users to apply updates promptly. ### Meeting Takeaways: … Read more

Cisco ASA, FTD Software Under Active VPN Exploitation

October 24, 2024 at 11:59AM Cisco has quickly released a patch for a medium-severity DoS vulnerability (CVE-2024-20481) in its VPN software, which is actively exploited. The flaw allows attackers to overload the system with authentication requests. Cisco advises updating software and implementing security measures to mitigate risks, as no workarounds are available. ### Meeting Takeaways … Read more

How Hybrid Password Attacks Work and How to Defend Against Them

October 11, 2024 at 07:39AM Threat actors use hybrid password attacks, combining techniques like brute force and dictionary methods to enhance their effectiveness in stealing credentials. To defend against these attacks, organizations should implement multi-factor authentication, require longer passwords, prevent weak patterns, and audit for compromised passwords through tools like Specops Password Policy. ### Meeting … Read more

Stop Identity Attacks: Discover the Key to Early Threat Detection

November 28, 2023 at 05:36AM Identity and Access Management (IAM) systems are crucial for protecting sensitive information, but over 80% of attacks now involve compromised credentials. Detection and rapid response to identity-based attacks often go overlooked, making it difficult to differentiate between legitimate and unauthorized users. This webinar will explore advanced security tactics to detect … Read more