Cyber Security News

You Be The Hero. We've Got Your Back!

Homeland Security warns MSPs about APT actors

Wednesday October 3rd 12:30pm PST – U.S. Department of Homeland Security (DHS) is advising MSPs (managed services providers) and CSPs (cloud services providers) about advanced persistent threat (APT) actors “actively exploiting trust relationships in information technology (IT) service provider networks around the world.” The annoucement to the Department of Homeland Security warning is here. Further […]

Read More…

Open .git directories could expose sensitive data

Criminals never stop, Cyber criminals too, and so (Cyber) crime fighting can’t take a break either. But like we say at Shield every IT hero needs a good team behind them. Today we learned of a potential data breach threat lurching in git repositories. One of the good guys, Vladimír Smitka, reported that nearly 400,000 […]

Read More…

HIPAA Compliant AD HOC E-Mail

Healthcare organizations sit on top of enormous amounts of sensitive data covering patients’ medical records, doctor and faculty details as well as processes and information that is highly confidential. Currently used tools provide great sharing and access capabilities, yet also make such medical institutions’ data easily accessible to outside sources, and thus the data is […]

Read More…

One Way or Another Ransomware Will Get You

Zero-day vulnerability in Adobe Flash Player is being distributed in a couple of exploit kits. Attackers are using the previously un-patched flaw in Flash Player to infect victims with Locky or Cerber ransomware. Using exploit kits to move ransomware isn’t new, but does escalate the distribution of Locky, which is well known for large breaches […]

Read More…

Pen Test Automation “GOOD”

One of the important changes in the field of hacking prevention has been the release of tools for uncovering network vulnerabilities. Scanners that can detect exploitation points within your networks, leaving you vulnerable to attack and ultimately breach. These pen testing tools have a distinct advantage because the process of manual exploitation can produce incorrect […]

Read More…

Top