Search Results for: outdated software Blog Post Outdated Software Still Run in 83% of U.S. Healthcare Systems March 27, 2020 According to a study released on Tuesday, a significant portion of Internet-connected imaging devices in hospitals run outdated operating systems.... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner... Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was... Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no... Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a... Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... Blog Post Hackers Hit Major Russian Bank in an Online Heist July 23, 2018 Hackers have stolen nearly $1 million from a Russian bank after breaching its network by targeting an outdated router at... Blog Post Mark Graff on Cybersecurity Now and In the Future June 22, 2017 A cyber security practitioner and thought leader for over 25 years, Mark Graff is the Founder and CEO at Tellagraff,...
Blog Post Outdated Software Still Run in 83% of U.S. Healthcare Systems March 27, 2020 According to a study released on Tuesday, a significant portion of Internet-connected imaging devices in hospitals run outdated operating systems....
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner...
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was...
Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no...
Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...
Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which...
Blog Post Hackers Hit Major Russian Bank in an Online Heist July 23, 2018 Hackers have stolen nearly $1 million from a Russian bank after breaching its network by targeting an outdated router at...
Blog Post Mark Graff on Cybersecurity Now and In the Future June 22, 2017 A cyber security practitioner and thought leader for over 25 years, Mark Graff is the Founder and CEO at Tellagraff,...