• img August 13, 2018

Criminals can compromise company networks by sending malicious faxes

Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used in tens of millions of fax devices globally. A fax number is all an attacker needs to exploit the flaws, and potentially seize control of a company or home network. The Check Point […]

Read More
  • img August 13, 2018

Security’s bane: The false positive

Nothing makes security look worse than the false negative – when we miss an attack and damage is suffered. As security professionals, it’s something we all obsess a lot about. However, the number two thing that makes us look bad is the false positive. We experience this all the time in the physical world. A […]

Read More
  • img August 13, 2018

Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality

More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network. Sounds like an IT professional’s dream. In the world of high technology, the holy grail of new products can be summed up with four words: Faster, Simpler, Smaller, Smarter. Think about Moore’s Law which states, […]

Read More
  • img August 13, 2018

Week in review: IoT security, cyber hygiene, Social Mapper

Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: ​Choosing your defensive strategyOne of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. “Our State of the Internet Report found that companies suffered […]

Read More
  • img August 13, 2018

FBI Warns of ‘Unlimited’ ATM Cashout Blitz

The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an “ATM cash-out,” in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just […]

Read More