logo

Information Security Managed

  • SIT Appliance
  • SIT Xternal
  • SIT Professional Services
  • icon
    • About SIT CyberSecurity
    • Some of Our Customers
    • Information Security Management
    • News
logo
Jun 2022 28 Categories: Uncategorized

Mitel VoIP Bug Exploited in Ransomware Attacks

Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.

Posted by
0
Jun 2022 28 Categories: Uncategorized

Top Six Security Bad Habits, and How to Break Them

Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.

Posted by
0
Jun 2022 24 Categories: Uncategorized

Google Warns Spyware Being Deployed Against Android, iOS Users

The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.

Posted by
0
Jun 2022 23 Categories: Uncategorized

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.

Posted by
0
Jun 2022 22 Categories: Uncategorized

Elusive ToddyCat APT Targets Microsoft Exchange Servers

The threat actor targets institutions and companies in Europe and Asia.

Posted by
0
Jun 2022 22 Categories: Uncategorized

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.

Posted by
0
Jun 2022 22 Categories: Uncategorized

Gamification of Ethical Hacking and Hacking Esports

Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.

Posted by
0
Jun 2022 21 Categories: Uncategorized

Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management

Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today’s dynamic IT environment demands an advanced vulnerability management program to deal with the complex attack surface and curb security risks.

Posted by
0
Jun 2022 21 Categories: Uncategorized

Kazakh Govt. Used Spyware Against Protesters

Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders.

Posted by
0
Jun 2022 21 Categories: Uncategorized

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

A reported a “potentially dangerous piece of functionality” allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.

Posted by
0
← Newer posts 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Older posts →

Recent posts

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Home
  • About us
  • Blog
  • Customers
  • Information Security Management
  • News
  • Privacy Policy
  • SIT Appliance
  • SIT Professional Services
  • SIT Xternal

SIT Solutions

SIT Appliance

SIT Xternal

SIT Professional Services

More Information

About Us

Customers

Information Security Management

News

Emailsales @ sit-cybersecurity.com

SIT CyberSecurity LinkedIn

Privacy Policy

  • icon icon Facebook
  • icon icon Youtube
  • icon icon Twitter
  • icon icon Flickr
  • icon icon Rss

When you visit this site, cookies will be placed on your machine for tracking visitor activity anonymously and remembering user preferences. We set a cookie to remember that you don't want to see this infobar that warns you about cookies on this site. If you click the button to enable this, you will not see this infobar on future visits* and you will opt in to having a cookie placed on your machine by us. This site makes use of some third party services who also store cookies (Third party cookies) on your machine.

These services are:
– Google Analytics
– Google AdSense

If you would like more general information on controlling cookies, please visit www.aboutcookies.org.

*Note: cookies are browser-specific. If you visit using a different browser or on another machine, you may see the infobar again.

Enable