NuSecure Insights

Why It's Important for Manufacturers to Segment OT and IT Networks

By Dan Hoban, Nuspire CSO Read more about 'Why It's Important for Manufacturers to Segment OT and IT Networks'...

Benefits of Regularly Scheduled Security Reviews

After all the appropriate technologies and solutions have been properly deployed and configured for logging, monitoring, and alerting, there remains an important, yet, often neglected security purpose for all the collected log and event data: regularly scheduled reviews. 

Read more about 'Benefits of Regularly Scheduled Security Reviews'...

Google Chrome Zero-Day Actively Exploited in the Wild | SAT News

Users are being urged to update their Google Chrome to the most recent release 72.0.3626.121 as soon as possible after a remote code execution vulnerability was discovered that allows remote... Read more about 'Google Chrome Zero-Day Actively Exploited in the Wild | SAT News'...

Your Firewall Isn’t Blocking Everything. Here’s What You Need To Do…

The truth is most companies have no idea what their firewall is blocking. Read more about 'Your Firewall Isn’t Blocking Everything. Here’s What You Need To Do…'...

Backdoor Targeting US Companies Through LinkedIn Messaging | SAT News

There is a series of malware campaigns that are utilizing the More_eggs backdoor via fake job offers targeting employees of US companies which use shopping portals and similar online payment... Read more about 'Backdoor Targeting US Companies Through LinkedIn Messaging | SAT News'...

19 Year Old WinRAR Vulnerability Disclosed | SAT News

A vulnerability in how WinRAR handles ACE archives was disclosed on February 21st. Legitimate ACE archives can only be generated by one program, WinACE, which has not seen any updates... Read more about '19 Year Old WinRAR Vulnerability Disclosed | SAT News'...

Six Tips to Mitigate Cyber Threats In The Workplace

By: Jim Nieman, Cybersecurity Consultant at Nuspire Networks Read more about 'Six Tips to Mitigate Cyber Threats In The Workplace'...

Key Features Needed in a SIEM Solution

Implementing a security information event management (SIEM) tool is widely used as a trusted method of providing additional protection, an extra layer of security on top of your hardware and... Read more about 'Key Features Needed in a SIEM Solution '...

Microsoft Exchange 2013 and Newer Vulnerable to NTLM Relay Attacks | SAT News

Microsoft Exchange supports an API called, Exchange Web Services (EWS). One of the functions of EWS API is PushSubscriptionRequest, which can be used to cause the Exchange server to connect... Read more about 'Microsoft Exchange 2013 and Newer Vulnerable to NTLM Relay Attacks | SAT News'...

FaceTime Bug Lets Callers See and Hear You | SAT News

An unpatched privacy bug has been discovered in Apple’s FaceTime that allows someone to hear or see you before you even pick up their call without you even knowing it. Read more about 'FaceTime Bug Lets Callers See and Hear You | SAT News'...

Remote Access Vulnerability in Cisco Small Business Switches | SAT News

Last week a vulnerability was discovered in Cisco devices, such as the Small Business 200 series which equips users with a default admin account and password. Read more about 'Remote Access Vulnerability in Cisco Small Business Switches | SAT News'...

A Brief History of Malicious Threats | Infographic

 Click on image for PDF infographic Read more about 'A Brief History of Malicious Threats | Infographic'...

Unprotected VOIP Server Exposes Millions of Call Logs and SMS Messages | SAT News

A California-based Voice-Over IP (VOIP) services provider has accidentally left tens of gigabytes of its customer data, containing millions of call logs, SMS/MMS messages, and plaintext internal system credentials, publicly... Read more about 'Unprotected VOIP Server Exposes Millions of Call Logs and SMS Messages | SAT News'...

Hackers Using Zero-Width Spaces to Bypass Office 365 | SAT News

A new technique is currently being used in order to bypass a security feature in Microsoft Office 365 called Safe Links. Read more about 'Hackers Using Zero-Width Spaces to Bypass Office 365 | SAT News'...

Bridging the IT Talent Gap With A Managed Security Service Provider

By Stephen Caldwell, CISSP Read more about 'Bridging the IT Talent Gap With A Managed Security Service Provider '...

New Year Security Reminder | SAT News

Read more about 'New Year Security Reminder | SAT News'...

Biggest Threats of 2018

Throughout 2018, we saw a number of notable attacks that affected both consumers and businesses. Our team of IT security experts pulled from our analytics and determined the largest threats that we saw in 2018.

Read more about 'Biggest Threats of 2018'...

Spam Bomb Threat Demanding Bitcoin Ransom Payments | SATNews

A new spam email extortion scam is making its way around the web, threatening businesses and schools nationwide saying that someone has planted bombs within the building and will be detonated unless a bitcoin ransom has been paid by the end of the day.

Read more about 'Spam Bomb Threat Demanding Bitcoin Ransom Payments | SATNews'...

Starwood Hotels Massive Database Breach Affecting 500 Million Guests | SAT News

Starwood Hotels and Resorts, a subsidiary of Marriott, has announced that their reservation database has been breached and personal information of approximately 500 million guests was obtained. Read more about 'Starwood Hotels Massive Database Breach Affecting 500 Million Guests | SAT News'...

How to educate your employees about staying secure online

One of the most overlooked enablers of a hack is found within the human element of a company. Most often, people tend to blame the network and its technology for not stopping threats, but they ignore the human aspect of the problem. These errors arise when the employees and administrators of a company are unaware of how important it is to become educated about the impact that their actions can have on the network health and security of their company. To avoid cybersecurity threats that can cause major issues for the company such as this, follow these three helpful tips on how to educate both your employees and administrators about smart navigation online.

Read more about 'How to educate your employees about staying secure online'...

1 2 3 4 5 6 7 8 9 10 11 12 13