Category: News

Even the most jaded cybersecurity veterans are finding it hard to ignore Barracuda Networks’ latest security advisory, thanks to its peculiar remediation guidance. The advisory pertains to a rather nasty vulnerability in their Email Security Gateway (ESG) products, a flaw so severe it’s like leaving your front door wide open with a neon sign saying […]

GiveSendGo was started in 2013 as a small company designed to service the niche market of fundraisingfor Christian causes. As GoFundMe started to react to political pressures in regards to some of itscontroversial campaigns, GiveSendGo began receiving more attention as a possibility for crowdfundingneeds. The trickle of interest became a groundswell when GoFundMe refused to […]

Understanding your world better “My favorite benefit of IoT is the learning paths it unlocks for people who get interested in it,” says Dana Wills, information security consultant for Asteros. Wills explains that IoT devices allow people to get more familiar with the things in their house and how they work. “It’s amazing to see […]

A newly discovered vulnerability in a incredibly popular Java logging library, log4j, was made public today. The ease of exploitation appears to be relatively low while the severity is critical, with successful exploitation resulting in remote code execution. The issue has been assigned the CVE number CVE-2021-44228 and is being called Log4Shell. What is affected?Apache […]

3. Employees Dana Wills, information security consultant at Asteros, says the top data security threat comes from lack of proper employee security awareness training. Untrained employees are more likely to fall victim to social engineering and phishing attacks, which are the most common ways attackers breach organizations. “All employees and contractors should undergo training on […]

“Attribution for the reported attack on REvil will be difficult, said Dana Wills, an information security consultant for Asteros, a cybersecurity vendor. “In this case, with Russia under pressure to act, threats from the U.S. government to take down the group, incentives of rival hacking groups, and possible insider threats within the organization, it may never […]