article thumbnail

FBI?s router reboot call reminds us why to check for updates

The Parallax

On May 25, the FBI issued a clarion call to a broad swath of Wi-Fi router owners: To clear out a potential botnet malware infection, reboot your router. The malware, VPNFilter, allowed hackers to snoop on all traffic passing through the router, including stealing website log-ins, as well as disable the device.

Malware 188
article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess.

Malware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As war escalates in Europe, it’s ‘shields up’ for the cybersecurity industry

TechCrunch

CTO and founder of Reposify , Yaron Tal is a tech entrepreneur and cybersecurity expert with nearly two decades of experience developing cybersecurity software solutions. Contributor. Share on Twitter. In unprecedented times, even government bureaucracy moves quickly.

Industry 246
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Chief Security Architect, Office of the CTO, Cloudera. Proven Strategies for Promoting Innovation and Technology Adoption. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera. Data Security—What’s New and What’s Next?

article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

This article will share reasons why ML has risen to such importance in cybersecurity, share some of the challenges of this particular application of the technology and describe the future that machine learning enables. Many organizations today possess a growing number of Internet of Things (IoT) devices that aren’t all known or managed by IT.

article thumbnail

Lessons Learned: Are you one of the Fortune 500’s Unfortunate 221?

CTOvision

According to information gathered from open Internet sources (especially pastebin-type sites), 44% of Fortune 500 companies have employees with leaked credentials on the open web. Analysis CTO Cyber Security DoD and IC Dropbox Information sensitivity JavaScript Malware microsoft Outlook Web App Phishing Trend Micro'

Malware 115
article thumbnail

Tenable OT Security: 2023 Year in Review

Tenable

They need access to the full range of data points about their environments, including their IT, OT and internet of things (IoT) assets. Celebrating Tenable OT Security’s strategic collaborations In April, Tenable became a founding member of the vendor-agnostic initiative ETHOS community , alongside 10 other vendors.