article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . 2 - OWASP’s top 10 CI/CD security risks. 3 - Attackers boost use of infostealer malware.

article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. Background.

Malware 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cowbell raises $100M to build out its AI-based cyber insurance platform for SMBs

TechCrunch

” That, he said, is because the heightened efforts to introduce more hacking and malware around that conflict essentially puts more malicious tools into the market, not to mention more active participants looking for opportunities. On top of all this is the age-old issue with small and medium businesses.

Insurance 260
article thumbnail

Busting 5 Common Myths About Vulnerability Assessment

Tenable

In fact, having an inaccurate understanding of some aspects of vulnerability assessment likely isn't your fault at all: Certain myths about this unique aspect of cybersecurity have spread wildly in recent years. Just under 50% of SMBs were specifically hit with a ransomware attack. Let’s start myth-busting!

SMB 101
article thumbnail

5 More Ways to Improve the Security of Your Business

Kaseya

In fact, the Verizon 2019 Data Breach Investigations Report (DBIR) found that 43 percent of security breaches affect small businesses — that’s a pretty big number. And about 57 percent of the participants said ‘improving security’ is the topmost priority. 5 More Ways to Improve the IT Security of Your Business.

Malware 91
article thumbnail

Quick Demo: Ivanti UEM for Clients

Ivanti

In this short two-minute video, we demonstrate the power of Ivanti’s UEM for Clients (formerly Endpoint Manager) that can automatically deploy and install an antivirus and endpoint security agents to the Windows workstation or server.

SMB 85
article thumbnail

We're Honored to Be Recognized Again! A Leader 11 Straight Times

Palo Alto Networks

We’re extremely proud of this recognition and firmly believe that it confirms our approach to enterprise security and ability to deliver best-in-class cybersecurity to our customers. To protect organizations from today’s advanced cybersecurity attacks, security teams must move away from traditional point-product approaches to security.