Month: November 2020

  • Post-Cyberattack, UVM Health Network Still Picking Up Pieces

    More than a month after the cyberattack first hit, the UVM health network is still grappling with delayed payment processing and other issues. Read more

  • Vulnerability Summary for the Week of November 23, 2020

    Original release date: November 30, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.   High Vulnerabilities Primary Vendor… Read more

  • Pandemic, A Driving Force in 2021 Financial Crime

    Ransomware gangs with zero-days and more players overall will characterize financially motivated cyberattacks next year. Read more

  • Home Internet Protection for Kids

    How to Make Your Home Network Better Your Kids internet activity is suspicious and at risk. The problem in most cases is that the parents and kids usually aren’t aware. Let’s tackle the common questions we receive from Parents: Why is my internet so slow? How do I monitor my kids TikTok, Snapchat, Instagram, Twitch,… Read more

  • Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes

    While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense. Read more

  • Fortinet FortiOS System File Leak

    Original release date: November 27, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) is aware of the possible exposure of passwords on Fortinet devices that are vulnerable to CVE 2018-13379. Exploitation of this vulnerability may allow an unauthenticated attacker to access FortiOS system files. Potentially affected devices may be located in the United States. Fortinet… Read more

  • Changing Employee Security Behavior Takes More Than Simple Awareness

    Designing a behavioral change program requires an audit of existing security practices and where the sticking points are. Read more

  • Social Engineering

    Social Engineering How to Stop Social Engineering, Phishing Attacks, and Identity Theft​ What is social engineering? In a social engineering scenario, the attacker (bad actor) uses human interaction through social media, email, or some other form of communications to obtain targeted information. These bad actors typically claim to be a new employee, repair person, or… Read more

  • How to Update Your Remote Access Policy

    Reducing the risks of remote work starts with updating the access policies of yesterday. Read more

  • Critical MobileIron RCE Flaw Under Active Attack

    Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others. Read more