Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor

A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research. “To our knowledge, this is the first time attackers have been caught using legitimate third party software to target cloud infrastructure,” Israeli cybersecurity […]

Someone’s Watching You!: From Microchips in Your Underwear to Satellites Monitoring Your Every Move, Find Out Who’s Tracking You and What You Can Do About It

Someone’s Watching You!: From Microchips in Your Underwear to Satellites Monitoring Your Every Move, Find Out Who’s Tracking You and What You Can Do About It Someone’s Watching You! Some people are paranoid about aliens invading America. Some are paranoid about Barack Obama being a Kenyan Muslim terrorist. And some are just, well, paranoid. This […]

Pronestor Health Monitoring Privilege Escalation

Pronestor Health Monitoring versions prior to 8.1.12.0 suffer from a local privilege escalation vulnerability due to weak file permissions. Packet Storm

How to Advance ICS Cybersecurity: Implement Continuous Monitoring

Industrial Control Systems (ICS) include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and other control system configurations such as Programmable Logic Controllers (PLC). They are typically used in industries such as electric, water, oil and natural gas, transportation, chemical, pharmaceutical and manufacturing (e.g., automotive, aerospace). These control systems are vital to […]

What Is FIM (File Integrity Monitoring)?

File integrity monitoring (FIM) exists because change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during a patch cycle; some cause concern by their unexpected nature. Organizations commonly respond to such dynamism by investing in asset discovery and […]