by: Steve Bowcut

Recently, FortiGuard Labs uncovered a new python-based cryptocurrency mining malware that uses the ETERNALROMANCE exploit, and they have dubbed it “PyRoMine.”  Originally reported on the Fortinet Blog, this malware is particularly malicious in that it “not only uses the machine for cryptocurrency mining, but it also opens the machine for […]

What are the Experts saying about PyRoMine?

“Critical infrastructure – from the electrical grid to transportation – is under assault, and hackers are evading conventional security defenses,” said John DeSimone, vice president of Cybersecurity and Special Missions at Raytheon Intelligence, Information and Services. “Commercial tools from companies like Virsec can help bridge the gap for our global government […]

Critical Infrastructure is Under Assault – Raytheon and Virsec May ...

Mandate Requires Electronic Submission of Drug Master Files Using Trusted Digital Certificates Time is running short, and the rush is on for organizations that transact with the FDA to get trusted digital certificates for all individuals working on their behalf.  Starting May 5th, the FDA will require all drug master file submissions […]

FDA Digital Certificate May 5th Compliance Deadline Looms

Guidepost Solutions has always provided much more than just security & technology consulting services, but did you know they also provide cybersecurity-related services?  They have, for years, enjoyed a reputation as a world-class provider of global investigations, compliance, monitoring, and security and technology consulting solutions for clients in a wide range […]

Physical Security Consulting Firm Provides Cybersecurity Threat Mitigation Services

by: Steven Bowcut, CPP, PSP Election officials worry about cybersecurity threats that may affect the midterm elections – but is that the real threat? Last December a bipartisan group of six senators introduced the Secure Elections Act.  This bill intends to streamline cybersecurity information sharing in an effort to help […]

Cybersecurity Threats and the Midterm Elections

 Venafi®, the leading provider of machine identity protection announced the results of a study of how retail organizations manage and implement Secure Shell (SSH). Over one hundred IT security professionals from the retail industry participated in the study, which reveals a widespread lack of SSH security controls. According to Venafi’s […]

Infographic: 81 Percent of Retail Organizations Lack Comprehensive Management of ...

Brilliance Security Magazine had the pleasure of speaking with Cujo AI’s marketing department.  They gave us an overview of their Internet Security Firewall device.  This device, or system really, is designed to protect all the various connected devices in your home.  It resides between your WiFi router and your devices and protects […]

Cujo AI Internet Security Firewall Product Review

Survey report uncovers key challenges and solutions to combating the rapid rise in cyber threats, faster and more reliably amidst security talent shortage WASHINGTON February 27, 2018–Crowd Research Partners today released the 2018 Threat Hunting Report, providing critical insights into the state and practice of cyber threat hunting to proactively […]

Cybersecurity Study Reveals Rise of Threat Hunting to Combat Wave ...

The US Secret Service is warning financial institutions that jackpotting attacks – where ATMs fraudulently dispense cash – are now a risk in the U.S. Jackpotting, or Logical Attacks, are not new to ATMs in the U.S.  In May 2016 NCR, whose systems enable 700 million financial transactions a day, […]

ATM “Jackpotting” on the Rise in U.S.