Fileless Malware Attacks VERY Hard to Detect

As a Malwarebytes blogpost states, here are 5 reasons why fileless malware is used by attackers: The most common use cases for fileless malware are: Initial access. The first step of a cyberattack is to gain a foothold on a system. This can be stealing credentials or exploiting a vulnerability in an access point. Harvest … Read more

Log4J: 4 Month Old Vulnerability – All is Fixed Right?

is everything fixed now about 4 months after the vulnerability was disclosed (and discussed here December 13,2021) So on this day in March (the 4th)   Threatpost has a story from a few days ago: Millions of Java Apps Remain Vulnerable to Log4Shell (a Log4J vulnerability) The main sentences in the story are the following: “Researchers … Read more

PCI 4.0 Here What it Means

First of All, PCI 4.0 will not remove the previous version (3.2.1) it will enhance the PCI standard (this information is from the “At a Glance” document at www.pcisecuritystandards.org) What is New in PCI DSS v4.0?There were many changes incorporated into the latest version of the Standard. Below are examples of someof those changes. For … Read more

Catch22 CyberDefending: Why Defense Always Behind

why is the defense always behind? Are there some things that we inherently do not like to do?If there is something that is denying us from doing what is necessary to create a good defense then we have to be mindful of these actions – let’s review some Catch22 items.     Let’s face it … Read more