article thumbnail

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

eSecurity Planet

A quarter were financially motivated, and three of those were linked to ransomware operations. Follina , is a vulnerability in Microsoft Diagnostics Tool (MDST), exploited by persuading victims to open Word documents, which can enable the attacker to execute arbitrary code.

Cloud 104
article thumbnail

Top IT Asset Management Tools for Security

eSecurity Planet

But for many others, the solution is to tie ITAM into other tools that protect it and aid in patching vulnerabilities. In other words, modern ITAM tools go beyond maintaining an inventory of assets to help IT management make decisions about ways to improve capacity, reduce infrastructure costs, or upgrade hardware or software.

IT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 things you must do to become cyber secure

IT Governance

In this blog we summarise its guidance and recommend tools and resources to help you along the way. Your employees are the ones following your policies and procedures, so they are directly responsible for keeping threats such as ransomware and phishing at bay. Create a risk management regime. Conduct staff awareness training.

Security 105
article thumbnail

NYDFS proposes significant cybersecurity regulation amendments

Data Protection Report

Covered entities must also periodically test their incident response plans (including “disruptive events such as ransomware,” which NYDFS specifically would require) and their ability to restore systems from backups. The draft amendments would also require that relevant employees be trained for their implementation. Extortion Payments.