article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

One new challenge CISOs’ suddenly face is how to lock down web conferencing tools, like Zoom, Skype and Webex, without gutting their usefulness. One of their main duties continues to be vetting security solutions and making buy versus build decisions with respect to security tools and services.

Security 309
article thumbnail

Biden AI Order Enables Agencies to Address Key Risks

Hunton Privacy

Developers must also share the results of “red-team” exercises with the government. The Administration will create a new program to develop AI tools to investigate and address vulnerabilities in critical software. AI use by the military and intelligence community. New standards. Supporting Workers.

Risk 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked Alloy Taurus APT uses a Linux variant of PingPull malware

Security Affairs

China-linked threat actor tracked as Alloy Taurus is using a Linux variant of the PingPull backdoor and a new tool dubbed Sword2033. However, the attackers chose a domain name that gives the impression of a connection to the South African military. Experts added that the IP 196.216.136[.]139 139 resolved to vpn729380678.softether[.]net

article thumbnail

Russia-linked Gamaredon APT targeted a western government entity in Ukraine

Security Affairs

Drawing a delineation between the two then becomes an exercise in tracking the most recent infrastructure.” One of the clusters analyzed by the experts was used as C2 infrastructure for a custom remote administration tool called Pterodo/Pteranodon backdoor. The group targeted government and military organizations in Ukraine.

article thumbnail

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

The Last Watchdog

military carry out training exercises for real life cyber warfare. That led to a transition into what it is today: a leading supplier of immersive “gamification” training modules designed to keep cyber protection teams in government, military, and corporate entities on their toes. It adapted its gaming systems to help the U.S.

article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Red and blue team exercises can go beyond individual pentests to include comprehensive, ongoing testing objectives. Despite this, testers still turn to ISSAF to link different steps of the pentest process with various tools. Even if you use free tools, pentesting involves the expense of hiring security pros or consultants.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

So the threats that we look after are ones that you would see popular in the wild and against the customers that work large financial institutions, militaries, the US military, foreign militaries, NATO partners, how well do they defend and react against these threats? So the question is, what are the Russians up to?