
PCI Password Requirements
Blog Among the myriad of standards to enhance data security, the Payment Card Industry Data Security Standard (PCI DSS) stands out as a critical framework for credit card information organizations. This set of regulations, developed to protect cardholder...

5 Simple Rules for Storing Your Credit Card Information
Storing credit card information can be a daunting task, but there are a few simple rules you can follow to make sure your data is safe. #1 Never store your credit card information on a public computer or in an unsecured location. If you must keep your credit card...

How to Become PCI compliant?
There is no one-size-fits-all answer to this question, as the necessary steps for becoming PCI compliant will vary depending on your organization's specific needs. However, there are some general guidelines that all organizations should follow to ensure compliance...

Zyxel Firewall Bug is Active and Being Used After PoC Exploit Demo Debut
Zyxel firewalls are currently (as of May 2022) under a cyberattack after a critical security flaw was disclosed last week, allowing unauthenticated, remote arbitrary code execution. The flaw, CVE-2020-9054, exists in the XML parser of Zyxel's network-attached storage...

‘Sysrv’ Botnet Targeting Recent Spring Cloud Gateway Vulnerability
Microsoft has discovered a new variant of the Sysrv botnet that includes a recent Spring Cloud Gateway vulnerability in its arsenal. Since at least late 2020, the Sysrv botnet has been active, attempting to exploit known security flaws in access interfaces in order to...

Novel Phishing Trick: Unusual Links to Trick Spam Filters
Researchers have identified a never-before-seen method for sneaking malicious links into email inboxes. A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains. According to a Monday report by Perception Point,...

Log4j Attack Surface Remains Massive
Four months ago, the remote code execution hole exposed in the Apache Log4j logging tool still had a wide range of potential victims. Using the Shodan search engine, Rezilion discovered more than 90,000 Internet-exposed servers with a vulnerable version of the...

Most Email Security Approaches Fail to Block Common Threats
Blog On a scale of one to ten, where ten is the maximum effectiveness, most security teams give their email security systems a rating of three or less. According to a recent Ponemon study, 89 percent of firms had experienced at least one successful email...

Defending Your Business Against Russian Cyber Warfare
As the West tightens its sanctions and supplies further assistance to Ukraine, we may anticipate Russian state-sponsored assaults to increase. The conflict in Ukraine is drawing attention from around the world. Russia has launched cyberattacks against Ukraine first,...

Former Uber Chief Security Officer To Face Wire Fraud Charges because of Failed Cybersecurity
Over the past few years, the road has not been smooth for former Uber Chief Security Officer Joseph Sullivan. On December 21, 2021, three additional wire fraud charges were added to the felony obstruction and misprision counts he was already facing due to his alleged...