Se reporta que la aplicación 3CX Desktop para Windows y macOS ha sido puesta en riesgo en ataque contra cadena de suministro
A softphone desktop application from 3CX, makers of a popular VoIP PBX solution used by over 600,000 organizations, has reportedly been trojanized as part of a supply chain attack...
Cinco principios fundamentales para la seguridad de la nube híbrida
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
Gestión de exposición: 7 beneficios de un abordaje de plataforma
Cuando se trata de ciberseguridad preventiva, ha habido debates desde hace mucho tiempo sobre si es más efectivo operar una variedad de las mejores soluciones puntuales o adoptar un abodaje de plataforma más consolidado. Here are seven reasons an exposure management platform can help reduce cyber risk....
La EPA emite regulaciones de ciberseguridad para sistemas públicos de agua: cómo puede ayudar Tenable
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
Tenable Cyber Watch: Agencia cibernética del Reino Unido expresa preocupación por ChatGPT, el programa CISA enfrenta el ransomware en infraestructura crítica y más
This week’s edition of the Tenable Cyber Watch unpacks CISA’s new pilot program that detects vulnerabilities in critical infrastructure and addresses the FBI’s plea for more ransomware victims to report attacks. Also covered: Why the U.K. National Cyber Security Centre is warning ChatGPT users to tr...
Federating Kubernetes Workloads with Cloud Identities
Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely....
Instantánea de ciberseguridad: Refuerce la seguridad de la gestión de acceso e identidades con las nuevas prácticas recomendadas de CISA/NSA
Learn about a new guide packed with best practices recommendations to improve IAM systems security. Plus, cybersecurity ranks as top criteria for software buyers. Also, guess who’s also worried about ChatGPT? Oh, and do you know what a BISO is? And much more! ...
Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important
Segregation in cloud environments is important for security — this post explores why and offers best practice tips for acting on it....
Tenable Cyber Watch: Un vistazo a la Estrategia Nacional de Ciberseguridad de los EE. UU., una poderosa tecnología de IA se prepara para el horario de máxima audiencia y más
This week’s edition of the Tenable Cyber Watch unpacks the White House’s National Cybersecurity Strategy and explores how artificial intelligence will help cyber teams with complex attacks. Also covered: Why software vendors should prepare to submit letters of attestation to the GSA. ...
ChatGPT y GPT-4 de OpenAI son utilizados como señuelo en correos electrónicos de phishing, estafas de Twitter para promover tokens de OpenAI falsos
Hoping to cash in on the massive interest around OpenAI’s GPT-4 – ChatGPT’s new multimodal model – scammers have launched phishing campaigns via email and Twitter designed to steal cryptocurrency. Check out how they’re carrying out the scams and how you can avoid becoming a victim....
Instantánea de ciberseguridad: CISA identifica vulnerabilidades en organizaciones de infraestructura crítica que los grupos de ransomware podrían explotar
Learn about CISA’s new program to help critical infrastructure organizations stamp out vulnerabilities associated with ransomware attacks. Plus, a U.S. government advisory with the latest on LockBit 3.0. Also, find out why the U.K.’s cyber agency is warning users about ChatGPT. And much more! ...
El Martes de parches de Microsoft de marzo de 2023 aborda 76 CVE (CVE-2023-23397)
Microsoft addresses 76 CVEs including two zero-days exploited in the wild, one of which was publicly disclosed....