Integrity360 Partners with Varonis to Enhance Data Protection and Compliance
Integrity360 today announced that it has become the first Irish pure-play cybersecurity partner for leading data protection provider Varonis.
In 2024, the landscape of ransomware attacks will continue to evolve, drawing from past trends while adapting to new defences and technologies.
Learn about seven of the most popular cyber security frameworks being used by businesses around the world.
Integrity360 today announced that it has become the first Irish pure-play cybersecurity partner for leading data protection provider Varonis.
How should you look to safeguard your critical assets moving into 2022? We have put together 7 key recommendations to help you secure your organisation in 2022.
What was the impact of decentralised working? An exponential increase in the volume of new operational challenges confronting organisations, addressing the cyber skills gap, the growth of supply chain attacks, and the ever-increasing social engineering scams. These topics will be discussed in greater detail as we highlight the six key cyber security challenges that organisations faced in 2021.
As organisations everywhere edge their way towards 2022, we close off 2021 by taking a look at 21 highlighted statistics that were shared within the industry during the past 12 months which we feel rounds up the year and gives context to the current state of cyber security across the globe.
Security Update (Updated 14/12/2021 15.30)
On 10th December 2021, Apache announced a new critical vulnerability and fix for Log4j, CVE-2021-44228 dubbed ‘Log4Shell’. This vulnerability affects any organisation that utilises Log4J or has software with underlying Log4J dependencies. Apache is strongly recommending Log4j systems be updated to fixed versions as soon as possible.
Security awareness is something that is considered to be an essential part of having an effective cyber security programme.
Now, with European Cybersecurity Month (ECSM) set to begin in October, organisations have a valuable opportunity to increase security awareness among employees so that they’re ready to combat the next generation of online threats.
Below we’re going to look at what ECSM is and how organisations can participate.
Security Update (14/09/2021)
Microsoft’s “Patch Tuesday” has included a fix for CVE-2021-40444. You can find the patch details for each Operating System version here. This round of updates also fixes 85 other vulnerabilities as shown here.
This week, Microsoft disclosed a newly discovered remote code execution vulnerability in MSHTML that affects Microsoft Windows. Integrity360 can confirm that it is actively being exploited in the wild.
Yesterday, it was announced that Fortinet discovered a breach, resulting in the disclosure of almost 500,000 FortiGate SSL-VPN credentials from 87,000 FortiGate SSL-VPN Devices. The attack vector was identified as a system unpatched against CVE-2018-13379.
Integrity360 has been recognised as an Accredited Services Partner for Forcepoint Web Security.
A month ago, Ponemon and IBM released the Cost of a Data Breach 2021 report, an annual study on the cost of data breaches and the modern threat landscape. The report not only highlighted that the cost of data breaches is on the rise but also showed that enterprises are taking longer to contain security incidents.
Microsoft has disclosed yet another critical vulnerability not long since PrintNightmare was disclosed. This privilege elevation vulnerability lies in the overly permissive Access Control Lists (ACLs) on the important and sensitive Security Accounts Manager (SAM) database, SYSTEM and SECURITY registry hives. This means that an attacker with a standard non-administrative account can in theory achieve local privilege escalation, masquerade as other users and/or achieve the following:
TrickBot is a banking trojan that was first detected in September 2016 and since that time had been developed to incorporate the targeting of multiple geographies and online services. The malware was developed to gain unauthorized access to customer bank accounts to facilitate fraudulent transactions, but also targeted users of online services such as Salesforce and cryptocurrency services. The malware was reportedly delivered via spam emails containing malicious attachments, including those distributed by the Necurs botnet, and via the RIG exploit kit. In some cases, TrickBot used an exploit called EternalBlue (affects CVE-2017-0144) or Windows API calls to propagate in a local network. The functions and activities of TrickBot are reportedly very similar to the Dyre banking trojan, and it was assessed by researchers to be linked to this trojan, including that at least one of the developers of Dyre was involved in the development of TrickBot.
Dublin, Ireland
+353 01 293 4027
London, United Kingdom
+44 20 3397 3414
Sofia, Bulgaria
+359 2 491 0110
Stockholm, Sweden
+46 8 514 832 00
Madrid, Spain
+34 910 767 092
Kyiv, Ukraine
+38 0 504 701 125
Naples, Italy
Vilnius, Lithuania
Cape Town, South Africa
+27 21 100 3774