Blog

PHP GIT Breach, Ubiquiti, and Ransomware 2.0

Heff and Forrest analyze prominent data breaches in the news, including the PHP Git Server, SITA, and Hobby Lobby.

WeLeakInfo Website and Microsoft Server Exploit Update

Heff and Forrest analyze recent cybersecurity news, including the Verkada Security Camera Breach, WeLeakInfo Breach, updates on the Microsoft Exchange Server, and an examination of hacker group FIN8.

FBI Remotely Hacking Computers to Aid Microsoft Exchange Breach

Heff and Forrest analyze the recent court order allowing the FBI to remotely hack hundreds of private computers.

Ivanti Pulse Secure Breach

In this shorter, quicker version of SecurityMetrics News, Heff and Forrest bring you your threat intelligence digest. They discuss the recent Ivanti breach, Apple ransomware, SonicWall's 3 zero days, and more.

Sudo Vulnerability, Emotet and Netwalker Takedown, Bonobos Breach

Heff and Forrest analyze recent cybersecurity news, including the recent Sudo vulnerability, Emotet and Netwalker Takedown, and Bonobos data breach.

Supercookies, Oldsmar Water-Treatment Breach, Morse Code Phishing Attacks

Heff and Forrest analyze recent cybersecurity news, including supercookies, how to delete recordings from Siri, Alexa, and Google Home, morse code phishing attacks, and updates on the SolarWinds attack.

Microsoft Source Code Exposed, T-Mobile Breach, Whirlpool Ransomware Attack

Heff and Forrest analyze recent cybersecurity news, including the recent Microsoft source code leak, the T-Mobile breach, Whirlpool ransomware attack, updates on the alarming Solarwinds breach, and a review of all the nasty breaches recorded in 2020.

Microsoft Exchange Server Zero-Days and SEO Cyberattack

Directive to patch Microsoft Exchange server zero-days immediately SEO Cyberattack: hackers use strategy to push malicious web pages up the rankings Are password managers safe? Experts compare LastPass vs. 1Password

SolarWinds and FireEye

In this SecurityMetrics News episode, Heff and Forrest analyze recent cybersecurity news, including the unprecedented SolarWinds security breach and the FireEye compromise.

How to Protect Your Organization From the Log4j Vulnerability

For clients of the SecurityMetrics Threat Intelligence Center, we are actively scanning and informing clients of outbound Log4j indicators of compromise.

Western Digital Vulnerability Causes Data Loss in Hard Drives

Join Heff this week as he dives into the Western Digital hard drive vulnerability, the recent bad news from Microsoft, and breach #2 of this year for LinkedIn.

Storing Unencrypted Credit Card Data: 2021 PANscan® Data Analysis

Card data discovery is an important part of payment data security and complying with PCI DSS requirement 3. If you are going to store credit card data, you’ll need to know where it is captured, where it is stored, where it is transmitted, and where it is received.

What Is Social Engineering? Social Engineering Examples

Protect sensitive data from social engineering attacks.

Does Your Third Party Vendor Put You At Risk?

The role of the third party is evolving.

HIPAA Security Rule Requirements and Healthcare Security

While most healthcare entities follow the Privacy Rule fairly well, many aren’t compliant in the HIPAA Security Rule.

SecurityMetrics Summit: A Cybersecurity and Compliance Conference

In 2020, we hosted the first annual SecurityMetrics Summit; a virtual data security and compliance conference on September 23rd and 24th.

2021 Forensic Predictions and What Happened in 2020: Part 3

Learn how to maximize security through simple practices and employee training.

How to Choose a Safe and Secure VPN

VPNs are a popular tool that helps businesses make sure outside users are authorized and that transmitted data is encrypted.

2021 Forensic Predictions and What Happened in 2020: Part 1

The year 2020 was surprising in many ways and the digital forensics industry offered some surprises as well as some more predictable outcomes.

Boost Your E-commerce Security Against Eskimming Attacks

With ecommerce attacks on the rise, it's crucial for businesses to learn how to strengthen their ecommerce security.

Performing an SAQ C version 4.0 Merchant Self-Assessment

Merchants using the SAQ C to validate their PCI DSS compliance should be aware of changes that were introduced into this questionnaire during the publication of the SAQ C version 4.0.

How to Prepare for a HIPAA Audit in 3 Steps

Learn the three essential steps to help you effectively prepare for a HIPAA audit.

5 Simple Ways to Get PCI Compliant

Learn 5 basic practices to get PCI compliant, even if you're new to PCI or a compliance veteran.

How Does a Firewall Protect a Business?

Get answers to the most common firewall questions.