With the weight of the world on its shoulders, the Internet, like Atlas, has kept the sky from falling. As a pandemic moves the global workplace online, we brace for the challenges that lie ahead. Now cyber threats around the world are on the rise, targeting health, governmental and financial institutions.
In Italy alone there's been a reported staggering 30 percent increase in cyberattacks since the outbreak of the coronavirus. With our institutions more vulnerable than ever, a quarantined workforce must take proper steps and precautions to safeguard organizational apps and assets from exploitation.
Vicarius, the Israeli cyberfirm behind TOPIA, announced Friday its plans to offer remote workers free software protection and assistance for all third-party apps.
"Our expertise is identifying and blocking software vulnerabilities," said Michael Assraf, Vicarius's CEO. "This is what most remote workers need most urgently as they work from home off vulnerable networks. What we're offering remote workers isn't just nice-to-have –– it's unfortunately necessary today.
The World Health Organization issued a report Monday warning the public of WHO imposters on a vicious phishing spree. Worldometers, an international statistics tracker, said it was the target of a DDoS attack and "malicious act.” Earlier this week, the US Department of Health and Human Services suffered a severe attack. The reported damage is still unclear.
Vicarius's TOPIA identifies vulnerabilities, prioritizes threats and patchless security patching, helping security team fast-track security cycles.
Since the outbreak, the hardest hit countries have reported a 30 percent increase in cyberattacks. Vicarius provides the perfect solution by inoculating programs with a cloud-based service that is ideal for remote access.
Tel Aviv, March 10, 2020. Ingecom, a value-added distributor (VAD) of specialized cybersecurity and cyber intelligence solutions, has added a new company to its portfolio: Vicarius, which focuses on protecting SMEs’ most critical apps and assets against software exploitation through its all-in-one vulnerability management platform. This solution, designed for CISOs, managed security service providers (MSSPs), and IT administrators, ensures regulatory compliance and military-level cyber protection.
In September 2019, a vulnerability has been discovered in EXIM, an open-source mail transfer agent,
which is a program responsible for receiving, routing and delivering email messages.
Today, the Vicarius team is proud to announce the close of our $5M funding round led by JVP (Jerusalem Ventures Partners), with the participation of Innogy Ventures and Goldbell Investments. This seed investment gives our team the capital injection needed to continue the design and development of many great Vicarius products like TOPIA.
In today’s world of technological innovation, the cybersecurity industry is still failing to properly secure organizations against exploitation, which makes software exploitation a growing epidemic:
The past ten years have been a busy time for hackers. A countless number of high-level security breaches have compromised billions of records. If you don’t know what we’re talking about, just watch our video on the Equifax Data Breach to see how just one mishap potentially affected 143 million people, leaving over 40% of the US population exposed.
So you’re at that warm, fuzzy place CISOs and IT professionals know all-too-well: There are countless vulnerabilities your organization is “theoretically” vulnerable to, for which you’d like to start implementing patches immediately to increase security, but on the other hand, you’re concerned about patches and new version releases breaking users’ functionality.
Vicarius’ TOPIA is the best-in-class enterprise software to prioritize, reduce and act against cyber risks and vulnerabilities. However, it’s main use is with corporate organizations and large-scale networks. For everyone else and for #ComputerSecurityDay, we came up with simple and easy actions you can take to reduce risk immediately, mitigate vulnerabilities, and protect your privacy and anonymity online.
Unfortunately, 2019 has been a big year for hackers. From January, cyberattacks have been impacting a countless number of individuals, especially within the Healthcare industry. With it being a big target, we have gathered some of the Greatest Healthcare Data Breaches of 2019.
In October of 2019, a flaw was found in sudo, a core command utility that is an integral part of all Linux distributions. This vulnerability allows Linux users to gain access as a root (admin) user and run commands that would otherwise be restricted to them. With a low level of difficulty for exploitation and a CVSS score of 7.8, this sudo flaw is the real deal.
So you’ve just realized that your systems have been breached. The next few steps you take will be vital to the security of your company. There are some actions you need to take immediately. But even more important, there are actions you should avoid by all means necessary. If you’re not sure what we’re talking about, there is no need to go into full panic mode yet. Luckily, we have compiled 6 Things to Avoid After a Data Breach.
David is a CISO for a fast-growing startup that allows customers to consolidate all their bank information and investments in one application to easily monitor their financials.
In July 2019, a severe vulnerability was found in VLC, an extremely popular media player, used to playback different types of videos on computers and mobile phones. VLC boasts impressive total downloads of over 3 billion, and the vulnerability has a highly critical CVE score of 9.8, making this one of the most dangerous and substantial cyber threats to date.
In 2017, there were over 130 large-scale, targeted breaches in the U.S., and the numbers are growing every year by 27%. Professionals are always saying there is no such thing as perfect security. If this is true, then why aren’t all cyber vulnerabilities being exploited? It all has to do with what it's worth for the attacker. But to make sure the cost to exploit your organization outweighs the benefits, you need to understand the concept of an “attack surface.”
They say don't fix what isn't broken, but what if the solutions could be made simpler? With Da Ros e Associati (DRea), expect to get only the most innovative, state-of-the-art technology that collapses old security layers.