vulnerability Blog Terms - Attivo Networks

vulnerability

US cyber officials urge patching of bug affecting up to 40K SAP customers

A critical vulnerability in applications made by software giant SAP could affect up to 40,000 SAP customers, offering a pathway for hackers to remotely steal or alter data, researchers warned Tuesday. … The software flaw “could have a significant impact on financial systems or other critical areas of an organization,” said Tony Cole, CTO of …

US cyber officials urge patching of bug affecting up to 40K SAP customers Read More »

Webinar: A New Way to Minimize Active Directory Security Risk

Connect with Chris Roberts, Chief Security Strategist of Attivo Networks and host Sarah Ashburn of Attivo Networks to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment. Reducing Active Directories Attack Footprint… • Let’s be frank…Active …

Webinar: A New Way to Minimize Active Directory Security Risk Read More »

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

Tech Native Logo

Cyber Security: What can we expect from 2019?

The past 12 months have been a maze of cyber security challenges, ranging from the almost constant data breach headlines to the introduction of that little thing call the GDPR. Now, as 2019 comes rushing up to greet us, what can we expect to see dominating the industry? Below are just a few of the predictions we’re making…

Khaleej Times logo

How to get the better of cyber-criminals

“The biggest threat posed by cyber-criminals today is their ability to remain undetected in the network for months, once they have bypassed perimeter defences,” he said. “New technologies and approaches like deception-based threat detection will be one of the techniques and investments that organisations will adopt to close this gap and strengthen overall defences.”

BioWorld MedTech Logo

BD and Attivo Partner to Thwart Cyberattacks

As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology cybersecurity threats through a partnership bringing Attivo’s Botsink solution to a select number of BD devices. The two firms collaborated through BD’s Product Security Partnership Program and created “mirror-match decoy authenticity” software for some of BD’s devices, a method designed to redirect an attack from reaching important information or networks.

VCJ Logo

Cybersecurity in 2018: broader scope of innovation and bigger venture dollars

Heightened attention to cybersecurity offensive countermeasures. Cybersecurity has been mostly defense-oriented, but this has never been sufficient. Moving forward, we will see more companies spring up along the lines of Attivo Networks, a leader in deception solutions. Attivo applies deception-based decoy and luring technologies within networks to misdirect attackers and deceive them into revealing themselves. (Disclosure: My firm has invested in Attivo.)

SecurityWeek Logo

Critical Vulnerabilities Found in Nuke Plant Radiation Monitors

Critical Vulnerabilities Found in Radiation Monitors Used in Nuclear Power Plants, Seaports and Airports

LAS VEGAS – BLACK HAT USA – Researchers have discovered multiple unpatched vulnerabilities in different radiation monitoring devices that could be leveraged by attackers to reduce personnel safety, delay detection of radiation leaks, or help international smuggling of radioactive material.

In a paper (PDF) delivered by Ruben Santamarta, principal security consultant at Seattle-based IOActive, at Black Hat Wednesday, it was disclosed that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities.

Scroll to Top