Are there any potential technology ethical dilemmas you’re concerned about?
Spiceworks Community » Security Forum
by Justin for Adlumin
2M ago
I’ve been thinking a lot about technology dilemmas recently, so I found this Forbes article titled: 16 Current And Potential Ethical Crises In Technology Opens a new window. From a security perspective (which concerns us all), it mentions issues such as blockchain’s vulnerability, to scams, the need for AI guardrails for data protection/security, ensuring AI is used only for good, and spyware. The list goes on with AI-focused cybersecurity dilemmas…Nowadays, you have to fight fire with fire, with AI in Cybersecurity efforts too Opens a new window! From a personal perspective, the use of AI is ..read more
Visit website
Microsoft Defender for Cloud - Security Center - fully depreciated?
Spiceworks Community » Security Forum
by LWBM
2M ago
Simple question, you would have thought... Is the Azure Security Center, Secure Score being fully depreciated? As per guidance, we have transitioned away from the Qualys scanner in favor of "Defender for Cloud unified Vulnerability Assessment powered by Defender Vulnerability Management". As per Transition to Microsoft Defender Vulnerability Management for servers Opens a new window, I have enabled the policy and deployed, subscription wide. This happened last Friday. Qualys agent removed. Policy assigned. As of this week - this is now showing again in our portal. "fix" remediation does nothin ..read more
Visit website
Upgrading Trend Micro Worry Free Business Advanced (On premise) to Services Std
Spiceworks Community » Security Forum
by spicehead-g0weq
2M ago
Hi! I'm told by my rep that there is no way to renew my licence from : Trend Micro Worry Free Business Advanced (On premise) to Worry-Free Business Security Services Standard. Not the client part, the actual licence. Find that hard to believe. Any thoughts on that ..read more
Visit website
Azure S2S to Palo over BGP
Spiceworks Community » Security Forum
by popeyesailzzz
2M ago
Hello, I have an azure site to site vpn, I have bgp enabled over the vpn tunnel. I am trying to connect and peer with my palo alto on prem. Essentially we will have the ipsec connectivity and be bgp peering over the tunnel. The vpn tunnel is up, no traffic passes. In azure, the bgp peering stays "connecting". for bgp we are peering using apipa addresses, i already have my azure vpn gteway set to respond. On the palo, bgp is showing connected but not established. On the azure ike diagsnotics I see a traffic selector mismatch as well and packet drops. I have gone throuhg azure, configured custom ..read more
Visit website
Game-Changer: Biometric-Stealing Malware
Spiceworks Community » Security Forum
by Roger (KnowBe4)
2M ago
I have been working in cybersecurity for a long time, since 1987, over 35 years. And, surprisingly to many readers/observers, I often say I have not seen anything new in the hacker/malware space since I began. The same threats that were a problem then are the same problems now. Social engineering and unpatched software (and firmware) have long been the two biggest initial root causes for hacking…for decades. Other types of hacking such as malware, eavesdropping, password guessing/cracking, misconfiguration, insider attacks, injection attacks, side channel leaks, etc., have been around the whol ..read more
Visit website
Credential Theft Is Mostly Due To Phishing
Spiceworks Community » Security Forum
by Roger (KnowBe4)
2M ago
According to IBM X-Force’s latest Threat Intelligence Index (https://www.ibm.com/reports/threat-intelligence Opens a new window), 30% of all cyber incidents in 2023 involved abuse of valid credentials. X-Force’s report stated that abuse of valid credentials exceeded phishing as a top threat for the first time. I love IBM, but they are mixing up root causes and outcomes of root causes. What I mean is that you have to ask yourself how the credentials were stolen in the first place. Were they stolen from the user or a website? Were they guessed at? Were they cracked from exfiltrated password hash ..read more
Visit website
Using WebBlocker to Deny Access to YouTube Shorts
Spiceworks Community » Security Forum
by nicholastaylor5
2M ago
I work in IT for a K12 institution. We recently began using WatchGuard on our network and are using WebBlocker as our content filter. I am attempting to set up a deny exception that will block access to YouTube Shorts without blocking access to the rest of YouTube. I have tried entering few different patterns with no luck. Some of the patterns I have tried include: youtube.com/shorts/* youtube.com/shorts*/* https://www.youtube.com/shorts/ Opens a new window* Anyone on this forum know how to successfully write an exception that will deny access to YouTube Shorts, but allow access to the rest of ..read more
Visit website
Annual Pen test cost
Spiceworks Community » Security Forum
by Dan5264
2M ago
We are starting to do annual pen testing.  Since I am new to the annual pen test requirement, I was wondering what this should cost annually.  I know it depends on a lot of factors so I will give a brief of  our size.  4 external IP's, 4 sites interconnected with site-to-site VPN tunnels, and approximately 270 total devices on the network.  Now of all the devices we have 21 servers and 160 workstations.  We were not looking for anything special but an internal scan and external scan.  One vendor came back at $30k to do this.  Is that typical?  Any i ..read more
Visit website
Configure nokia G-1425G-B (Fiber modem) in bridge mode with sophos XG
Spiceworks Community » Security Forum
by Titof
2M ago
Hi all, They recently provided us with a fiber modem that is configured in router mode, as we have a Sophos xg firewall, I wanted to reconfigure the Nokia in bridge mode and manage PPPoE authentication on the firewall. but unable to find bridge mode on the WAN port of the modem. I can't find any details on the modem's technical sheet. how to please configure this modem in bridge mode and connect it to my firewall. I have already done this with Huawei modems in a few seconds, but this Nokia presents a different logic for doing it ..read more
Visit website
Help with interpret Mailer-Deamon mail
Spiceworks Community » Security Forum
by Martin8543
2M ago
Hi One of our users got an Mailer-Deamon mail, and at first site i didnt think much of it, but when looking at it i would like to know whats going on. I have anynomized it regarding info about our company and the personal info In short, our user got this mail saying he had been trying to send an email to 11111111@our_company.com wich is not correct i have checked Azure logs and no one have sent any mail to this mailadress. And that mailadress is not an valid adress, but contains a last name from an older employes but first name dont match. I found out there was an linkedin profile named the sa ..read more
Visit website

Follow Spiceworks Community » Security Forum on FeedSpot

Continue with Google
Continue with Apple
OR