ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.

CYBERSECURITY NEWS

News Briefs

The links below are news articles regarding state and local cybersecurity. These links ar​e provided for informational purposes only and as a service to our visitors. It is the responsibility of the visitor to evaluate the content and usefulness of information obtained from these external sites. Once a visitor leaves the Mississippi Department of ITS web site and links to an external site, our web site policies are no longer applicable and the visitor will be subject to the new site's policies. Any problems, concerns or issues with these external sites should be directed to the site administrator or webmaster of those sites.

January 2022
Article Date Article Title
01/13/2022 Phishers are targeting Office 365 users by exploiting Adobe Cloud
01/13/2022 New Vulnerabilities Highlight Risks of Trust in Public Cloud
01/13/2022 Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking
01/12/2022 Amazon, Azure Clouds Host RAT-ty Trio in Info Stealing Campaign
01/06/2022 Heap-overflow Vulnerability Affects Multiple VMware Products
December 2021
Article Date Article Title
12/17/2021 Why is a well thought-out approach to cloud migration imperative?
12/15/2021 Relentless Log4j Attacks Include State Actors, Possible Worm
12/13/2021 40% of Corporate Networks Targeted by Attackers Seeking to Exploit Log4j
12/14/2021 Enterprise email encryption without friction? Yes, it's possible
12/12/2021 How to Guard Against Smishing Attacks on Your Phone
12/10/2021 December 2021 Patch Tuesday forecast: How do you stack up? 
12/09/2021 One-Third of Phishing Pages Active Less Than a Day
12/09/2021 Organizations Losing Trust in Security Vendors Amid Rising Cyberattacks
12/09/2021 Emotet Is Back and More Dangerous Than Before
12/08/2021 AWS Among 12 Cloud Services Affected by Flaws in Eltima SDK
12/03/2021 Omicron Phishing Campaign Hits User Inboxes
12/02/2021 The importance of vulnerability management for your organization
12/02/2021 Key Characteristics of Malicious Domains: Report
12/01/2021 New Ransomware Variant Could Become Next Big Threat
November 2021
Article Date Article Title
11/19/2021 52% of SMBs have experienced a cyberattack in the last year
11/18/2021 The six most common threats against the device that knows you best
11/18/2021 Cyber complexity negatively impacts a company's ability to respond to threats
11/18/2021 Microsoft Exchange Server Flaws Now Exploited for BEC Attacks
11/18/2021 'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive
11/12/2021 Millions of Routers, IoT Devices at Risk from New Open-Source Malware
11/11/2021 Third-Party Software Risks Grow, but So Do Solutions
11/11/2021 Invest in These 3 Key Security Technologies to Fight Ransomware
11/11/2021 Tiny Font Size Fools Email Filters in BEC Phishing
11/4/2021 Password Reset: Claiming Control of Credentials to Stop Attacks
11/4/2021 Trojan Source - A new method Let Hackers inject vulnerabilities into the source code
11/4/2021 Critical Linus Kernel Bug Allows Remote Takeover
11/2/2021 The Increasing Need for Application Security During COVID-19
October 2021
Article Date Article Title
10/29/2021 Employers must balance productivity and collaboration tolls with security
10/28/2021 All Sectors Are Now Prey as Cyber Threats Expand Targeting
10/27/2021 Adobe's Surprise Security Bulletin Dominated by Critical Patches
10/27/2021 The dangers behind wildcard certificates: What enterprises need to know
10/25/2021 Defending Assets You Don't Know About, Against Cyberattacks
10/24/2021 11 Security Settings Your Should Know About in Windows 11
10/8/2021 Patch management complexity increased by remote work is putting organizations at risk
10/8/2021 October 2021 Patch Tuesday forecast: Halloween came early this year
10/7/2021 What Are Some Red Flags in a Vendor Security Assessment?
10/7/2021 Twitch Leak Included Emails, Passwords in Clear Text: Researcher
September 2021
Article Date Article Title
9/27/2021 5 Steps to Securing Your Network Perimeter
9/25/2021 Security News This Week: Even the CIA and NSA Use Ad Blockers to Stay Safe Online
9/24/2021 Most IT leaders prioritize cloud migration, yet security concerns remain
9/24/2021 Apple Patches 3 More Zero-Days Under Active Attack
9/23/2021 Improving Security Posture to Lower Insurance Premiums
9/23/2021 5 Tips for Achieving Better Cybersecurity Risk Management
9/21/2021 Hackers Are Going 'Deep-Sea Phishing,' So What Can you Do About It?
9/16/2021 FBI, CISA, CGCYBER Warn of APTs Targeting CVE-2021-40539
9/16/2021 Microsoft Warns of Uptick in MSHTML Attacks
9/14/2021 Three ways to keep your organization safe from cyberattacks
9/12/2021 What is Zero Trust? It Depends What You Want to Hear
9/10/2021 SIEM market size to reach $6436.2 million by 2027
9/10/2021 The impact of ransomware on cyber insurance driving need for broader cybersecurity knowledge
9/9/2021 Microsoft Warns of Cross-Account Takeover Bug in Azure Container
9/9/2021 In the Hybrid Future, Secure Everything Like You're Never Going Back
9/9/2021 33% of Reported Phishing Emails Prove Malicious or Suspect
9/3/2021 Why Ransomware Hackers Love a Holiday Weekend
August 2021
Article Date Article Title
8/27/2021 Challenges organizations face when implementing zero trust architecture
8/27/2021 Your data, your choice
8/27/2021 Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers
8/26/2021 Microsoft Tracks Widespread Credential Phishing Campaign
8/26/2021 VMware Issues Patches to Fix New Flaws Affecting Multiple Products
8/23/2021 Top 15 Vulnerabilities Attackers Exploited Millions of Times to Hack Linux Systems
8/23/2021 38M Records Were Exposed Online—Including Contact-Tracing Info
8/22/2021 WARNING: Microsoft Exchange Under Attack With ProxyShell Flaws
8/20/2021 Attackers rapidly adopting new techniques to target users
8/19/2021 How Ready Are You for a Ransomware Attack?
8/13/2021 Hackers Actively Searching for Unpatched Microsoft Exchange Servers
8/12/2021 How Companies Can Protect Themselves from Password Spraying Attacks
8/12/2021 Ransomware Attacks and Payment Demands Soar
8/11/2021 Cybersecurity is hands-on learning, but everyone must be on the same page
8/10/2021 Microsoft Patch Tuesday Puts Spotlight on Windows Print Spooler
8/6/2021 FTC: Phishing Campaign Targets Unemployment Benefits & PII
8/6/2021 Demystifying cybersecurity with a more human-centric approach
8/6/2021 Increasing speed of vulnerability scans ultimately increases security fixes overall
8/5/2021 Security is a Big Data Problem, and It's Getting Bigger
July 2021
Article Date Article Title
7/28/2021 Leveraging People in the Email Security Battle
7/28/2021 Podcast: Why Securing Active Directory Is a Nightmare
7/27/2021 Some 65% of Organizations Now Weigh Their 'Cyber Maturity'
7/27/2021 How Do I Let Go of 'Human Error' as an Explanation for Incidents?
7/20/2021 Success of Ransomware Attacks Shows the State of Cybersecurity
7/16/2021 Microsoft: New Unpatched Bug in Windows Print Spooler
7/15/2021 Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE
7/15/2021 The SolarWinds Hackers Used an iOS Flaw to Compromise iPhones
7/15/2021 Explosion of 0-day exploits: The bad news and the good news
7/14/2021 Seven Attributes of a Great Security Team
March 2021
Article Date Article Title
3/12/2021 Compromised devices and data protection: Be prepared or else
3/12/2021 Rise in remote work leads to increase in IT security gaps
3/11/2021 Network Pivots, Patch Bypasses: Exploits Hit Hard in 2020
3/11/2021 5 Steps for Investigating Phishing Attacks
3/11/2021 Another 210,000 Americans Affected by Netgain Ransomware Attack
February 2021
Article Date Article Title
2/26/2021 Congress confronts US cybersecurity weaknesses in wake of SolarWinds hacking campaign
2/26/2021 Malware Gangs Partner Up in Double-Punch Security Threat
2/26/2021 Attackers Turn Struggling Software Projects Into Trojan Horses
2/25/2021 Ransomware, Phishing Will Remain Primary Risks in 2021
2/23/2021 Cybersecurity and your water: Hacker attempted to poison Florida city's water supply
2/19/2021 How to Fine-Tune Vendor Risk Management in a Virtual World
2/19/2021 Shift to Remote Work Necessitating Greater Innovation in Cybersecurity
2/19/2021 Microsoft: Solorigate attackers grabbed Azure, Intune, Exchange component source code
2/18/2021 Hiding in Plain Sight: What the SolarWinds Attack Revealed About Efficacy
2/17/2021 Information Posted Online After N Carolina Ransomware Attack
2/5/2021 New Ethical Concerns in Online Privacy and Data Security
2/3/2021 Top 10 most exploited vulnerabilities from 2020
2/3/2021 Concerns Over API Security Grow as Attacks Increase
2/3/2021 Security in a Complex World

ALL NEWS