CDM Featured Whitepapers

Defending Against Data Breach

Linoma

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

A Culture of Cybersecurity: The Only Way Forward

Logical Operations


News

CVE-2017-0199: Crooks exploit PowerPoint Slide Show files to deliver malware

According to Trend Micro, cyber criminals abuse the CVE-2017-0199 vulnerability to deliver malware via PowerPoint Slide…

North Korea-Linked Lazarus APT targets U.S. Defense contractors

The North Korea-linked Lazarus APT group as Lazarus is believed to be behind attacks…

MUGHTHESEC, a signed Mac adware that hijacks the victim’s browser for profit

Experts spotted a new signed Mac adware dubbed MUGHTHESEC that hijacks victim’s browser for…

Kenya opposition claims election results manipulated in cyber attack

Kenya opposition claims hackers have manipulated the results of the recent election by breaking into the…

Mamba ransomware is back and targets organizations in Brazil and Saudi Arabia

Researchers at Kaspersky Lab discovered a new wave of attack leveraging the Mamba ransomware…

Is Managed File Transfer Technology Outdated?

The hype around technology comes and goes these days, often quicker than we expect…

Creator of the Ebury botnet sentenced to 46 months in jail

US authorities sentenced a Russian man to 46 months in prison and accused him of operating…

Irish electricity transmission system operator EirGrid targeted by a nation-state actor

The Irish electricity transmission system operator EirGrid was targeted by a state-sponsored actor, the…

Worldwide Business Research Launches InfoSecurity Connect East

New exclusive event brings together senior cybersecurity executives from the financial services industry Media…

Level Up at CloudSEC 2017: The Premier IT Security Conference in London

  CloudSEC 2017 London UK   Park Plaza Westminster Bridge on Tuesday September 5,…

Show Buttons
Hide Buttons