Thursday, July 2, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST

At least 31 US Businesses targeted with WastedLocker Ransomware

Tens of organizations in the United States have been targeted with the recently discovered WastedLocker ransomware.The malicious code was first documented by researchers from...

Chinese tax software bundled with GoldenSpy backdoor targets western companies

A new malware dubbed GoldenSpy is being distributed embedded in tax payment software that some businesses operating in China are required to install. GoldenSpy is...

Cyber Crimes Will Increase with Shift to Teleworking

By Andy Sauer, Director of Cybersecurity, Steel RootWith the sudden shift to work-from-home operations, businesses are now forced to deal with increased activity from...

Cyber Operations Could Cause Traumatic Experiences

By Milica D. DjekicIt's quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In...

Akamai mitigated the largest ever PPS DDoS attack

Akamai announced to have mitigated a record distributed denial-of-service (DDoS) attack that hit a European bank. Akamai revealed that a bank in Europe was hit...

Security in A Multi-Cloud Environment

By Paul Nicholson, Sr. Director of Product Marketing, A10 NetworksAs companies leverage a multi-cloud strategy to improve IT operations and provide better services to...

Cyber Defense TV

cyberdefensetv.com

Cyber Defense Radio

cyberdefenseradio.com

Cyber Defense Webinars

cyberdefensewebinars.com

Cyber Security News

The Ransomware Age and How to Fight It

The Ransomware Age and How to Fight It

0
By Pedro Tavares,  Editor-in-Chief seguranca-informatica.ptWe are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption malware is an emergent threat evolving and changing its Tactics,...
Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

0
By Rick Vanover, Senior Director, Product Strategy, VeeamThe damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in order to unlock their files, they not only put their...
Biggest Obstacles Frustrating Cyber Security Job Seekers and Employer

Biggest Obstacles Frustrating Cyber Security Job Seekers and Employer

0
By Matt Donato, Co-founder of Charlotte, NC-based HuntSourceYou’re a cybersecurity engineer and want to find an exciting career opportunity in this arena.But several obstacles are preventing you from making this happen. For example, you may get offered a big...
Returning to the Office After COVID-19: A Checklist for Business

Returning to the Office After COVID-19: A Checklist for Business

0
As countries, states, and cities begin to ease lock-down restrictions, this checklist for reopening the office can help you jump start your return.You and your team have been quarantined in your homes for the past few months, and now...

A daily average of 80,000 printers exposed online via IPP

0
Experts found tens of thousands of printers that are exposed online that are leaking device names, organization names, WiFi SSIDs, and other info.It's not a mystery, a printer left exposed online without proper security could open the doors to...
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and...

0
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, GuruculRemote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been an inviting target for attackers.  Even 2003’s Matrix Reloaded used an...
How to Secure IT And OT In Industrial and Manufacturing Environments

How to Secure IT And OT In Industrial and Manufacturing Environments

0
By Christopher Dobrec, Vice President of Product Marketing at ArmisOperational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to cyber-attacks. The control and telemetry systems used in industrial plants and manufacturing environments are being connected...

Moroccan journalist targeted with network injection attacks using NSO Group ‘s spyware

0
Researchers at Amnesty International collected evidence that a Moroccan journalist was targeted with network injection attacks using NSO Group 's spyware.In October 2019, security experts at Amnesty International’s Security Lab have uncovered targeted attacks against Moroccan human rights defenders...

STAY CONNECTED

35,372FansLike
55,641FollowersFollow

seczetta whitepaper