Yearly Archives: 2020

A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

2021 Predictions on Defeating Cybercriminals

by Gary S. Miliefsky, Publisher, Author, Investor and Keynote Speaker Here we are and most of us are thankful that 2020 is almost behind us, since the global panic has […]

Posted in Cyber Security News, Featured | Comments Off on 2021 Predictions on Defeating Cybercriminals

Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. Security researchers from Palo Alto Networks have discovered a new […]

Posted in Cyber Security News | Comments Off on PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

PyMICROPSIA Windows malware includes checks for Linux and macOS

Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new […]

Posted in Cyber Security News | Comments Off on PyMICROPSIA Windows malware includes checks for Linux and macOS

Why the Education Sector Must Address Security in The Rush to Digitise

By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why the Education Sector Must Address Security in The Rush to Digitise

US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software

Hackers broke into the networks of federal agencies and FireEye by compromising SolarWinds’ Orion Network Management Products. The cyber espionage group has tampered with updates released by IT company SolarWinds, […]

Posted in Cyber Security News | Comments Off on US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software

Anatomy of a hack – Solar Winds Orion

Nation State hacks major IS Software vender by James Gorman, CISO, Authx SolarWinds is one of the biggest names in IT support – and now one of the most notorious.  […]

Posted in Cyber Security News, Featured | Comments Off on Anatomy of a hack – Solar Winds Orion

Pay2Key hackers stole data from Intel’s Habana Labs

Pay2Key ransomware operators claim to have compromised the network of the Intel-owned chipmaker Habana Labs and have stolen data. ​Intel-owned AI chipmaker Habana Labs was hacked by Pay2key ransomware operators […]

Posted in Cyber Security News | Comments Off on Pay2Key hackers stole data from Intel’s Habana Labs

Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Learning Hardware Security Via Capture-The-Flag Competitions

By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Learning Hardware Security Via Capture-The-Flag Competitions

Reflecting on 2020: Cybersecurity Black Unicorns of The Year

As we begin to wind-down 2020, we would like you to make sure you did not miss our annual Black Unicorn Report.  You’ll see some of the most innovative and […]

Posted in Cyber Security News, Featured | Comments Off on Reflecting on 2020: Cybersecurity Black Unicorns of The Year

Why Organizations Need to Reduce Friction to Manage Remote Work Environments

The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why Organizations Need to Reduce Friction to Manage Remote Work Environments

Six Reasons to Review Your Identity and Access Management Strategy

Articles and blogs about Identity and Access Management (IAM) can be found on just about any technology-related website. Many articles point out the benefits of the myriad tools and products […]

Posted in Cyber Security News, Featured | Comments Off on Six Reasons to Review Your Identity and Access Management Strategy

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X