Monthly Archives: March 2020
Your colleague was infected with Coronavirus, this is the latest phishing lure
Security experts uncovered a new Coronavirus-themed phishing campaign, the messages inform recipients that they have been exposed to the virus. Experts continue to spot Coronavirus-themed attack, a new phishing campaign […]
Hackers target zero-day flaws in enterprise Draytek network devices
Experts from Qihoo 360’s NetLab recently spotted two zero-day campaigns targeting DrayTek enterprise-grade networking devices. Since December 2019, researchers from Qihoo 360 observed two different attack groups that are employing two […]
TEHTRIS XDR Platform, A Holistic Cybersecurity Solution
By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries […]
China-linked APT41 group exploits Citrix, Cisco, Zoho flaws
The China-linked group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and ManageEngine in a campaign on a global scale. The China-linked cyberespionage group tracked as APT41 exploited vulnerabilities in […]
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec […]
Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
Coronavirus scams, found and explained
By David Ruiz Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this […]
Demystifying Network Investigations with Packet Data
By Michael Morris, Director of Global Technologies Alliances and Business Development, Endace A common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot […]
CASB+Is Essential Infrastructure for The Cloud Mobile Digital Transformation
By Salah, VP of Marketing at CipherCloud The ongoing cloud mobile digital transformation has brought cloud access security brokers (CASB+) front and center as an important part of enterprise cloud […]
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the […]
Is Data Loss Prevention (DLP) Really Dead?
By Uzi Yair, Co-founder GTB Technologies, Inc. I recently came across several digital security vendor sites that describe themselves as a “DLP alternative.” Perusing through their pages, I came across […]
The Power of Purple
A Proactive Cybersecurity Paradigm By Daniel DeCloss, CEO, PlexTrac, Inc. Cybersecurity is hard, and attackers are relentless. The job of protecting an organization from cyber threats can feel overwhelming and […]
A Green Database
By Chris Jordan, CEO, Fluency Security Datacenters are basically toxic computer equipment in a constantly cooled warehouse. Their footprint is growing across the globe in places like Loudoun County, Virginia, […]
Create Remote User Deployments and Security Nearly Instantly with Secure Desktop as a Service (DaaS)
In these trying times, I wanted to share with you, one of the most impressive solution that I’ve seen for Desktop as a Service (DaaS) that nearly instantly provides remote working to […]
Attackers use a new CoronaVirus Ransomware to cover Kpot Infostealer infections
Coronavirus-themed attacks continue to increase, experts observed new Coronavirus ransomware that acts as a cover for Kpot Infostealer. Last week, security experts from MalwareHunterTeam detected new ransomware dubbed CoronaVirus has been distributed […]
Stopping Fraud and Threats with XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. […]
Cybersecurity Predictions for Profitability During COVID-19 Pandemic
#KILLTHEVIRUS #SAVEHUMANITY #GROWYOURPROFITS #BEBOUNTIFUL The world-wide pandemic – COVID-19 aka ‘the novel corona virus’ affects us all globally. It’s going to take a ‘miracle’ and all of us working together […]
Most organizations have yet to fix CVE-2020-0688 Microsoft Exchange flaw
Organizations are delaying in patching Microsoft Exchange Server flaw (CVE-2020-0688) that Microsoft fixed with February 2020 Patch Day updates. Organizations are delaying in patching Microsoft Exchange Server flaw (CVE-2020-0688) that Microsoft […]
5 Ways Hackers Can Bypass Your MFA
Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on […]
Noooo, now Ancient Tortoise BEC scammers are launching Coronavirus-Themed attacks
A cybercrime gang focused on Business Email Compromise (BEC) has started using coronavirus-themed scam emails in its attacks. While the Coronavirus is spreading worldwide cybercriminals and nation-state actorsare launching COVID19-themed […]
GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions. By Oren T. Dvoskin, Global Marketing Director, Sasa Software Introduction The California Consumer Privacy Act, AB 375 (”CCPA”) was enacted in June […]
Russia-Linked Turla APT uses new malware in watering hole attacks
The Russia-linked APT group Turla employed two new pieces of malware in attacks launched over a period of roughly two months in the fall of 2019. The Russia-linked APT group […]
US officials charge two Chinese men for laundering cryptocurrency for North Korea
The Department of Justice has charged the two Chinese nationals for laundering cryptocurrency for North Korea-linked APT groups. The US Treasury Department and the Department of Justice have imposed sanctions […]
The Evolution of PAM
By Mahesh Babu, Sr. Director and Head of Product Marketing at Remediant When assessing an organization’s cybersecurity posture, privileged accounts are the most critical to safeguard because of their proverbial […]
Microsoft Brings Application Isolation to Office 365 with Application Guard
Users No Longer Have to Choose Between Security and Productivity By David Weston, Director of OS Security, Microsoft At Microsoft, we spend more than $1 billion annually on security and […]
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures […]
Cyber Prevention Is No Panacea
Detection is Key When Prevention Fails By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to […]
Microsoft disrupted US-Based Infrastructure of the Necurs botnet
Microsoft announced that it took over the US-based infrastructure used by the infamous Necurs spam botnet that infected millions of computers. Microsoft announced to have taken over the US-based infrastructure used […]
Microsoft warns of Human-Operated Ransomware as a growing threat to businesses
Microsoft is warning of human-operated ransomware, this kind of attack against businesses is becoming popular in the cybercrime ecosystem. Human-operated ransomware is a technique usually employed in nation-state attacks that […]