Monthly Archives: June 2020

Cyber Operations Could Cause Traumatic Experiences

By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Cyber Operations Could Cause Traumatic Experiences

Akamai mitigated the largest ever PPS DDoS attack

Akamai announced to have mitigated a record distributed denial-of-service (DDoS) attack that hit a European bank. Akamai revealed that a bank in Europe was hit by a massive distributed denial-of-service […]

Posted in Cyber Security News | Comments Off on Akamai mitigated the largest ever PPS DDoS attack

The Ransomware Age and How to Fight It

By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on The Ransomware Age and How to Fight It

Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

A daily average of 80,000 printers exposed online via IPP

Experts found tens of thousands of printers that are exposed online that are leaking device names, organization names, WiFi SSIDs, and other info. It’s not a mystery, a printer left […]

Posted in Cyber Security News | Comments Off on A daily average of 80,000 printers exposed online via IPP

How to Secure IT And OT In Industrial and Manufacturing Environments

By Christopher Dobrec, Vice President of Product Marketing at Armis Operational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to cyber-attacks. The control and telemetry systems […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on How to Secure IT And OT In Industrial and Manufacturing Environments

Moroccan journalist targeted with network injection attacks using NSO Group ‘s spyware

Researchers at Amnesty International collected evidence that a Moroccan journalist was targeted with network injection attacks using NSO Group ‘s spyware. In October 2019, security experts at Amnesty International’s Security […]

Posted in Cyber Security News | Comments Off on Moroccan journalist targeted with network injection attacks using NSO Group ‘s spyware

Fighting Back Against Powerful New DDoS Attack Vectors

By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Fighting Back Against Powerful New DDoS Attack Vectors

Introducing the Role of The Chief Cybercrime Officer

Can the CISO and CCO work in harmony? By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks The TalkTalk data breach in 2015 had big repercussions. With the […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Introducing the Role of The Chief Cybercrime Officer

Still Using Spreadsheets to Manage Your Digital Certificate Security?

Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Still Using Spreadsheets to Manage Your Digital Certificate Security?

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Black Kingdom ransomware operators exploit Pulse VPN flaws

Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. Researchers from security firm REDTEAM reported that operators behind the Black Kingdom ransomware […]

Posted in Cyber Security News | Comments Off on Black Kingdom ransomware operators exploit Pulse VPN flaws

Digital Healthcare: How Secure Is the Care Data?

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Digital Healthcare: How Secure Is the Care Data?

In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons by Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, Exabeam Security operations centers (SOCs) are […]

Posted in Cyber Security News | Comments Off on In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

New Expectations for the Network Perimeter

Patchwork network of legacy solutions won’t keep bad actors out By Barrett Lyon, Co-founder, and CEO, Netography U.S. government agencies are placing increased importance on cross-network visibility for cloud and […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on New Expectations for the Network Perimeter

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Microsoft has joined Amazon and […]

Posted in Cyber Security News | Comments Off on Tech firms suspend use of ‘biased’ facial recognition technology

Ditch Legacy Approaches – Reimagine Cloud Security Based on Virtualization

By Avi Shua, CEO, and co-founder, Orca Security; former chief technologist at Check Point Software Technologies Abstract: Humans are used to thinking in metaphors. While convenient, this limits our ability […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Ditch Legacy Approaches – Reimagine Cloud Security Based on Virtualization

Dark Basin, a hack-for-hire group that remained under the radar for 7 years

A hack-for-hire group tracked as Dark Basin targeted thousands of journalists, advocacy groups, and politicians worldwide over 7 years. Researchers from Citizen Lab uncovered the operations of a hack-for-hire group […]

Posted in Cyber Security News | Comments Off on Dark Basin, a hack-for-hire group that remained under the radar for 7 years

Two Critical Remote Code Execution flaws fixed in IBM WebSphere

IBM has addressed two critical vulnerabilities in IBM WebSphere Application Server that could allow a remote attacker to execute arbitrary code. In April, a security researcher who goes online with […]

Posted in Cyber Security News | Comments Off on Two Critical Remote Code Execution flaws fixed in IBM WebSphere

Cyber Crime is Paying

What the Evolution of Ransomware Means for the Security Industry By Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies If you were talking to a retired police officer or FBI […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber Crime is Paying

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X