Wednesday, May 27, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Meal delivery service Home Chef discloses data breach

0
Meal delivery service Home Chef has confirmed that it recently suffered a security breach that exposed its customer information.Meal delivery service Home Chef has disclosed a data breach that exposed its customer information. Home Chef also explained that only...
Does SASE Tick the Box for The Future of Network Security?

Does SASE Tick the Box for The Future of Network Security?

0
By Yair Green, CTO at GlobalDotsThe enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn has brought about the need to rethink and enhance the...

Researchers disclose five Microsoft Windows zero-days

0
Security experts have disclosed five unpatched vulnerabilities in Microsoft Windows, four of which rated as high-risk severity. Security experts from Trend Micro’s Zero Day Initiative (ZDI) have published information on five unpatched vulnerabilities in Microsoft Windows. Four vulnerabilities are classified as...

ANALYSIS: Deception for the next generation – Attivo BOTsink

0
I have been using the Attivo BOTsink by AttivoNetworks as my primary deception platform in the lab for quite some time. I have found it perfect for collecting attacks and analyzing them. I upgraded to the current release -...

Moving Beyond Honeypots to Next-Generation Deception Technology

0
By Wade Lance, field CTO, Illusive NetworksWhen security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of honeypots goes back a long way; IT security researchers began...

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

0
Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways. Palo Alto Networks Unit 42 researchers observed both the Mirai and Hoaxcalls botnets using an exploit for a post-authentication...

How Pizza Can Be the Recipe to Understand Cloud Security

0
By Yohanan Berros, Customer Operation Managers, XM CyberIt's not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately, we've formulated a simple (and delicious) metaphor for...

Texas Department of Transportation (TxDOT) hit by a ransomware attack

0
A new ransomware attack hit the Texas government, the malware this time infected systems at the state’s Department of Transportation (TxDOT).The Texas government suffered two ransomware attacks in a few weeks, the first one took place on May 8,...

Economic Efficiency in Cyber Defense

0
By Mark Evans, VP Marketing, EndaceThe previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series looks at the third leg of robust cybersecurity:  Economic Efficiency.According...

Why Finance Should Bank on Automating Security

0
By Faiz Shuja, co-founder & CEO at SIRPChallenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success in offering customers quality services on a modest budget and...

STAY CONNECTED

35,479FansLike
56,169FollowersFollow