Thursday, December 5, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 2

News

Two unpatched RCE flaws in rConfig software expose servers to hack

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely open-source, network configuration management utility used to validate and manage network devices, including switches, routers,...

Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?

A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us with innovative solutions to a myriad of problems, others believe...

Chicago student charged with writing code to spread ISIS propaganda

US authorities arrested Thomas Osadzinski, a student at DePaul University, because he allegedly built a custom Gentoo Linux distro for ISIS. Thomas Osadzinski (20), a student at DePaul University, Chicago, was arrested because he allegedly built a custom Gentoo Linux...

New NextCry Ransomware targets Nextcloud instances on Linux servers

NextCry is a new ransomware that was spotted by researchers while encrypting data on Linux servers in the wild. Security experts spotted new ransomware dubbed NextCry that targets the clients of the NextCloud file sync and share service. The name comes from the extensions...

5 Simple Ways to Protect Your Smartphone from Cyber Attacks

By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of us. Hackers are improvising new ways to burst the privacy...

The Security Challenges of Robotic Process Automation—A Primer

By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions of human workers for tasks such as data entry, and...

DDoS-for-Hire Services operator sentenced to 13 months in prison

Sergiy P. , the administrator of DDoS-for-hire services was sentenced to 13 months in prison, and additional three years of supervised release. Sergiy P. Usatyuk, a man that was operating several DDoS-for-hire services was sentenced to 13 months in prison,...

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild

Microsoft’s Patch Tuesday updates for November 2019 address over 70 flaws, including an Internet Explorer issue (CVE-2019-1429) that has been exploited in attacks in the wild. Microsoft’s Patch Tuesday updates for November 2019 address 74 flaws, including an Internet Explorer...

3 Cybersecurity Trends & Predictions for 2020 (from Illumio)

By PJ Kirner, CTO & Founder of Illumio 1)  “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an enterprise or a government can be carried out remotely but, in 2019,...

Applying Security Across Heterogeneous IT Systems

Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security, or do I leave it unpatched to enable critical operations and business...

STAY CONNECTED

36,002FansLike
56,039FollowersFollow
Show Buttons
Hide Buttons