A dozen Android apps exposed data of 100M+ users
Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. Security researchers from Check Point have discovered 23 Android applications that exposed […]
Housekeeping Pitfalls of Vulnerability Management
By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s too late. Vulnerability management is siloed and is slow to adapt to […]
Humans Just Can’t Cut it Anymore
By Peter Stephenson, PhD, CISSP (lifetime), FAAFS (2015-16) Let’s face it, folks… when it comes to interdicting and stopping a cyberattack we’re tortoises racing the hare. When the adversary unleashes […]
Android stalkerware, a danger for victims and stalkers
ESET research shows that Android stalkerware apps are affected by vulnerabilities that further threaten victims. ESET research reveals that common Android stalkerware apps are affected with vulnerabilities that could expose […]
Darkside gang lost control of their servers and funds
The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds the gang obtained from the victims. Darkside ransomware operators say […]
The Case for Open XDR
The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect […]
Most of Exim email servers could be hacked by exploiting 21Nails flaws
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim […]
Experian API exposed credit scores of tens of millions of Americans
Experian API Exposed Credit Scores of Most Americans could have been accessed due to a weakness with a partner website. Experian API exposed credit scores of tens of millions of […]
SecOps as a Service; The Future of Cybersecurity
By Manoj Arora, CEO & Founder, Difenda The cybersecurity industry was a different place when I founded Difenda in 2008. I saw the same issue over and over again—companies misled […]
Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has […]
The SecureDrive® Solution
Comprehensive Tools for Improving Data Security By Sergey Gulyayev, COO, SecureData, Inc. Since 2007, SecureData Inc. has operated on the premise that protecting the world’s most sensitive and vulnerable information […]
Why cybersecurity is a driver for commercial success in 2021
By Laurent Celerier, EVP Technology & Marketing There is no question that COVID-19 has had far reaching and long-lasting impacts on the way people do things, not least the way […]
China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors
At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published […]
Gap of The Red Team from The Leak of Fireeye
Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the […]
IT Security in Organizations After the Pandemic: What’s Next?
By Alan Kakareka, InfoSec consultant to businesses, Demyo inc. The year 2020 has so far represented, the biggest change in the way we live and interact with our environment. After […]
How Zero Trust Networks Can Help Curb IT Burnout
By Stephen Helm, Product Marketing Manager, WatchGuard Technologies Last year was a challenging year for IT teams, and tech workers will continue to feel the mounting burden of maintaining business […]
Microsoft fixes 2 critical Exchange Server flaws reported by the NSA
Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed […]
Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]
New Cring ransomware deployed targeting unpatched Fortinet VPN devices
Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector. Threat actors are actively exploiting the CVE-2018-13379 vulnerability in Fortinet […]
Firmware attacks, a grey area in cybersecurity of organizations
A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently published a report that states, titled “March 2021 Security Signals report,” that […]
Growth Strategies for China Must Prioritize WeChat Security
By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber China accounts for almost a quarter of global GDP, and its growing middle class has significant spending power. Across every industry, […]
Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]
4 Matchmaking Tips to Find your Perfect SOC 2 Fit
Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place […]
30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo Alto Network researcher Aviv Sasson discovered 30 malicious Docker images, […]
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]
Top Tips For Securing Your DevOps Environment
By George J. Newton As of October 2020, experts estimate that roughly 60% of the world’s population is connected to the internet via some kind of device. As a result, […]
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]
Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East
By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and […]
Facebook took action against China-linked APT targeting Uyghur activists
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living outside China. Facebook has taken action against a series of […]
Which is the Threat landscape for the ICS sector in 2020?
The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a […]