Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

German Parliament Bundestag targeted again by Russia-linked hackers

Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack allegedly launched by Russia-linked hackers. German newspaper Der Spiegel revealed […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on German Parliament Bundestag targeted again by Russia-linked hackers

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

CISA is warning of vulnerabilities in GE Power Management Devices

U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker to conduct multiple malicious activities on vulnerable systems. U.S. Cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CISA is warning of vulnerabilities in GE Power Management Devices

Why Security Shouldn’t Only Fall on Employees

By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Security Shouldn’t Only Fall on Employees

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Are Encrypted Communication Apps used for Crime Operations?

Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

Industry 4.0 under Threat Landscape

By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security terms. It appears that industry 4.0 is more than ever under the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Industry 4.0 under Threat Landscape

How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

By Michael Morris, Director of Global Business Development, Endace We’ve all read the news and seen the stats, so it comes as no surprise that SecOps teams are incredibly short-staffed […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs. OVH, one of the largest hosting […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on The fire in the OVH datacenter also impacted APTs and cybercrime groups

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X