Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex […]
Over 3.2 billion emails and passwords hacked…find out if you are a victim and what to do about it…
It’s time to consider new passwords and multi-factor authentication or password management tools The current breach is really a compilation of many breaches, hence it’s name “Compilation of Many Breaches” […]
2021 Predictions: Addressing the Challenge of Cloud-Native App Security
By Ankur Singla, Founder and CEO of Volterra Organizations of all sizes are adopting cloud-native application design and deployment practices as they continue to digitally transform business processes. This includes […]
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications […]
SonicWall released patch for actively exploited SMA 100 zero-day
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series appliances. SonicWall this week released firmware updates (version 10.2.0.5-29sv) to […]
More Internal Security Needed, Less Budget – 10 Tips to Help
By Jody Paterson – Founder and Executive Chairman. ERP Maestro As if internal risks of fraud and data breaches were not high enough, enter in a year of new work […]
2021 Predictions: Securing the API Economy, Identity and Rigorous Consent Controls
By Nathanael Coffing, CSO, Cloudentity It goes without saying that 2020 was an unprecedented year and the security landscape was completely transformed for cybersecurity professionals. Due to COVID-19 and the […]
The 2021 Perspective – Challenges and Milestones for The VPN Industry
By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next […]
Tesla sues former employee for allegedly stealing sensitive docs
Tesla has accused a former employee, a software engineer, of downloading about 26,000 sensitive files and transferring them on his personal Dropbox On Saturday, Tesla sued the former employee Alex […]
Experts discovered a new Trickbot module used for lateral movement
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot […]
Emotet Botnet dismantled in a joint international operation
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law enforcement, lead by Europol, has dismantled the infrastructure of the […]
Threat actors took over the domain name perl.com and pointed it to an IP address associated with malware campaigns.
Attackers have taken over the official domain name of The Perl Foundation perl.com and pointed it to an IP address associated with malware campaigns. Users are recommended to avoid visiting […]
The European Medicines Agency (EMA) revealed Friday that COVID-19 vaccine documents stolen from its servers have been manipulated before the leak.
The European Medicines Agency (EMA) declared that COVID-19 vaccine documents stolen from its servers in a recent cyber attack have been manipulated. In December, a cyber attack hit the European […]
How To Keep Your Children Safe In Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault As parents, we have conflicting feelings on remote learning. One on hand, we want our children to stay healthy, especially in […]
The Privileged Credential Security Advantage
By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So […]
The Rising Tide of Security Threats in The Industrial Internet of Things
By Don Schleede, Information Security Officer at Digi International Throughout Cyber Security Awareness Month in October, many organizations shared their thoughts on the state of cybersecurity and reflected on the […]
Asset Management, The Weakest Link in Cybersecurity Risk
By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and […]
Cybersecurity Maturity Model Certification (CMMC)
It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication, […]
Anatomy of a hack – Solar Winds Orion
Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies the world […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
Cryptocurrency Ransomware Is on The Rise During COVID-19 – Here’s What Businesses of All Sizes Need to Know About Dealing with Attacks
By Marc Grens, Co-Founder & President at DigitalMint Crypto-related ransomware attacks are on the rise, and the pandemic has only hastened its propagation. For example, from 2018 to 2020, ransomware […]
Businesses Must Protect Their Most Critical Asset: Their Data
By Trevor J. Morgan, Ph.D., Product Manager at comforte AG Protecting sensitive data is a challenge facing every business and enterprise. The value of data is rising to the extent […]
Securing Digital Identities in A Predominantly Remote World
COVID-19 and the subsequent uptick in targeted cyberattacks accelerate the need for biometric-based digital onboarding By Bob Eckel, President & CEO, Aware, Inc. As we entered 2020, organizations were beginning […]
5 AIOps Trends That Will Shape 2021
By Tej Redkar, Chief Product Officer at LogicMonitor If 2020 has taught us anything, it is that life is nothing if not unpredictable. Yet, the unforeseen possibilities of tomorrow are […]
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email. […]
The Future of Security Is on The Hardware
The Virtualization Revolution Removes Security Onus From Users by Leveraging New Hardware-Powered Approach By Ian Pratt, Global Head of Security, HP Today’s threat landscape is constantly evolving, and the COVID-19 […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!). By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
To Share, Or Not to Share
As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it […]
A Hybrid Workplace Means New Threats and More Pressure on IT Leaders
By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]