Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday.  The Belgian interior ministry was hit by a “sophisticated” cyber-espionage attack, […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Belgium Interior Ministry said it was hit by a sophisticated cyber attack

Contactless Passwordless Auto Login

with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Contactless Passwordless Auto Login

Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

How Zero Trust Networks Can Help Curb IT Burnout

By Stephen Helm, Product Marketing Manager, WatchGuard Technologies Last year was a challenging year for IT teams, and tech workers will continue to feel the mounting burden of maintaining business […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How Zero Trust Networks Can Help Curb IT Burnout

Microsoft fixes 2 critical Exchange Server flaws reported by the NSA

Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Microsoft fixes 2 critical Exchange Server flaws reported by the NSA

Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

Cyberattacks could pose a material risk to water and sewer utilities

Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to repay debt. Fitch Ratings Inc. is an American credit rating […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Cyberattacks could pose a material risk to water and sewer utilities

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

This man was planning to kill 70% of Internet in a bomb attack against AWS

The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28), […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on This man was planning to kill 70% of Internet in a bomb attack against AWS

Protecting Human Rights in The Era of Cyber Information Warfare

By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Protecting Human Rights in The Era of Cyber Information Warfare

Growth Strategies for China Must Prioritize WeChat Security

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber China accounts for almost a quarter of global GDP, and its growing middle class has significant spending power. Across every industry, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Growth Strategies for China Must Prioritize WeChat Security

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X