30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo Alto Network researcher Aviv Sasson discovered 30 malicious Docker images, […]
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after […]
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]
Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East
By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and […]
Which is the Threat landscape for the ICS sector in 2020?
The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a […]
Why Security Shouldn’t Only Fall on Employees
By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons […]
Are Encrypted Communication Apps used for Crime Operations?
By Nicole Allen, Marketing Executive, SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which […]
Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021
As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully […]
Analytics & Security Insight On 2021 And Beyond
Predictions for the Future of the Security Space By Billy Spears, Chief Information Security Officer, Alteryx 2020 has been a year unlike any other, with unforeseen challenges creating hurdles for […]
How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy
By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]
Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack, […]
UnityMiner targets unpatched QNAP NAS in cryptocurrency mining campaign
Experts warn of ongoing attacks targeting QNAP network-attached storage (NAS) devices to abuse them in cryptocurrency mining. Researchers at 360Netlab are warning of a cryptocurrency malware campaign targeting unpatched network-attached storage […]
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal […]
Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence
By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence […]
Hackers attempted to poison the water supply of a US city
Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in the Oldsmar’s water supply. The scenario described by Pinellas Sheriff […]
Cyberattacks On K-12 Education
Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul While we read about a lot of high profile cyberattacks against large […]
3.2billion records leaked, Part II
The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum. More than 3.2 billion unique pairs of cleartext […]
SonicWall released patch for actively exploited SMA 100 zero-day
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series appliances. SonicWall this week released firmware updates (version 10.2.0.5-29sv) to […]
The European Medicines Agency (EMA) revealed Friday that COVID-19 vaccine documents stolen from its servers have been manipulated before the leak.
The European Medicines Agency (EMA) declared that COVID-19 vaccine documents stolen from its servers in a recent cyber attack have been manipulated. In December, a cyber attack hit the European […]
Businesses Should See Security as An Enabler of Digital Transformation, Not A Hindrance
A distributed workforce has renewed the importance of security for all aspects of organizations’ technology estates By Matt Gyde, CEO, Security Division at NTT Ltd. The pandemic has put a […]
Anatomy of a hack – Solar Winds Orion
Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies the world […]
Communication Streaming Challenges
By Milica D. Djekic As it’s well-known, there are a lot of ways of tracking someone’s e-mail, chat, or social media accounts. The defense professionals are quite familiar with such […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
The Coming Security Perspectives
By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s […]
All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic
By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to […]