Industry 4.0 under Threat Landscape

By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security terms. It appears that industry 4.0 is more than ever under the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Industry 4.0 under Threat Landscape

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

Hackers compromised Microsoft Exchange servers at the EU Banking Regulator EBA

The European Banking Authority (EBA) disclosed a cyberattack that resulted in the hack of its Microsoft Exchange email system. The European Banking Authority announced that it was the victim of […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Hackers compromised Microsoft Exchange servers at the EU Banking Regulator EBA

Attivo Networks Launches ADAssessor for Continuous Visibility to Active Directory Security Exposures

Attivo Networks, the leader in lateral movement attack detection and privilege escalation prevention, has expanded its Active Directory (AD) protection suite of products with a new and innovative way to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on Attivo Networks Launches ADAssessor for Continuous Visibility to Active Directory Security Exposures

Does Sunburst Have Your Confidential Emails and Database Data?

By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Does Sunburst Have Your Confidential Emails and Database Data?

Top 100 Cybersecurity News Sites

With millions of websites and downloadable files available on the internet, potential risks of security breach are high, especially with the fast development in technology. In this article, we will […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , , , , , , | Comments Off on Top 100 Cybersecurity News Sites

Why the Education Sector Must Address Security in The Rush to Digitise

By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why the Education Sector Must Address Security in The Rush to Digitise

Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Learning Hardware Security Via Capture-The-Flag Competitions

By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Learning Hardware Security Via Capture-The-Flag Competitions

Why Organizations Need to Reduce Friction to Manage Remote Work Environments

The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why Organizations Need to Reduce Friction to Manage Remote Work Environments

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X