Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

New evolving Abcbot DDoS botnet targets Linux systems

Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet,…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on New evolving Abcbot DDoS botnet targets Linux systems

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

13th Anniversary Global InfoSec Awards for 2025 is closed! Winners Announced during RSAC 2025...

X