Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

New evolving Abcbot DDoS botnet targets Linux systems

Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet,…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on New evolving Abcbot DDoS botnet targets Linux systems

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

13th Anniversary Global InfoSec Awards for 2025 now open for super early bird packages! Winners Announced during RSAC 2025...

X