Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

CISA is warning of vulnerabilities in GE Power Management Devices

U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker to conduct multiple malicious activities on vulnerable systems. U.S. Cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CISA is warning of vulnerabilities in GE Power Management Devices

Why Security Shouldn’t Only Fall on Employees

By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Security Shouldn’t Only Fall on Employees

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Are Encrypted Communication Apps used for Crime Operations?

Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

Industry 4.0 under Threat Landscape

By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security terms. It appears that industry 4.0 is more than ever under the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Industry 4.0 under Threat Landscape

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Moving to Active Defense: What It Means, How It Works and What You Can Do Now

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

The 5 Biggest Mistakes in SD-WAN Security

2020 taught organizations that the traditional 9-5 office is a thing of the past. Not only has the idea of employees’ location has changed but also the central network infrastructures […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on The 5 Biggest Mistakes in SD-WAN Security

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs. OVH, one of the largest hosting […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on The fire in the OVH datacenter also impacted APTs and cybercrime groups

UnityMiner targets unpatched QNAP NAS in cryptocurrency mining campaign

Experts warn of ongoing attacks targeting QNAP network-attached storage (NAS) devices to abuse them in cryptocurrency mining. Researchers at 360Netlab are warning of a cryptocurrency malware campaign targeting unpatched network-attached storage […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on UnityMiner targets unpatched QNAP NAS in cryptocurrency mining campaign

EU leaders aim at boosting defense and security, including cybersecurity

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security.  During the recent video conference of the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on EU leaders aim at boosting defense and security, including cybersecurity

Does Sunburst Have Your Confidential Emails and Database Data?

By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Does Sunburst Have Your Confidential Emails and Database Data?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X