China Accuses NSA's TAO Unit of Hacking its Military Research UniversityChina has accused the U.S. National Security Agency (NSA) of conducting a string of cyberattacks aimed...
Year: 2022
Iranian Hackers Target High-Value Targets in Nuclear Security and Genomic Research
Iranian Hackers Target High-Value Targets in Nuclear Security and Genomic ResearchHackers tied to the Iranian government have been targeting individuals specializing in Middle Eastern affairs, nuclear...
Misinformation and propaganda in the authoritarian internet
Misinformation and propaganda in the authoritarian internet On my sixth birthday, my father gifted me a globe of the world. It is the best birthday present...
How to deal with dates and times without any timezone tantrums…
How to deal with dates and times without any timezone tantrums…Heartfelt encouragement to embrace RFC 3339 - find out why!Leer másNaked SecurityHeartfelt encouragement to embrace RFC...
Beef up your Cyber Protection with Multi Factor Authentication
Beef up your Cyber Protection with Multi Factor Authentication“When it comes to security, Two-Factor Authentication proves to be a treasury full of gold.” The severity and...
Barracuda Networks Extends Cybersecurity and Data Protection Portfolio
Barracuda Networks Extends Cybersecurity and Data Protection Portfolio At the Secured.22 virtual conference, Barracuda Networks announced it has added a range of capabilities that collectively tighten...
Apple patches zero-day holes – even in the brand new iOS 16
Apple patches zero-day holes – even in the brand new iOS 16Five updates, one upgrade, plus two zero-days. Patch your Macs, iPhones and iPads as soon...
ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe
ESET Research uncovers new APT group Worok – Week in security with Tony AnscombeWorok takes aim at various high-profile organizations that operate in multiple sectors and...
What Is DNS Filtering and Why Does Your Business Need It?
What Is DNS Filtering and Why Does Your Business Need It?One of the most popular methods used by companies and providers to protect their environments from...
Five ways your data may be at risk — and what to do about it
Five ways your data may be at risk — and what to do about itWe store vast amounts of data — financial records, photos/videos, family schedules,...
Pro-Palestinian group GhostSec hacked Berghof PLCs in Israel
Pro-Palestinian group GhostSec hacked Berghof PLCs in IsraelThe hacktivist collective GhostSec claimed to have compromised 55 Berghof PLCs used by Israeli organizations. Pro-Palestinian Hacking Group GhostSec claimed to...
Montenegro and its allies are working to recover from the massive cyber attack
Montenegro and its allies are working to recover from the massive cyber attackA massive cyberattack hit Montenegro, officials believe that it was launched by pro-Russian hackers...
Lampion Trojan Launches New Campaign Through File-Sharing Service
Lampion Trojan Launches New Campaign Through File-Sharing ServiceLampion trojan is again in action, this time launching a large phishing campaign. The unknown threat actors behind this...
Apple released iOS 16 with Lockdown, Safety Check security features
Apple released iOS 16 with Lockdown, Safety Check security featuresApple released iOS 16 today with new features to boost iPhone users' security and privacy, including Lockdown...
Cloud attacks on the supply chain are a huge concern
Cloud attacks on the supply chain are a huge concernContenido de la entradaLeer másProofpoint News Feed
Leading a Revolution to Provide Secure CCTV Cameras
Leading a Revolution to Provide Secure CCTV CamerasBy Mitch Muro, Product Marketing Manager, Check Point Software Technologies When building IoT devices, it is important to […]...
Levelling The Battlefield with Cyber as An Asymmetric Leverage
Levelling The Battlefield with Cyber as An Asymmetric LeverageBy Goh Eng Choon, President for Cyber, ST Engineering From sabotaging, stealing and destroying valuable enterprise data to...
Lazarus Group Resurfaces, Exploiting Log4j Vulnerability and Spreading MagicRAT
Lazarus Group Resurfaces, Exploiting Log4j Vulnerability and Spreading MagicRAT Lazarus Group, also known as APT38, Dark Seoul, Hidden Cobra, and Zinc, has garnered a reputation as...
Cybercrime Group TA558 Ramps Up Email Attacks Against Hotels
Cybercrime Group TA558 Ramps Up Email Attacks Against HotelsContenido de la entradaLeer másProofpoint News Feed
VMware: 70% drop in Linux ESXi VM performance with Retbleed fixes
VMware: 70% drop in Linux ESXi VM performance with Retbleed fixesVMware is warning that ESXi VMs running on Linux kernel 5.19 can have up to a 70%...
Cloud security: Increased concern about risks from partners, suppliers
Cloud security: Increased concern about risks from partners, suppliersContenido de la entradaLeer másProofpoint News Feed
New Linux Cryptomining Malware
New Linux Cryptomining MalwareIt’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the...
Lorenz ransomware breaches corporate network via phone systems
Lorenz ransomware breaches corporate network via phone systemsThe Lorenz ransomware gang now uses a critical vulnerability in Mitel MiVoice VOIP appliances to breach enterprises using their...
Best Data Security Solution | Proofpoint Information Protection
Best Data Security Solution | Proofpoint Information ProtectionContenido de la entradaLeer másProofpoint News Feed
Proofpoint Introduces a Smarter Way to Stay Compliant with New Intelligent Compliance Platform
Proofpoint Introduces a Smarter Way to Stay Compliant with New Intelligent Compliance PlatformContenido de la entradaLeer másProofpoint News Feed
Dotless domains: Home to the Internet’s shortest URLs
Dotless domains: Home to the Internet’s shortest URLsYou may be familiar with some of the shortest internet domains used by major companies, such as m.me and fb.me from Facebook...
Chinese hackers tied to attacks on South China Sea energy firms
Chinese hackers tied to attacks on South China Sea energy firmsContenido de la entradaLeer másProofpoint News Feed
HP will pay customers for blocking non-HP ink cartridges in EU
HP will pay customers for blocking non-HP ink cartridges in EUHP printer owners forced to use non-HP ink and toner cartridges in Europe will receive compensation...
Apple fixes eighth zero-day used to hack iPhones and Macs this year
Apple fixes eighth zero-day used to hack iPhones and Macs this yearApple has released security updates to address the eighth zero-day vulnerability used in attacks against...
‘Cyber insecurity’ in healthcare is leading to increased patient mortality rates
‘Cyber insecurity’ in healthcare is leading to increased patient mortality ratesA new report finds that ransomware attacks are delaying procedures and tests, resulting in poor patient...

























