New Sensor Dashboard and Rack PDU Outlet ControlProduct Update: Version 3.11 Our latest product update is a big one! we've introduced a new add-on feature called...
Author: admin
Making the Right Investments to Combat the Cybersecurity Labor Shortage
Making the Right Investments to Combat the Cybersecurity Labor ShortageModernizing PKI can provide the transformative element teams need to stay vigilant and effective throughout the cybersecurity...
Norway Seizes $5.84 Million in Cryptocurrency Stolen by Lazarus Hackers
Norway Seizes $5.84 Million in Cryptocurrency Stolen by Lazarus HackersNorwegian police agency Økokrim has announced the seizure of 60 million NOK (about $5.84 million) worth of...
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government AgenciesA spear-phishing campaign targeting Indian government entities aims to deploy an updated version of a backdoor called ReverseRAT....
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bug
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bugConditional code considered cryptographically counterproductive.Leer másNaked SecurityConditional code considered cryptographically counterproductive.
When Low-Tech Hacks Cause High-Impact Breaches
When Low-Tech Hacks Cause High-Impact BreachesWeb hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source...
Public Cloud Adoption is Accelerating in the MENA Region
Public Cloud Adoption is Accelerating in the MENA RegionPeoplActive is an ISO 27001:2013 certified leading tech hiring platform. By utilizing an exclusive network of 4000+ Silicon...
Palo Alto Networks Unfurls OT Security Service
Palo Alto Networks Unfurls OT Security Service At the Mobile World Congress event, Palo Alto Networks today launched a service for securing operation technology (OT) assets...
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworks
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworksOf the numerous security frameworks available to help companies protect against...
Security Updates – January 2023
Security Updates – January 2023Check out the latest security updates made to the GuardRails platform as of January 2023 per coding language: JavaScript, Java, C, Python,...
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
87% of Container Images in Production Have Critical or High-Severity VulnerabilitiesAt the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.Read MoreDark...
Key Themes of RSA 2023: Diversity of Ideas – New and Old
Key Themes of RSA 2023: Diversity of Ideas - New and OldCybereason Vice President and Global Field CISO Greg Day Previews RSA ConferenceAhead of RSA Conference...
Spotlight on 2023 DevSecOps Trends
Spotlight on 2023 DevSecOps TrendsSolutions that provide more actionable results — remediation that frees up engineers, processes which integrate security into software development from its design,...
How Hackers Used Legitimate Software to Breach U.S. Federal Agencies
How Hackers Used Legitimate Software to Breach U.S. Federal AgenciesA phishing scam using legitimate remote monitoring and management (RMM) software was used to target at least...
Killnet Russian Hacking Group Launches DDoS Attacks on German Websites
Killnet Russian Hacking Group Launches DDoS Attacks on German WebsitesOn January 25th, Killnet Russian activist threat group put several German websites offline after performing a DDoS...
What Is an SEO Poisoning Attack and How Does It Affect Network Security?
What Is an SEO Poisoning Attack and How Does It Affect Network Security?SEO poisoning attacks have been on the rise in recent years, as more and...
Explaining Vulnerability Scanning: Definition, Types, Best Practices
Explaining Vulnerability Scanning: Definition, Types, Best PracticesThe ever-changing landscape of cybersecurity makes it harder for companies to keep up with the malicious intents of threat actors....
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBAC
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBACAs organizations are increasingly dealing with security concerns, there is a need for more sophisticated...
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?Federal authorities have taken down a website run by a notorious ransomware gang...
Security Flaws Disclosed in Samsung’s Galaxy Store App for Android
Security Flaws Disclosed in Samsung’s Galaxy Store App for AndroidFlaws found in the Galaxy App Store gave attackers the ability to install apps without the user’s...
Aurora Infostealer Malware Deploys Shapeshifting Tactics
Aurora Infostealer Malware Deploys Shapeshifting TacticsOne of the most recent finds exposed the Aurora Stealer malware imitating popular applications to infect as many users as possible....
Doenerium: When Stealing from Thieves Is Also a Crime
Doenerium: When Stealing from Thieves Is Also a CrimeBy Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’...
Five Ways to Keep Endpoint Protection Simple
Five Ways to Keep Endpoint Protection SimpleBy Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve....
What Is Spyware, What It Does, and How to Block It?
What Is Spyware, What It Does, and How to Block It?We are sure that you already heard of spyware, but are you curious to dive deeper...
The Rise in Cyber-Attacks from Bad International Actors
The Rise in Cyber-Attacks from Bad International ActorsThere has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems...
How 5G Networks Are Secured and Enabled By SASE
How 5G Networks Are Secured and Enabled By SASEBy Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll...
What Is Kerberos Authentication?
What Is Kerberos Authentication?As industry experts continuously predict that cybercrime will only get worse in the following years, we see that the digital world is keen...
How Does a Botnet Attack Work?
How Does a Botnet Attack Work?By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity...
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Gootkit Malware Continues to Evolve with New Components and ObfuscationsThe threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new...
Turla Activity Detection: russian Cyberespionage Group Targeting Ukraine Uses Decade-Old USB-Delivered Andromeda Malware to Spread Novel Backdoors
Turla Activity Detection: russian Cyberespionage Group Targeting Ukraine Uses Decade-Old USB-Delivered Andromeda Malware to Spread Novel Backdoors With USB-spreading malware becoming a popular vector for initial...





























