Quantcast
Browsing all 1623 articles
Browse latest View live

Introducing Full Content Inspection: The New Standard in Network Security,...

Network security controls are no longer reliable or sufficient. They are easily evaded, prone to false positives, and feed a costly ecosystem of alert management and incident response. According to...

View Article


Beware the tools that can bring risk to a Windows network

There are a few essential questions that anyone maintaining security on a Windows network needs to ask right now to avoid engaging in some very risky behavior, but there’s one that may be the most...

View Article


Attackers abuse URL protection services to hide phishing links in emails

Recent phishing campaigns were seen abusing email security services that rewrite URLs to hide their own malicious links. The irony is that this URL rewriting feature, which is common in secure email...

View Article

Attempted Trump assassination exploited in new crypto doubling scams

Crypto scammers are using the recent assassination attempts against former US President Donald Trump to lure customers into a crypto doubling scheme, according to a Bitdefender study. The new scam has...

View Article

SAP security holes raise questions about the rush to AI

Cloud security firm Wiz has probed SAP defenses as part of its tenant isolation research on AI service providers, and on Wednesday published a lengthy list of shortcomings. SAP says that they fixed...

View Article


Cisco patches severe password reset flaw that lets hackers hijack SSM On-Prem...

Cisco has issued a patch that fixes a severe password weakness in many versions of its Smart Software Manager On-Prem (Cisco SSM On-Prem), used by a subset of customers to manage product licenses...

View Article

Hashcat explained: How this password cracker works

What is hashcat? Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins, as well as criminals and spies. Cracking passwords is different from...

View Article

Image may be NSFW.
Clik here to view.

Inside the world’s largest ‘live-fire’ cyber-defense exercise

The island country of Berylia is under threat. Over the next 48 hours, it will be subject to an endless number of cyberattacks without interruption, which it must contain in the best way possible....

View Article


Blue screen of death strikes crowd of CrowdStrike servers

CrowdStrike has admitted to pushing out a bad software update, causing many Windows machines running the affected software to crash. The problem, apparently affecting its Falcon platform, brought down...

View Article


Solarwinds patches critical RCE flaws in Access Rights Manager

US software development company Solarwinds has sent out important security fixes that close a number of critical vulnerabilities in its Access Rights Manager software. Six of the vulnerabilities...

View Article

Federal judge greenlights securities fraud charges against SolarWinds and its...

Security firm SolarWinds had good news and bad news this week, as most of the charges in the US Securities and Exchange Commission (SEC) lawsuit, filed in the wake of the 2020 Sunburst cyberattack,...

View Article

CrowdStrike CEO apologizes for crashing IT systems around the world, details fix

CrowdStrike CEO has apologized to the company’s customers and partners for crashing their Windows systems, and the company has described the error that caused the disaster. “I want to sincerely...

View Article

Internships can be a gold mine for cybersecurity hiring

Willem Westerhof just might be the Cinderella of cybersecurity interns. The Dutchman had worked as a physiotherapist, made pies in a bakery, and toiled in overnight shifts at food and beverage stands...

View Article


5 critical IT policies every organization should have in place

For many enterprises, IT infrastructures have broadened to the extent that they seemingly have no boundaries. Many employees are working remotely or via a hybrid model. Cloud-based services have...

View Article

Data of 13 million MediSecure customers compromised in ransomware attack

Approximately 12.9 million Australians using the MediSecure prescription delivery service suffered a loss of personal information from an April ransomware attack, MediSecure said in a statement. The...

View Article


Key considerations for adopting a platform approach to cybersecurity

It’s no secret that the cybersecurity platform conversation is top of mind for many right now. Yet a platform approach to cybersecurity has existed for decades, and there’s long been a debate across...

View Article

Early IT takeaways from the CrowdStrike outage

Whether you’ve survived the CrowdStrike incident or didn’t use CrowdStrike and are merely seeing the impact to others, taking time to learn lessons from this event is vital. After all, if you couldn’t...

View Article


Chinese APT group Daggerfly revamps malware toolkit with new backdoors

Researchers have linked a previously unattributed Mac backdoor and a new Windows Trojan to a Chinese APT group known as Daggerfly that has been around for over a decade and targets organizations and...

View Article

NHIs may be your biggest — and most neglected — security hole

Non-human identities (NHIs) have been a staple of enterprise IT for decades. Giving digital components credentials to access IT networks and devices, as IT would a human user, is key to ensuring...

View Article

Wiz shocks the tech world as it rejects Google’s $23 billion bid

In a surprising turn of events, Israeli cybersecurity startup Wiz has decided to end its acquisition talks with Google-parent Alphabet, which would have resulted in a $23 billion deal, the largest...

View Article
Browsing all 1623 articles
Browse latest View live