March 14, 2023
Via: SecureWorldIn the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some […]
March 6, 2023
Via: Help Net SecurityIn today’s digital age, cybersecurity and privacy have become major concerns for internet users. With the increase in cyber attacks and data breaches, it is vital to protect your online privacy and security. One way to do this is by […]
February 22, 2023
Via: Help Net SecurityMitigating persistent cyber threats has made network security mission critical for businesses of all sizes. The 2022 U.S. Cybersecurity Census Report found that the average business experiences 42 cyberattacks each year, amplifying the need for a comprehensive solution. Perimeter 81 […]
February 15, 2023
Via: Help Net SecuritySynSaber has launched OT PCAP Analyzer tool that allows users to view a high-level breakdown of the device and protocol information contained within a packet capture (PCAP) file. SynSaber’s OT PCAP Analyzer provides visibility into a snapshot of your network […]
February 15, 2023
Via: Dark ReadingAs IT and operational technology (OT) network lines continue to blur in the rapidly digitalized industrial sector, new vulnerabilities and threats imperil conventional OT security measures that once isolated and guarded physical processes from cyberattacks. Two new separate sets of […]
Network security, Threats & Malware, Virus & Malware
February 14, 2023
Via: The Hacker NewsThe threat actors behind the black hat redirect malware campaign have scaled up their campaign to use more than 70 bogus domains mimicking URL shorteners and infect over 10,800 websites. “The main objective is still ad fraud by artificially increasing […]
February 7, 2023
Via: Help Net SecurityFortinet has released FortiSP5, the latest breakthrough in ASIC technology from Fortinet to propel major leaps forward in securing distributed network edges. Building on over 20 years of ASIC investment and innovation from Fortinet, FortiSP5 delivers secure computing power advantages […]
February 7, 2023
Via: Help Net SecurityOPSWAT unveiled MetaDefender Kiosk K2100, a new, ultra-rugged mobile kiosk designed to keep critical networks secure in even the harshest conditions. “OPSWAT has a deep understanding of the challenges OT security teams face,” said Sid Snitkin, VP, Cybersecurity Services at […]
January 26, 2023
Via: Help Net SecurityWith continued transition to cloud services to support remote work, the threat of malware continues to grow, expanding each company’s attack surface. The first half of 2022 saw 2.8 billion malware attacks in which more than 270,000 “never-seen-before” malware variants […]
December 29, 2022
Via: TechRadarA recent code change(opens in new tab) for Google Chrome has uncovered an updated feature that will see the popular web browser automatically preventing insecure downloads from HTTP sites. Formerly the norm, many HTTP sites have since been updated to […]
November 9, 2022
Via: Help Net SecurityEndace has released EndaceFlow, a NetFlow Generator that promotes end-to-end visibility for cybersecurity and network performance monitoring. NetFlow offers a view of network traffic and other information, while continuous packet capture provides detail and granularity of that data. Together, the […]
October 10, 2022
Via: CSO OnlineThe web browser has long been the security sinkhole of enterprise infrastructure. While email is often cited as the most common entry point, malware often enters via the browser and is more difficult to prevent. Phishing, drive-by attacks, ransomware, SQL […]
October 3, 2022
Via: CSO OnlineEnd-to-end network security and performance visibility vendor LiveAction has announced new security operations center (SOC) focused updates to its Network Detection and Response (NDR) platform, ThreatEye. In a press release, the firm stated that the platform features a new user […]
September 30, 2022
Via: The Hacker NewsEndpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use their resources for their day-to-day work. However, they also expand the attack surface and make the organisation vulnerable to malicious cyberattacks and data […]
September 26, 2022
Via: The Hacker NewsCybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data to e-commerce and entertainment. Every organisation that needs to deliver services to their customers and employees must protect their IT ‘network’ – all […]
September 22, 2022
Via: Dark ReadingStackHawk, the company making application security testing part of software delivery, today announced its Deeper API Security Test Coverage release. This expands StackHawk’s solution to help developers scan the entire API layer to uncover potential vulnerabilities. Today’s application architectures require […]
September 21, 2022
Via: Help Net SecurityInfoblox announced the results of a Forrester Consulting study, which found IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings underscore a convergence in security with networking, which IT decisionmakers now view as the […]
September 20, 2022
Via: Security AffairsThe police would track burglars if they left calling cards at the attacked properties. Internet fraudsters usually leave a trail of breadcrumbs whenever they visit websites through specific IP addresses. They reveal their physical location and the device they used […]
September 19, 2022
Via: Help Net SecurityApple has always touted the security and privacy capabilities of their devices. Being responsible for both the hardware and the associated OS has allowed Apple to create a closed-end approach to shield users against some common attacks. But it’s possible […]
September 16, 2022
Via: TechRadarRoughly one in every five Windows servers(opens in new tab) is missing endpoint protection, meaning organizations of all sizes are risking various cybersecurity incidents, including ransomware. A report from Sevco Security, which analyzed data coming in from more than 500,000 […]